Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain-based data sharing method, device and storage medium

A data sharing and blockchain technology, applied in the blockchain field, can solve the problems of large hardware and software investment, low efficiency, and inability to achieve safe and reliable data sharing, and achieve the effect of ensuring normal progress and ensuring safety and reliability.

Active Publication Date: 2019-11-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Nowadays, in many scenarios, there is a need for multi-agency cooperation and data trustworthiness and mutual recognition. For example, in traditional public service systems, multiple organizations need to cooperate to provide users with business processing services. These multiple organizations need mutual identity authentication. Only after the certification is passed will the sponsor handle relevant business. During the business process, the sponsor needs to issue various certification materials back and forth between multiple agencies, and submit various materials repeatedly. The bidding process is very complicated and inefficient. This is mainly because of the inability to securely and reliably share data among multiple institutions
[0003] At present, in order to improve the efficiency and simplify the process in the traditional public service system, an identity authentication center is configured among various institutions to realize identity authentication and realize data sharing. However, the independent storage and management of data between institutions must ensure its security, and the investment in hardware and software is huge. Even so, it is difficult to prevent external or internal factors from tampering with existing data in practical applications, and data tampering will directly affect business processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based data sharing method, device and storage medium
  • Blockchain-based data sharing method, device and storage medium
  • Blockchain-based data sharing method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0055] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain-based data sharing method. The method comprises the steps of obtaining a login password input by a login user, post-validation, generating an identity certificateof the login user according to the identity information of the login user and the first digital signature, sending an identity certificate of the login user to the client, receiving an acquisition request message sent by a second node device in the blockchain after passing the authentication of the identity certificate, and performing signature verification on the second digital signature, and after the verification is passed, sending an acquisition response message to the second node device, the acquisition response message comprising a target file matched with the target file identifier anda blockchain address of the target file. In this way, the second node device can obtain the file evidence of the target file according to the block chain address, and the validity of the target file is verified accordingly. On one hand, identity authentication between mechanisms is realized based on the blockchain, and on the other hand, the safety and reliability of the data sharing process are ensured based on the tamper-proof performance of the blockchain, thereby ensuring the normal progress of the service.

Description

technical field [0001] The present application relates to the technical field of block chain, and in particular to a data sharing method, device and storage medium based on block chain. Background technique [0002] Nowadays, in many scenarios, there is a need for multi-agency cooperation and data trustworthiness and mutual recognition. For example, in traditional public service systems, multiple organizations need to cooperate to provide users with business processing services. These multiple organizations need mutual identity authentication. Only after the certification is passed will the sponsor handle relevant business. During the business process, the sponsor needs to issue various certification materials back and forth between multiple agencies, and submit various materials repeatedly. The bidding process is very complicated and inefficient. This is mainly Because of the inability to achieve safe and reliable data sharing among multiple institutions. [0003] At prese...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/321H04L9/3247H04L63/0815H04L63/083H04L63/0876H04L67/104
Inventor 王强申子熹
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products