A data isolation method in alliance chain and corresponding alliance chain system
A technology of data isolation and alliance, applied in the field of blockchain
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.
[0045] see figure 1 , provides a data isolation method in a consortium chain according to an embodiment of the present invention, wherein the consortium chain includes a plurality of nodes, and each node includes a complete main chain, authorization chain and local data pool. The data isolation method in the consortium chain includes: S1, when the node uploads the original data to the chain, it encrypts the original data and stores it in the local data pool; S2, when the encrypted data is successfully stored in the local data pool, the node encrypts the original data Perform a hash operation, and store the hash value obtained after the operation in the main chain of all n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


