Data transmission method and device and network node
A data transmission method and node technology, applied in the field of communication, can solve the problem that the interests of data or service providers cannot be truly protected, and achieve the effects of less transmission delay, improved security and reliability, and improved security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0190] Example 1
[0191] This embodiment uses intelligent sharing equipment and / or sharing big data as technical scenarios to illustrate the technical solutions of the present application. This application scenario is only an example for understanding the technical solutions of the present invention, and the present invention includes but is not limited to this. .
[0192] like image 3 As shown, the application scenario may include the following devices: node U1 (representing UE1), node N1 (representing Node1), node D (representing data source node Data source), one or more blockchains, each blockchain has It is composed of several blockchain nodes. In this embodiment, the above scenario is used as an example to illustrate the content of the invention, but the method provided in this embodiment includes but is not limited to the above scenario.
[0193] This embodiment provides a data access method, which specifically includes the following steps:
[0194] Step 301: A fir...
Example Embodiment
[0277] Embodiment 2
[0278] This embodiment provides a data transmission method, which can be used for a node that does not apply for data access for the first time, for example, a process in which the first node initiates data access to the blockchain network. This method may also be performed on the basis of Embodiment 1, that is, after the first node applies for accessing data for the first time, the first node in this embodiment initiates an access request for the same data. In addition, the method can also be executed independently, and the first node initiates a data access request to the blockchain node.
[0279] This embodiment is based on the method steps of the first node requesting access to data for the first time in the first embodiment, and describes in detail the request of the first node to access the same data.
[0280] First, according to the description of the first embodiment, the first blockchain is used to record the key information of the data. Specif...
Example Embodiment
[0340] Embodiment 3
[0341] This embodiment also provides a data transmission method, see Figure 5 , the method includes three parts of the process, namely part A, part B and part C, wherein the method in part A describes the process of the first node (U1) requesting access to the data, and the method in part B describes the second node (U2) requesting access to the data. The process, part C method describes the process of the third node (U3) requesting access to data.
[0342] Among them, these three parts of the method process can be executed independently, or combined in two, for example, part A and part B, part B and part C, or part A, part B and part C can be combined. This is not limited.
[0343] The method steps of each part of the process in this embodiment will be described and introduced below.
[0344] Part A Process
[0345] The method flow of Part A describes the process of the first node U1 requesting access to data.
[0346] Specifically, as Figure 5 s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap