Data tracing circulation method and system based on network trust
A circulation system and data technology, applied in the field of data communication, can solve problems such as weakened data timeliness, cumbersome requests from the demand side, and difficulties in the data aggregation process, and achieve the effects of improving efficiency, reducing pressure, and ensuring real-time performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] Please refer to figure 1 and Figure 5 , Embodiment 1 of the present invention is:
[0081] A data traceability circulation method based on network trust, comprising steps:
[0082] S1. The data circulation platform receives the data authorized party ( Figure 5 The authorized data item sent by the middle data generator) obtains the authorized data item set, and saves the authorized data item set in the interstellar file system, specifically:
[0083] Receive the authorized data item sent by the data authorizing party to obtain the authorized data item set, hash the authorized data item set and save it in the interstellar file system, and obtain the ID of each authorized data item in the described interstellar file system Hash ID;
[0084] storing the hash value identification, the name of the data authorizer, the sending time of the data packet including the set of authorized data items, and the digital certificate information of the data authorizer into a preset b...
Embodiment 2
[0106] Please refer to Figure 4 , the second embodiment of the present invention is:
[0107] Apply the above-mentioned data traceability circulation method based on network trust to actual scenarios:
[0108] In this embodiment, the data circulation platform includes a message center and an API gateway;
[0109] A message center corresponds to multiple edge nodes. In the case of multiple data circulation platforms:
[0110] S1. Each data circulation platform receives the authorized data item sent by its corresponding data authorizer to obtain a set of authorized data items, and saves the set of authorized data items in the interstellar file system, specifically:
[0111]Receive the authorized data item sent by the data authorizing party to obtain the authorized data item set, hash the authorized data item set and save it in the interstellar file system, and obtain the ID of each authorized data item in the described interstellar file system Hash ID;
[0112] Store the ha...
Embodiment 3
[0130] Please refer to figure 2 , the third embodiment of the present invention is:
[0131] A data traceability circulation system 3 based on network trust, including a data circulation platform 1 and an edge node 2, the data circulation platform 1 includes a first memory 1.2, a first processor 1.1 and stored in the first memory 1.2 and A first computer program operable on said first processor 1.1, said edge node 2 comprising a second memory 2.2, a second processor 2.1 and stored on said second memory 2.2 and operable on said second The second computer program running on the processor 2.1, when the first processor 1.1 executes the first computer program, implements the steps implemented by the data circulation platform in Embodiment 1 or Embodiment 2, and the second processor 2.1 Each step implemented by the edge node in Embodiment 1 or Embodiment 2 is realized when the second computer program is executed.
[0132] In summary, the present invention provides a data traceabi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


