CN114745198A - File management method, system and device based on block chaining operation and maintenance management - Google Patents
File management method, system and device based on block chaining operation and maintenance management Download PDFInfo
- Publication number
- CN114745198A CN114745198A CN202210481763.7A CN202210481763A CN114745198A CN 114745198 A CN114745198 A CN 114745198A CN 202210481763 A CN202210481763 A CN 202210481763A CN 114745198 A CN114745198 A CN 114745198A
- Authority
- CN
- China
- Prior art keywords
- file
- module
- maintenance management
- content
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a file management method, a system, a storage medium and a device based on block chaining operation and maintenance management, wherein the method provided by the invention specifically comprises the following steps: starting a file ecological module service, sending a transmission file to a file ecological module by a file uploader of a block chaining operation and maintenance management service module (client), and encrypting the content of the file by an encryption machine; the file ecological module provides a content identifier for the file content, links the file content and then stores the file content on the file ecological module; an applicant of the block chaining, operation and maintenance management service module applies for file downloading to the file ecological module, and a file uploader performs permission verification on the file uploader after receiving the application. The method encrypts the content identifier and the content of the file, authorizes and manages the user organization of the block chaining operation and maintenance management service module through the file ecological module in the aspects of uploading, storing, downloading and the like of the file, reduces the consumption of network bandwidth to a certain extent, and simultaneously ensures the safety of the file.
Description
Technical Field
The invention belongs to the technical field of block chain file management, and particularly relates to a file management method, system and device based on block chain operation and maintenance management.
Background
The block chain technology is a distributed database technology for verifying and storing data in a block chain type data structure, and more people are willing to understand the block chain technology as a distributed book technology in an application level, namely, the block chain technology is a technology for ensuring the consistency of data by using a consensus algorithm of distributed nodes. The programming and data operation mode of the block chain is realized by an intelligent contract formed by automatic script codes, and the realization is a decentralized, transparent and safe distributed infrastructure.
Generally, a block chain is managed and monitored by adopting a BaaS platform, the BaaS is a block chain control platform which is convenient to provide and integrated, is used for monitoring and managing a bottom layer block chain network, and has the characteristics of large monitoring and management amount, so that the state of a bottom layer network can be presented on a front-end page in real time through a visual means, and complicated block chain bottom layer management can be simplified into user-friendly one-key operation through interface packaging.
In the traditional cloud storage, a user uploads own data to a cloud end, and after the user uploads the data, a service provider stores the data in a data center of the user, so that when the user wants to access the information anytime and anywhere, only one request needs to be sent to the data center, and the data center sends the data to the user.
The typical problem is that the data center is a large server, which needs temperature control, and is strictly maintained, with high cost and delay, because the data center is usually not very close to the user, when sending a file with a large memory, the corresponding network bandwidth will be greatly lost in the transmission process, and the security of the file is not correspondingly guaranteed.
Disclosure of Invention
Based on the background and the problems existing in the prior art, the invention designs a file management method, a system and a device based on block chain operation and maintenance management, solves the problems of large-scale use and consumption of network bandwidth, and safety and speed of files in the scene from the aspects of uploading, storing, downloading and the like of files of a file ecological module, reduces the consumption of the network bandwidth to a certain extent, and simultaneously ensures the safety of the files. The technical scheme is as follows:
in a first aspect, the present invention provides a file management method based on block chaining operation and maintenance management, which includes the following steps:
the file ecological module receives a service starting request, the receiving block link operation and maintenance management service module sends a transmission file, and the content of the transmission file is encrypted through an encryption machine;
the file ecological module provides a content identifier for the encrypted file content through a data model of a content addressable network, links the encrypted file content through an directed acyclic link technology (IPLD Merkle DAG), and then stores the encrypted file content in the file ecological module;
the block chaining, operation and maintenance management service module finds the encrypted file content through a Distributed Hash Table (DHT), applies for file downloading to the file ecological module, the file uploading module performs authority verification on the file ecological module after receiving the application, the file downloading is completed if the file uploading module passes the application, and the return is refused if the file uploading module does not pass the application.
In the process of realizing the steps, a distributed hash table is provided by a point-to-point node discovery protocol libp2p protocol to discover the encrypted file content, a block link operation and maintenance management service module of the encrypted file content is linked, and the encrypted file is downloaded through a multiplex link;
the stack is adopted to provide the connection identifier for the libp2p protocol, the DHT, the encrypted file content and the blockchain operation and maintenance management service module of the point-to-point node discovery protocol.
The content identifier refers to a content identifier (content addressing identifier CID) of the file, which is encrypted by using a symmetric encryption technology using an encryption machine, and a key is stored by a file uploader, and the encryption of the file content also uses the key.
The symmetric encryption is a modern encryption algorithm, and comprises algorithms such as a data encryption standard algorithm (DES) and an advanced encryption standard Algorithm (AES).
The block chaining operation and maintenance management service module uses a public key in the identity certificate to apply for the file ecological module, and the file ecological module responds to the file uploading module;
the file uploading module receives the application for applying the key, carries out authority verification on the application, encrypts the key of the file by using a public key of the block chaining operation and maintenance management service module through the encryption machine if the verification is passed, and directly returns the key to the block chaining operation and maintenance management service module;
the block chaining, operation and maintenance management service module decrypts the secret key of the file by using the private key, and downloads the file and decrypts the content of the file from the file ecological module.
In the above scheme, the block link operation and maintenance management service module further provides an operation interface of a user organization, where the user includes a file uploader and an applicant, and further includes an intelligent contract, performs authority verification on a user request, and triggers application of a key and key return by monitoring a federation link code event.
Further, the specific implementation steps of the permission check include: the applicant sends a key application request based on the block chain operation and maintenance management service module, the file uploader calls a parameter configuration table of the file uploader based on the block chain operation and maintenance management service module to check data information corresponding to the request through the file uploader, the next step is carried out when the information is matched, and the return is refused when the information is not matched.
In a second aspect, the present invention provides a file management system based on block chaining operation and maintenance management, which specifically comprises:
a file ecological module: receiving a service starting request, receiving a transmission file sent by a block link operation and maintenance management service module, providing a content identifier CID for encrypted file contents through a data model of a content addressable network, linking the encrypted file contents together through a directed acyclic link technology, and storing the encrypted file;
an encryption machine: encrypting the contents of the transmission file of the file ecological module through an encryption machine;
the block link operation and maintenance management service module comprises: providing an operation interface of a user organization, wherein the user comprises a file uploader, an applicant and an intelligent contract, carrying out authority verification on a user request, and triggering application of a key and key return by monitoring a coalition chain code event; finding the encrypted file content through a distributed hash table, and applying for file downloading to a file ecosystem;
the file uploading module: and after receiving the application, carrying out authority verification on the file, if the file passes the verification, finishing file downloading, and if the file does not pass the verification, refusing to return.
In a third aspect, a computer-readable storage medium is provided, in which a computer program is stored, wherein the computer program, when executed by a processor, is adapted to implement the method and steps of any of the above.
In a fourth aspect, a file management apparatus based on block chaining operation and maintenance management is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor can implement the method and steps of any one of the above items when executing the computer program.
Compared with the prior art, the beneficial effects of the invention are shown in the above description of the invention, and are not limited to: the method encrypts the Content Identifier (CID) of the file and the file content thereof, authorizes and manages the user organization of the block chain operation and maintenance management service module in the aspects of uploading, storing, downloading and the like of the file through the file ecological module, reduces the consumption of network bandwidth to a certain extent, and simultaneously ensures the safety of the file.
Drawings
FIG. 1 is a block chain operation and maintenance management-based file management flow structure diagram according to the present invention;
FIG. 2 is a diagram of an overall system for managing files based on block chaining operation and maintenance management according to the present invention.
Detailed Description
In order to clarify and clarify the technical solutions and advantages of the present invention, the present invention will be further described in detail with reference to the accompanying drawings in the following embodiments of the present invention.
In an embodiment of the present invention, the present invention provides a file management method based on block chaining operation and maintenance management, and a large file storage method integrated with IPFS management, and the present invention implements file uploading, storage, and downloading based on a flow structure diagram as shown in fig. 1, and the specific implementation steps include:
step 1: starting a file ecosystem (IPFS ecosystem), wherein the IPFS ecosystem is adopted in the embodiment of the invention, a file uploading module sends a transmission file to the file ecosystem through a block chaining maintenance management service module (BaaS service), and the content of the file is encrypted through an encryption machine;
the block link operation and maintenance management service module also provides an operation interface organized by a user, the user comprises a file uploader and an applicant, and also comprises an intelligent contract, the authority of the user request is checked, and the application of a secret key and the return of the secret key are triggered by monitoring a coalition link code event;
step 2: the file ecological module provides a content identifier CID (content identifier or content addressing identifier) for the encrypted file content through a data model of a content addressable network (web), links the file contents together through a directed acyclic link technology (IPLD Merkle DAG), and stores the file contents on the file ecological module; the Content Identifier (CID) is a content identifier of the file, the file is encrypted by using a symmetric encryption technology through an encryption machine, a key is stored by a file uploading module, and the key is also used for encrypting the file content; the symmetric encryption comprises algorithms such as a data encryption standard algorithm (DES) and an advanced encryption standard Algorithm (AES);
step 3: the block chain operation and maintenance management service module finds the encrypted file content through a Distributed Hash Table (DHT), an applicant of the block chain operation and maintenance management service module applies for file downloading to the file ecological module, the file uploading module performs permission verification on the file ecological module after receiving the application, the file downloading is completed if the file uploading module passes the application, and the return is refused if the file uploading module does not pass the application. The block chaining operation and maintenance management service module sends a key application request, the file uploading module calls a parameter configuration table of the file uploading module to verify data information corresponding to the key application request, if the information is matched, the next step is carried out, and if the information is not matched, the return is refused.
The file ecological module receives an application file downloading request of the block chaining, operation and maintenance management service module, and the specific implementation steps include:
s31: an applicant who downloads the file uses a public key in an identity certificate of the applicant to apply for a file ecological module, and the file ecological module responds to a file uploading module;
s32: the file uploading module receives the application for applying the secret key, carries out authority verification on the application, encrypts the secret key of the file by using the encryption machine to the public key of the applicant after passing the verification, and directly returns the secret key to the applicant of the block chaining operation and maintenance management service module;
s33: the applicant decrypts the secret key of the file by using the private key, and downloads the file to the file ecological module and decrypts the content of the file.
In the process of realizing the steps, a distributed hash table is provided by a point-to-point node discovery protocol libp2p protocol to discover the encrypted file content, a block link operation and maintenance management service module of the encrypted file content is linked, and the encrypted file is downloaded through a multiplex link;
the stack is adopted to provide the connection identifier for the libp2p protocol, the DHT, the encrypted file content and the blockchain operation and maintenance management service module of the point-to-point node discovery protocol.
In another embodiment of the present invention, a system flow for integrating IPFS management with a block chaining operation and maintenance service module (BaaS service) is further provided, as shown in fig. 2, specifically as follows:
the system comprises a file ecological module, an encryption machine and a block chaining operation and maintenance management service module, wherein the block chaining operation and maintenance management service module provides services for an applicant and an uploader based on a client;
(1) the file ecological module: digitizing and storing the file content, and providing the file content for the functions of uploading, storing, downloading and the like of the block chaining, operation and maintenance management service module; receiving a service starting request, receiving a transmission file sent by a block link operation and maintenance management service module, providing a CID for encrypted file contents through a data model of a content addressable network, linking the encrypted file contents together through a directed acyclic link technology, and storing the encrypted file;
(2) an encryption machine: encrypting the CID and the content of the file by using a symmetric encryption technology, wherein a secret key is stored by a file uploader, and the secret key is also used for encrypting the content of the file; encrypting the contents of the transmission file of the file ecological module through an encryption machine;
(3) the block link operation and maintenance management service module comprises: providing an operation interface organized by users (including file uploaders and applicants), wherein the operation interface also comprises an intelligent contract, carrying out authority verification on user requests, and triggering application keys and key return by monitoring alliance chain code events; discovering the encrypted file content through a Distributed Hash Table (DHT), and applying for file downloading from a file ecosystem;
(4) the file uploading module: and after receiving the application, carrying out authority verification on the application, finishing file downloading if the application passes, and refusing to return if the application does not pass.
The specific implementation steps of the permission verification comprise: and an applicant applies for a request of a key, a file uploader calls a parameter configuration table of the file uploader to verify data information corresponding to the request, if the data information is matched, the file uploader performs the next step, and if the data information is not matched, the file uploader refuses to return the data information.
In another embodiment of the present invention, a computer-readable storage medium is provided, which stores a computer program, and the computer program, when executed by a processor, implements the method steps of any one of the above file management methods and systems based on blockchain operation and maintenance management. For the storage medium embodiment, since the content is basically similar to that of the method embodiment, the description is relatively simple, and for relevant points, reference may be made to partial description of the method embodiment.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In another embodiment of the present invention, this embodiment provides a file management apparatus based on blockchain operation and maintenance management, where the apparatus may be a server or a mobile terminal. The apparatus is also a computer device comprising a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The database is used for storing all data of the computer equipment. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a multi-chain compatible architecture construction method.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments described above are presented to enable a person having ordinary skill in the art to make and use the invention. It is to be understood that the present invention is not limited to the application of the above-mentioned examples, and it is obvious to those skilled in the art that various modifications can be easily made to the above-mentioned examples, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.
Claims (9)
1. A file management method based on block chaining operation and maintenance management is characterized by comprising the following concrete implementation steps:
the file ecological module receives a service starting request, the receiving block link operation and maintenance management service module sends a transmission file, and the content of the transmission file is encrypted through an encryption machine;
the file ecological module provides a content identifier for the encrypted file content through a data model of a content addressable network, links the encrypted file content through a directed acyclic link technology, and then stores the encrypted file content in the file ecological module;
the block chaining, operation and maintenance management service module finds the encrypted file content through the distributed hash table, applies for file downloading to the file ecological module, the file uploading module performs authority verification on the application after receiving the application, the file downloading is completed if the application is passed, and the return is refused if the application is not passed.
2. The file management method based on block chaining operation and maintenance management as claimed in claim 1, wherein the step of implementing further comprises:
a distributed hash table is provided through a point-to-point node discovery protocol libp2p protocol to discover encrypted file contents, a block chaining operation and maintenance management service module linked with the encrypted file contents is linked, and the encrypted file is downloaded through a multiplexing link;
the stack is adopted to provide the connection identifier for the libp2p protocol, the DHT, the encrypted file content and the blockchain operation and maintenance management service module of the point-to-point node discovery protocol.
3. The method of claim 1, further comprising encrypting the content identifier of the file by using a symmetric encryption technique using an encryption engine, wherein the key is stored by the file upload module, and the encryption of the file content also uses the key.
4. The file management method based on block chaining operation and maintenance management as claimed in claim 1, wherein said file ecosystem module receives a file application download request from a block chaining operation and maintenance management service module, and the specific implementation steps include:
the block chaining operation and maintenance management service module uses a public key in the identity certificate to apply for the file ecological module, and the file ecological module responds to the file uploading module;
the file uploading module receives the application for applying the key, carries out authority verification on the application, encrypts the key of the file by using a public key of the block chaining operation and maintenance management service module through the encryption machine if the verification is passed, and directly returns the key to the block chaining operation and maintenance management service module;
the block chaining, operation and maintenance management service module decrypts the secret key of the file by using the private key, and downloads the file and decrypts the content of the file from the file ecological module.
5. The file management method based on blockchain operation and maintenance management according to claim 1 or 4, wherein the blockchain operation and maintenance management service module further provides an operation interface organized by users, the users include a file uploader and an applicant, and further includes an intelligent contract, the authority of the user request is verified, and the application key and the key return are triggered by monitoring a federation chain code event.
6. The file management method based on block chaining operation and maintenance management as claimed in claim 5, wherein said right checking specifically comprises: the block chaining, operation and maintenance management service module sends a key application request, the file uploading module calls a parameter configuration table of the file uploading module to verify data information corresponding to the key application request, if the information is matched, the next step is carried out, and if the information is not matched, the return is refused.
7. A file management system based on block chaining operation and maintenance management is characterized by comprising the following specific components:
the file ecological module: receiving a service starting request, receiving a transmission file sent by a block link operation and maintenance management service module, providing a content identifier for encrypted file content through a data model of a content addressable network, linking the encrypted file content through a directed acyclic link technology, linking the encrypted file content, and then storing the encrypted file;
an encryption machine: encrypting the contents of the transmission file of the file ecological module through an encryption machine;
the block link operation and maintenance management service module comprises: providing an operation interface of a user organization, wherein the user comprises a file uploader, an applicant and an intelligent contract, carrying out authority verification on a user request, and triggering application of a key and key return by monitoring a coalition chain code event; finding the encrypted file content through a distributed hash table, and applying for file downloading to a file ecosystem;
the file uploading module: and after receiving the application, carrying out authority verification on the file, if the file passes the verification, finishing file downloading, and if the file does not pass the verification, refusing to return.
8. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of one of claims 1 to 6.
9. A file management apparatus based on block chaining operation and maintenance management, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method steps of any one of claims 1 to 6 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210481763.7A CN114745198A (en) | 2022-05-05 | 2022-05-05 | File management method, system and device based on block chaining operation and maintenance management |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210481763.7A CN114745198A (en) | 2022-05-05 | 2022-05-05 | File management method, system and device based on block chaining operation and maintenance management |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114745198A true CN114745198A (en) | 2022-07-12 |
Family
ID=82285337
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210481763.7A Pending CN114745198A (en) | 2022-05-05 | 2022-05-05 | File management method, system and device based on block chaining operation and maintenance management |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114745198A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110417750A (en) * | 2019-07-09 | 2019-11-05 | 北京健网未来科技有限公司 | File based on block chain technology is read and method, terminal device and the storage medium of storage |
US20190347433A1 (en) * | 2017-01-03 | 2019-11-14 | University Of Stavanger | User controlled, decentralized, distributed, and secure content distribution |
CN111711611A (en) * | 2020-05-22 | 2020-09-25 | 易联众信息技术股份有限公司 | Data processing method, device, medium, equipment and application based on block chain |
CN113364735A (en) * | 2021-05-01 | 2021-09-07 | 西安电子科技大学 | Data cross-link access control method, system, equipment and terminal under multi-link scene |
CN113961535A (en) * | 2021-11-26 | 2022-01-21 | 北京航空航天大学 | A system and method for trusted storage and sharing of data based on blockchain |
CN114331648A (en) * | 2021-12-22 | 2022-04-12 | 国泰新点软件股份有限公司 | Bid file processing method, device, equipment and storage medium |
CN114363068A (en) * | 2022-01-05 | 2022-04-15 | 北京智云芯科技有限公司 | Image-text publishing method and device, electronic equipment and storage medium |
-
2022
- 2022-05-05 CN CN202210481763.7A patent/CN114745198A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190347433A1 (en) * | 2017-01-03 | 2019-11-14 | University Of Stavanger | User controlled, decentralized, distributed, and secure content distribution |
CN110417750A (en) * | 2019-07-09 | 2019-11-05 | 北京健网未来科技有限公司 | File based on block chain technology is read and method, terminal device and the storage medium of storage |
CN111711611A (en) * | 2020-05-22 | 2020-09-25 | 易联众信息技术股份有限公司 | Data processing method, device, medium, equipment and application based on block chain |
CN113364735A (en) * | 2021-05-01 | 2021-09-07 | 西安电子科技大学 | Data cross-link access control method, system, equipment and terminal under multi-link scene |
CN113961535A (en) * | 2021-11-26 | 2022-01-21 | 北京航空航天大学 | A system and method for trusted storage and sharing of data based on blockchain |
CN114331648A (en) * | 2021-12-22 | 2022-04-12 | 国泰新点软件股份有限公司 | Bid file processing method, device, equipment and storage medium |
CN114363068A (en) * | 2022-01-05 | 2022-04-15 | 北京智云芯科技有限公司 | Image-text publishing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111090875B (en) | Contract deployment method and device | |
CN108768988B (en) | Block chain access control method, block chain access control equipment and computer readable storage medium | |
CN108235806B (en) | Method, device and system for safely accessing block chain, storage medium and electronic equipment | |
CN113691597B (en) | Block chain contract deployment method, device, equipment and storage medium | |
RU2523216C2 (en) | File uploading method and system for web application | |
CN112686668A (en) | Alliance chain cross-chain system and method | |
CN105516110A (en) | Mobile equipment secure data transmission method | |
CN108418796A (en) | Method for integrity verification and associated deletion of multiple copies of cloud data, and cloud storage system | |
CN110995418A (en) | Cloud storage authentication method and system, edge computing server and user router | |
CN105450750A (en) | Secure interaction method for intelligent terminal | |
CN111901287B (en) | Method and device for providing encryption information for light application and intelligent equipment | |
CN110740038B (en) | Blockchain and communication method, gateway, communication system and storage medium thereof | |
CN111414647A (en) | Tamper-proof data sharing system and method based on block chain technology | |
CN112860791A (en) | Cross-network data synchronous control system, method and storage medium | |
CN110138765B (en) | Data processing method, data processing device, computer equipment and computer readable storage medium | |
CN115412568A (en) | Distributed data transmission method, device and system | |
US20230045486A1 (en) | Apparatus and Methods for Encrypted Communication | |
CN115086337B (en) | File processing method and device, storage medium and electronic equipment | |
CN112149184A (en) | Block chain external storage system and method based on time-limited access | |
Yang et al. | Protecting personal sensitive data security in the cloud with blockchain | |
CN114258006A (en) | Method, device and system for acquiring credential | |
JP7143744B2 (en) | Equipment integration system and update management system | |
EP3975015B9 (en) | Applet package sending method and device and computer readable medium | |
CN114745198A (en) | File management method, system and device based on block chaining operation and maintenance management | |
CN113114610A (en) | Stream taking method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |