CN109145651A - A kind of data processing method and device - Google Patents
A kind of data processing method and device Download PDFInfo
- Publication number
- CN109145651A CN109145651A CN201810959037.5A CN201810959037A CN109145651A CN 109145651 A CN109145651 A CN 109145651A CN 201810959037 A CN201810959037 A CN 201810959037A CN 109145651 A CN109145651 A CN 109145651A
- Authority
- CN
- China
- Prior art keywords
- user data
- user
- terminal
- data block
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6272—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
Abstract
The embodiment of the invention discloses a kind of data processing method and devices, wherein method includes: the user data Block status for obtaining each terminal in terminal set, target terminal is selected from terminal set according to the user data Block status, and user data block chain is generated according to the user data block in the target terminal;The user data block chain is stored, and the user data block chain is issued into each terminal in the terminal set;In the data verification request for receiving requesting terminal, verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain according to data verification request;Initial Hash value is matched with the verifying cryptographic Hash, and determines the integrality of the user data according to matching result, can the integrality to user data effectively verified.
Description
Technical field
The present invention relates to computer technology more particularly to a kind of data processing method and devices.
Background technique
With the continuous development of computer, can decentralization, open and clear block chain technology also obtained flourishing hair
Exhibition.
Currently, participating in the terminal (such as smart phone, tablet computer, laptop etc.) or service of record user data
One or more user data of generation can be packaged into a user data block by device, then with another user data area
Block is engaged togather, and forms new user data block.One user data block is ined succession a user data block, thus shape
At user data block chain.
However, when whether terminal is wanted to verify the user data in user data block chain and modified, how to user
The integrality of the corresponding user data of data block chain, which carries out effectively verifying, becomes a urgent problem to be solved.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that provide a kind of data processing method and device, can to
The integrality of user data is effectively verified.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of data processing method and devices, comprising:
Obtain terminal set in each terminal user data Block status, according to the user data Block status from
Target terminal is selected in terminal set, and user data block is generated according to the user data block in the target terminal
Chain;The user data block chain is stored, and the user data block chain is issued into each terminal in the terminal set;
In the data verification request for receiving requesting terminal, requested according to the data verification to the user data area
Verifying cryptographic Hash is calculated in the corresponding user data of block chain, and the data verification request is the first definitive result of requests verification
Request, first definitive result are the result for the integrality that the requesting terminal determines the user data;
Initial Hash value is matched with the verifying cryptographic Hash, and the user data is determined according to matching result
Integrality, for the integrality for indicating whether the user data is modified, the initial Hash value is the user data
Cryptographic Hash in block chain.
Wherein, after the integrality that the user data is determined according to matching result, further includes:
The integrality for the user data determined and first definitive result are compared, it is true with determination described first
Determine the correctness of result;
It sends a notification message to the requesting terminal, the notification message includes the correct of determining first definitive result
The result of property.
Wherein, the corresponding user data of the user data block chain, includes at least: the first user data and the second use
User data, the second user data and first user data have relevance;
The described corresponding user data of the user data block chain is calculated according to data verification request is tested
Cryptographic Hash is demonstrate,proved, is specifically included:
The first cryptographic Hash is calculated according to the first user data in the user data block chain;
According in the user data block chain second user data and first cryptographic Hash verifying is calculated
Cryptographic Hash.
It is wherein, described after the data verification for receiving requesting terminal request, further includes:
The corresponding user information in the requesting terminal is obtained, the user that requesting terminal is included at least in the user information marks
Know;
Storage assembly is called to obtain the corresponding peace of user identifier for the requesting terminal being stored in the storage assembly
Full information;
If the corresponding security information of the user identifier of the requesting terminal meets preset condition, execute according to the data
Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain in checking request.
Wherein, the method also includes: obtain the user identifier of each user data in the target terminal, and determine
The corresponding job information of user identifier of each user data;
The corresponding ability rating of user identifier of each user data is determined according to the job information;
If the ability rating of the user identifier is within a preset range, the ability rating is being received in preset range
When the recommendation information of interior user identifier, the corresponding content of the recommendation information is executed.
Correspondingly, the embodiment of the invention also provides a kind of data processing equipments, comprising:
Processing module, for obtaining the user data Block status of each terminal in terminal set, according to the user
Data block state selects target terminal from terminal set, and is generated according to the user data block in the target terminal
User data block chain stores the user data block chain;
Communication module, for the user data block chain to be issued to each terminal in the terminal set;
Computing module, for receive requesting terminal data verification request when, according to the data verification request pair
Verifying cryptographic Hash is calculated in the corresponding user data of the user data block chain, and the data verification request is requests verification
The request of first definitive result, first definitive result are the knot for the integrality that the requesting terminal determines the user data
Fruit;
First determining module, for matching initial Hash value with the verifying cryptographic Hash, and according to matching result
Determine the integrality of the user data, the integrality is for indicating whether the user data is modified, the initial Kazakhstan
Uncommon value is the cryptographic Hash in the user data block chain.
Wherein, described device further include: the second determining module, for by the integrality for the user data determined with it is described
First definitive result compares, with the correctness of determination first definitive result;
Wherein, the communication module is also used to send a notification message to the requesting terminal, and the notification message includes true
The result of the correctness of fixed first definitive result.
Wherein, the corresponding user data of the user data block chain, includes at least: the first user data and the second use
User data, the second user data and first user data have relevance;
The computing module, specifically for being calculated according to the first user data in the user data block chain
One cryptographic Hash, according in the user data block chain second user data and first cryptographic Hash verifying is calculated
Cryptographic Hash.
Wherein, described device further include: module is obtained, it is described for obtaining the corresponding user information in the requesting terminal
The user identifier of requesting terminal is included at least in user information, and storage assembly acquisition is called to be stored in the storage assembly
The corresponding security information of the user identifier of the requesting terminal, if the corresponding security information of the user identifier of the requesting terminal is full
Sufficient preset condition is then executed by the computing module corresponding to the user data block chain according to data verification request
User data verifying cryptographic Hash is calculated.
Wherein, described device further include: third determining module, for obtaining each user data in the target terminal
User identifier, and determine the corresponding job information of user identifier of each user data, it is true according to the job information
The corresponding ability rating of user identifier of fixed each user data;
Execution module is receiving the ability if the ability rating for the user identifier is within a preset range
When the recommendation information of the user identifier of grade within a preset range, the corresponding content of the recommendation information is executed.
The implementation of the embodiments of the present invention has the following beneficial effects: user data block chain is generated by choosing target terminal,
Then the user data block chain is stored and is sent to each terminal in terminal set, receive requesting terminal
When data verification is requested, verifying is calculated to the corresponding user data of user data block chain according to data verification request
Initial Hash value is finally matched with the verifying cryptographic Hash, and determines the user data according to matching result by cryptographic Hash
Integrality, can use cryptographic Hash, the integrality of the corresponding user data of user data block chain effectively verified.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of data processing method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another data processing method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawing, the embodiment of the present invention is described.Based on the embodiments of the present invention, this field is common
Technical staff's every other embodiment obtained without creative efforts belongs to the model that the present invention protects
It encloses.
It should be noted that the executing subject of the embodiment of the present invention can be various types of terminals or server, terminal
Such as it can be smart phone, tablet computer, wearable device, computer, personal digital assistant (English: Personal
Digital Assistant, abbreviation: PDA), mobile internet device (English: Mobile Internet Device, abbreviation:
) etc. MID the terminal of data processing can be carried out, server for example can be text server, database server etc. and can be counted
According to the server of processing, the present invention is not intended to be limited in any this.
Wherein, for ease of description, it is further explained so that executing subject is server as an example in following methods embodiment
It states.
It referring to Figure 1, is that the embodiment of the present invention provides a kind of flow diagram of data processing method, as shown in Figure 1
Data processing method can include:
S101, obtain terminal set in each terminal user data Block status, according to the user data block
State selects target terminal from terminal set, and generates user data according to the user data block in the target terminal
Block chain.
It should be noted that the terminal set can be the terminal set for participating in record user data.In the terminal set
Each terminal, can store and record the user data.
It should be noted the user data Block status, can be server according to each in the terminal set
Terminal generates the parameters such as the speed, accuracy, error rate of the user data block, which can be used to divide
The each terminal being precipitated records the record quality of the user data block.
In some possible embodiments, which can generate each terminal the speed of the user data block
As the user data Block status.Specifically, the server can according near slow sequence in the terminal set
The speed that each terminal generates the user data block is ranked up, and is then chosen and is generated the fastest of the user data block
Corresponding terminal be target terminal.
In some possible embodiments, which can also generate each terminal the user data block just
Then true rate or error rate generate the number of users according to each terminal in the terminal set as the user data Block status
It is ranked up according to the accuracy or error rate of block, then chooses target terminal according to ranking results.
In some possible embodiments, which can also generate the use for each terminal in the terminal set
The generation quality that speed, accuracy, the error rate comprehensive analysis of user data block go out, as the user data Block status.
Certainly, aforesaid way is only illustrated, and non exhaustive, including but not limited to above-mentioned optional way.
It should be noted the user data block, can be the target terminal one generated in a period of time
Or the block that multiple user data are packaged into.
In the specific implementation, the server can obtain after selecting target terminal according to the user data Block status
The user data block in the target terminal is taken, which can be to be multiple, which can be according to time elder generation
Each user data block is associated by sequence afterwards, and generates the user data block chain.
S102, the storage user data block chain, and the user data block chain is issued in the terminal set
Each terminal.
It should be noted that the server can be after generating the user data block chain, by the user data block
Chain is stored in the storage assembly of the server.Further, which can also issue end for the user data block chain
Each terminal in set is held, each terminal in the terminal set can use the user data block chain to the user data
The integrality of the data of block chain is verified.
S103, receive requesting terminal data verification request when, according to the data verification request to the user
Verifying cryptographic Hash is calculated in the corresponding user data of data block chain.
Wherein, the data verification request is the request of the first definitive result of requests verification, and first definitive result is
The requesting terminal determines the result of the integrality of the user data.
In the specific implementation, the requesting terminal can be one of them of each terminal in the terminal set, alternatively, this is asked
Terminal is asked to be also possible to receive the user data block chain by any one terminal of each terminal in the terminal set
Terminal, alternatively, the requesting terminal is also possible to any other terminal, the embodiment of the present invention is not intended to be limited in any this.
In some possible embodiments, which can be according to the user data block chain to the user data
User data in block chain carries out integrity verification.
Specifically, the verifying cryptographic Hash of terminal side can be calculated in the user data by the requesting terminal, and can incite somebody to action
The verifying cryptographic Hash of the terminal side is matched with the initial Hash value in user data block chain, if matching result indicates to be somebody's turn to do
The verifying cryptographic Hash of terminal side is identical as the initial Hash value, which can generate the first definitive result, this first
Definitive result can be to determine that the integrality of the user data is the result that the user data is not modified.
Wherein, if matching result indicates that the verifying cryptographic Hash of the terminal side and the initial Hash value be not identical, the request
Terminal can generate the first definitive result, which can be to determine that the integrality of the user data is the user
The result that data are modified.
It in some possible embodiments, can be to the clothes after which generates first definitive result
Whether device requests verification first definitive result of being engaged in is correct.It is tested specifically, the requesting terminal can send data to the server
Card is requested, and may include first definitive result in data verification request, which may include terminal side
Verify cryptographic Hash.
In some possible embodiments, which, can be in the data verification request for receiving requesting terminal
The corresponding user data of user data block chain in the server is calculated according to data verification request, is serviced
The verifying cryptographic Hash of device side.
S104, initial Hash value is matched with the verifying cryptographic Hash, and the user is determined according to matching result
The integrality of data.
Wherein, for the integrality for indicating whether the user data is modified, the initial Hash value is the use
Cryptographic Hash in user data block chain.
It should be noted that the initial Hash value can be the cryptographic Hash in the user data block chain.The server can
User data area can be generated simultaneously when generating user data block chain according to the user data block in the target terminal
Cryptographic Hash corresponding to the user data of block chain, and cryptographic Hash corresponding to the user data is added to the user data area
In block chain.
In some possible embodiments, which carries out matched tool for initial Hash value and the verifying cryptographic Hash
Body mode may is that the server determines whether the initial Hash value and the verifying cryptographic Hash are identical.
Further, if matching result is that the server determines that the initial Hash value is identical as the verifying cryptographic Hash, that
The server may further determine that the integrality of the user data is that the user data is not modified.If matching result is
It is different from the verifying cryptographic Hash that the server determines the initial Hash value, then the server may further determine that the number of users
According to integrality be the user data modified.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention
Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal
When, verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request, finally
Initial Hash value is matched with the verifying cryptographic Hash, and determines the integrality of the user data according to matching result, it can
To utilize cryptographic Hash, the integrality of the corresponding user data of user data block chain is effectively verified.
Referring to Fig. 2, for the flow diagram of another data processing method provided in an embodiment of the present invention.Such as Fig. 2 institute
The data processing method shown, it may include:
S201, obtain terminal set in each terminal user data Block status, according to the user data block
State selects target terminal from terminal set, and generates user data according to the user data block in the target terminal
Block chain.
Optionally, which can also obtain the user identifier of each user data in the target terminal, and really
The corresponding job information of user identifier of fixed each user data;Each number of users is determined according to the job information
According to the corresponding ability rating of user identifier;If the ability rating of the user identifier is within a preset range, receiving
When stating the recommendation information of the user identifier of ability rating within a preset range, the corresponding content of the recommendation information is executed.
It should be noted that the user identifier can be address name, user account, the identity ID of user, user's head portrait
Etc., the embodiment of the present invention is not intended to be limited in any this.
It wherein, may include the corresponding user data of multiple user identifiers in the target terminal.For example, user data 1 can
To indicate the corresponding data of user identifier A, user data 2 can indicate corresponding data of user data B etc..
It should also be noted that, the job information for example can be the corresponding work of workload, working strength, user identifier
Processing speed etc., the embodiment of the present invention is not intended to be limited in any this.
For example, which can obtain the same of the user data Block status of each terminal in terminal set
When, obtain the corresponding user identifier of each user data in the target terminal, the corresponding user identifier A of user data 1, number of users
According to 2 corresponding user identifier B, the corresponding user identifier C of user data 3.The terminal can record user identifier A, Yong Hubiao in advance
Know B and the corresponding job information of user identifier C (for example, workload).
Wherein, the corresponding workload of user identifier A is, for example, 50, and the corresponding workload of user identifier B is, for example, 20,
The corresponding workload of user identifier C is, for example, 70.If the server presets the workload in the user identifier of 0-20,
Corresponding ability rating is a, and the workload is in the user identifier of 21-50, and corresponding ability rating is b, and the workload is 51
And its above user identifier, corresponding ability rating is c, then the corresponding ability rating of user identifier A is b, the use
It is a that family, which identifies the corresponding ability rating of B, and the corresponding ability rating of user identifier C is c.
Further, the preset range of the ability rating can be b and its ratings above.Therefore, which can be true
Fixed user identifier A and user identifier C is the user identifier of the ability rating within a preset range.
Further, if the server receives user identifier A or user identifier C issues the recommendation of the server
When information (such as data refresh mode, data verification mode etc.), it is corresponding that the recommendation information can be executed according to the recommendation information
Content (such as being adjusted the data refresh mode of the server according to the data refresh mode of recommendation).
In some possible embodiments, which it is corresponding can also to receive user identifier A or user identifier C
User data when, if the user data is to need the data that are executed by the server, which can directly be held
Row user identifier A or the corresponding user data of user identifier C.
S202, the storage user data block chain, and the user data block chain is issued in the terminal set
Each terminal.
It should be noted that the S202 step in the embodiment of the present invention can be according to the S102 step in above method embodiment
It realizes, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
S203, receive requesting terminal data verification request when, obtain the corresponding user information in the requesting terminal.
Wherein, the user identifier of requesting terminal is included at least in the user information.
Wherein, data verification request is the request of the first definitive result of requests verification, and first definitive result is institute
State the result that requesting terminal determines the integrality of the user data.
It should be noted that the corresponding user information in the requesting terminal, the user that can include at least the requesting terminal is marked
Know.Alternatively, the user information can also include amount of user data, size etc. of the requesting terminal in the server, this hair
It is bright to this with no restriction.
In some possible embodiments, which can be in the data verification request for receiving requesting terminal transmission
When, according to the user data of the data verification request requesting terminal.And use of the requesting terminal in the server
Amount data bulk, size etc..
S204, the user identifier for calling storage assembly to obtain the requesting terminal being stored in the storage assembly are corresponding
Security information.
It should be noted that the storage assembly can be the storage medium of server special secondary school for storing data.
It should also be noted that, the corresponding security information of the user identifier of the requesting terminal can be stored in advance in the service
In the storage assembly of device, which can determine whether the data verification request of the requesting terminal is non-according to the security information
Method request.
Wherein, the security information can be for determine the requesting terminal whether be the server authentication security terminal
Information etc..
If the corresponding security information of the user identifier of S205, the requesting terminal meets preset condition, according to the number
Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain according to checking request.
It for example, may include the security key of the requesting terminal in the security information, which can be should
The safety certification of server itself.If the server can pass through the server itself according to the security key of the requesting terminal
Safety certification, then the server can determine the requesting terminal be safety terminal.
In some possible embodiments, the server determine the requesting terminal be safety terminal after,
The verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request.
Wherein, if it is safe terminal that the server, which determines the requesting terminal not, which can not be to this
The corresponding user data of user data block chain makees any processing, wherein the server can also be sent to the requesting terminal should
The unverified notification message in requesting terminal.
Optionally, the corresponding user data of the user data block chain, includes at least: the first user data and second
User data, the second user data and first user data have relevance.
It should be noted that the relevance that the second user data and first user data have can be time sequencing
On relevance.For example, first user data is time forward data, which is time rearward suitable
Sequence.
It should be noted that the user data can also include third user data, fourth user data etc., when having
When 2 or more user data, processing method can be similar to processing method when 2 user data, the embodiment of the present invention pair
This is not intended to be limited in any.
Optionally, described that the corresponding user data of the user data block chain is calculated according to data verification request
It is verified cryptographic Hash, is specifically included: the first Kazakhstan is calculated according to the first user data in the user data block chain
Uncommon value;According in the user data block chain second user data and first cryptographic Hash verifying Hash is calculated
Value.
In some possible embodiments, the data which can be forward for the time, the second user
Data can be the data of time rearward.Correspondence can be calculated using hash algorithm in first user data by the server
The first cryptographic Hash, then the server can be calculated corresponding second using hash algorithm according to the second user data
Then cryptographic Hash generates the verifying cryptographic Hash according to first cryptographic Hash and the second cryptographic Hash.
In some possible embodiments, which can also be calculated first user data using hash algorithm
Corresponding first cryptographic Hash is obtained, then the server can pass through Kazakhstan according to the second user data and first cryptographic Hash
Uncommon algorithm obtains the verifying cryptographic Hash.
S206, initial Hash value is matched with the verifying cryptographic Hash, and the user is determined according to matching result
The integrality of data.
It should be noted that the S206 step in the embodiment of the present invention can be according to the S104 step in above method embodiment
It realizes, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
S207, the integrality for the user data determined and first definitive result are compared, described in determination
The correctness of first definitive result.
Wherein, first definitive result is the result for the integrality that the requesting terminal determines the user data.
In some possible embodiments, which can determine that the integrality of the user data is the user data
Do not modified, if first definitive result is also that the user data is not modified, the server can determine this
One definitive result is correct.Alternatively, the server can determine that the integrality of the user data is that the user data is modified,
If first definitive result is also that the user data is modified, which can determine first definitive result
It is correct.
In some possible embodiments, which can determine that the integrality of the user data is the user data
Do not modified, if first definitive result is also that the user data is modified, the server can determine this first
Definitive result is wrong.Alternatively, the server can determine that the integrality of the user data is that the user data is modified, such as
Fruit first definitive result is also that the user data is not modified, then the server can determine first definitive result
It is wrong.
S208, it sends a notification message to the requesting terminal.
Wherein, the notification message includes the result of the correctness of determining first definitive result.
In the specific implementation, the server can be after the correctness for determining first definitive result, to the requesting terminal
Send the notification message.Wherein it is determined that the correctness of first definitive result can be two kinds: first definitive result is correct,
Or the first definitive result mistake.
Wherein, if first definitive result is correct, which can be for for notifying first determination
As a result correct message.If the first definitive result mistake, the notification message can with for for notify this first really
Determine the message of result mistake.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention
Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal
When, if the security information of the user identifier of the requesting terminal meets preset condition, requested according to the data verification to the use
Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, finally by initial Hash value and the verifying cryptographic Hash into
Row matches, and the integrality of the user data is determined according to matching result, and the definitive result is finally sent to request end
End, can use cryptographic Hash, is effectively verified to the integrality of the corresponding user data of user data block chain, and will verifying
Result afterwards issues the requesting terminal, and the requesting terminal is helped to determine the correctness of the definitive result of itself, strengthens request eventually
Hold the confidence level of the definitive result of itself.
The following is an embodiment of the apparatus of the present invention, apparatus of the present invention embodiment for execute the method for the present invention first embodiment and
The method that second embodiment is realized illustrates only the relevant part of the embodiment of the present invention, does not disclose specifically for ease of description
Part please refers to first embodiment of the invention to second embodiment.
Referring to Fig. 3, being a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention.As shown in Figure 3
Device, may include:
Processing module 301, for obtaining the user data Block status of each terminal in terminal set, according to the use
User data Block status selects target terminal from terminal set, and raw according to the user data block in the target terminal
At user data block chain, the user data block chain is stored.
Communication module 302, for the user data block chain to be issued to each terminal in the terminal set.
Computing module 303, for being requested according to the data verification in the data verification request for receiving requesting terminal
Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain, the data verification request is tested for request
The request of the first definitive result is demonstrate,proved, first definitive result is the integrality that the requesting terminal determines the user data
As a result.
First determining module 304 is tied for matching initial Hash value with the verifying cryptographic Hash, and according to matching
Fruit determines the integrality of the user data, and the integrality is described initial for indicating whether the user data is modified
Cryptographic Hash is the cryptographic Hash in the user data block chain.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention
Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal
When, verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request, finally
Initial Hash value is matched with the verifying cryptographic Hash, and determines the integrality of the user data according to matching result, it can
To utilize cryptographic Hash, the integrality of the corresponding user data of user data block chain is effectively verified.
Referring to Fig. 4, for the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention.Such as Fig. 4 institute
The device shown may include:
Processing module 401, for obtaining the user data Block status of each terminal in terminal set, according to the use
User data Block status selects target terminal from terminal set, and raw according to the user data block in the target terminal
At user data block chain, the user data block chain is stored.
Communication module 402, for the user data block chain to be issued to each terminal in the terminal set;
Computing module 403, for being requested according to the data verification in the data verification request for receiving requesting terminal
Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain, the data verification request is tested for request
The request of the first definitive result is demonstrate,proved, first definitive result is the integrality that the requesting terminal determines the user data
As a result.
First determining module 404 is tied for matching initial Hash value with the verifying cryptographic Hash, and according to matching
Fruit determines the integrality of the user data, and the integrality is described initial for indicating whether the user data is modified
Cryptographic Hash is the cryptographic Hash in the user data block chain.
Optionally, described device further include: the second determining module 405, for by the integrality for the user data determined
It is compared with first definitive result, with the correctness of determination first definitive result.
Wherein, the usual module 402 is also used to send a notification message to the requesting terminal, the notification message packet
Include the result for determining the correctness of first definitive result.
Optionally, the corresponding user data of the user data block chain, includes at least: the first user data and second
User data, the second user data and first user data have relevance.
The computing module 403, specifically for being calculated according to the first user data in the user data block chain
To the first cryptographic Hash, according in the user data block chain second user data and first cryptographic Hash be calculated
Verify cryptographic Hash.
Optionally, described device further include: module 406 is obtained, for obtaining the corresponding user information in the requesting terminal,
The user identifier of requesting terminal is included at least in the user information, and storage assembly acquisition is called to be stored in the storage assembly
In the requesting terminal the corresponding security information of user identifier, if the user identifier of the requesting terminal it is corresponding safety letter
Breath meets preset condition, then is executed by the computing module 403 and requested according to the data verification to the user data area
Verifying cryptographic Hash is calculated in the corresponding user data of block chain.
Optionally, described device further include: third determining module 407, for obtaining each use in the target terminal
The user identifier of user data, and determine the corresponding job information of user identifier of each user data, according to the work
Information determines the corresponding ability rating of user identifier of each user data.
Execution module 408 is receiving the energy if the ability rating for the user identifier is within a preset range
When the recommendation information of the user identifier of power grade within a preset range, the corresponding content of the recommendation information is executed.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention
Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal
When, if the security information of the user identifier of the requesting terminal meets preset condition, requested according to the data verification to the use
Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, finally by initial Hash value and the verifying cryptographic Hash into
Row matches, and the integrality of the user data is determined according to matching result, and the definitive result is finally sent to request end
End, can use cryptographic Hash, is effectively verified to the integrality of the corresponding user data of user data block chain, and will verifying
Result afterwards issues the requesting terminal, and the requesting terminal is helped to determine the correctness of the definitive result of itself, strengthens request eventually
Hold the confidence level of the definitive result of itself.
Referring to Fig. 5, being the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention.Wherein, should
Data processing equipment can be server or terminal.
As shown in figure 5, the data processing equipment in the embodiment of the present invention includes: at least one input equipment 1000;At least
One processor 2000, such as CPU;At least one processor 3000;At least one output equipment 4000, above-mentioned input equipment
1000, processor 2000, memory 3000 are connected with output equipment 4000 by bus.Wherein, bus is for realizing these groups
Connection communication between part.Wherein, the input equipment 1000 of device and output equipment 4000 can be in the embodiment of the present invention
Line sending port, or wireless device, for example including antenna assembly, for carrying out signaling or data with other node devices
Communication.
The processor 2000 can be central processing unit 2000 (central processing unit, CPU), at network
Manage the combination of device 2000 (network processor, NP) or CPU and NP.
The processor 2000 can further include hardware chip.Above-mentioned hardware chip can be specific integrated circuit
(application-specific integrated circuit, ASIC), programmable logic device (programmable
Logic device, PLD) or combinations thereof.Above-mentioned PLD can be Complex Programmable Logic Devices (complex
Programmable logic device, CPLD), field programmable gate array (field-programmable gate
Array, FPGA), Universal Array Logic (generic array logic, GAL) or any combination thereof.
The memory 3000 may include volatile memory 3000 (volatile memory), such as arbitrary access is deposited
Reservoir 3000 (random-access memory, RAM);Memory 3000 also may include nonvolatile memory 3000
(non-volatile memory), such as flash memory 3000 (flash memory), hard disk (hard disk drive,
) or solid state hard disk (solid-state drive, SSD) HDD;Memory 3000703 can also include the memory of mentioned kind
3000 combination.
Optionally, which is also used to store program instruction.The processor 2000 can call the memory
The program instruction of 3000 storages, realizes the method as shown in first embodiment of the invention, second embodiment.
The bus can be Peripheral Component Interconnect standard (peripheral component interconnect, abbreviation
PCI) bus or expanding the industrial standard structure (extended industry standard architecture, abbreviation EISA)
Bus etc..The bus can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, in Fig. 5 only with one slightly
Line indicates, it is not intended that an only bus or a type of bus.
Specifically, processor 2000, the user of each terminal in terminal set is obtained for controlling input equipment 1000
Data block state selects target terminal according to the user data Block status from terminal set, and according to target end
User data block in end generates user data block chain.
Memory 3000, for storing the user data block chain.
Output equipment 4000, for the user data block chain to be issued to each terminal in the terminal set.
The processor 2000 is also used to when the input equipment 1000 receives the data verification request of requesting terminal, root
Verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request;By initial Hash
Value is matched with the verifying cryptographic Hash, and the integrality of the user data is determined according to matching result.
Wherein, data verification request is the request of the first definitive result of requests verification, which asks for this
Terminal is asked to determine the result of the integrality of the user data.
Wherein, for the integrality for indicating whether the user data is modified, which is the user data area
Cryptographic Hash in block chain.
Optionally, the processor 2000, the integrality for the user data for being also used to determine and first definitive result
It compares, to determine the correctness of first definitive result.
Wherein, the output equipment 4000, for sending a notification message to the requesting terminal, which includes determining to be somebody's turn to do
The result of the correctness of first definitive result.
Optionally, the corresponding user data of user data block chain, includes at least: the first user data and the second use
User data, the second user data and first user data have relevance.
Optionally, processor 2000, specifically for being calculated according to the first user data in the user data block chain
Obtain the first cryptographic Hash;According in the user data block chain second user data and first cryptographic Hash be calculated and test
Demonstrate,prove cryptographic Hash.
Optionally, the processor 2000 is also used to control the input equipment 1000 and obtains the corresponding user in the requesting terminal
Information includes at least the user identifier of requesting terminal in the user information;Storage assembly acquisition in control memory 3000 is deposited
Store up the corresponding security information of user identifier of the requesting terminal in the storage assembly;If the user identifier pair of the requesting terminal
The security information answered meets preset condition, then executes and requested according to the data verification to the corresponding user of the user data block chain
Verifying cryptographic Hash is calculated in data.
Optionally, the processor 2000 is also used to obtain the user identifier of each user data in the target terminal, and
It determines the corresponding job information of the user identifier of each user data, which is determined according to the job information
The corresponding ability rating of user identifier connects if the ability rating of the user identifier is within a preset range in input equipment 1000
When receiving the recommendation information of the user identifier of the ability rating within a preset range, the corresponding content of the recommendation information is executed.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention
Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal
When, if the security information of the user identifier of the requesting terminal meets preset condition, requested according to the data verification to the use
Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, finally by initial Hash value and the verifying cryptographic Hash into
Row matches, and the integrality of the user data is determined according to matching result, and the definitive result is finally sent to request end
End, can use cryptographic Hash, is effectively verified to the integrality of the corresponding user data of user data block chain, and will verifying
Result afterwards issues the requesting terminal, and the requesting terminal is helped to determine the correctness of the definitive result of itself, strengthens request eventually
Hold the confidence level of the definitive result of itself.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program and may be implemented when the computer program is executed by processor: obtaining each in terminal set
The user data Block status of terminal selects target terminal from terminal set according to the user data Block status, and
User data block chain is generated according to the user data block in the target terminal;The user data block chain is stored, and
The user data block chain is issued into each terminal in the terminal set;It is asked in the data verification for receiving requesting terminal
When asking, verifying Hash is calculated to the corresponding user data of the user data block chain according to data verification request
Value, the data verification request are the request of the first definitive result of requests verification, and first definitive result is that the request is whole
End determines the result of the integrality of the user data;Initial Hash value is matched with the verifying cryptographic Hash, and according to
Matching result determines the integrality of the user data, and the integrality is for indicating whether the user data is modified, institute
Stating initial Hash value is the cryptographic Hash in the user data block chain.
It should be noted that the detailed process that the computer readable storage medium is executed by processor can be found in the first implementation
Method described in example and second embodiment, details are not described herein.
The computer readable storage medium can be the internal storage unit of terminal described in aforementioned any embodiment, example
Such as the hard disk or memory of terminal.The computer readable storage medium is also possible to the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer readable storage medium can also be wrapped both
The internal storage unit for including the terminal also includes External memory equipment.The computer readable storage medium is described for storing
Other programs and data needed for computer program and the terminal.The computer readable storage medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The above disclosure is only one embodiment of the present invention, cannot limit the right model of the present invention with this certainly
It encloses, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and wants according to right of the present invention
Made equivalent variations is sought, the range that the present invention is covered is still fallen within.
Claims (10)
1. a kind of data processing method characterized by comprising
The user data Block status for obtaining each terminal in terminal set, according to the user data Block status from terminal
Target terminal is selected in set, and user data block chain is generated according to the user data block in the target terminal;It deposits
The user data block chain is stored up, and the user data block chain is issued into each terminal in the terminal set;
In the data verification request for receiving requesting terminal, requested according to the data verification to the user data block chain
Verifying cryptographic Hash is calculated in corresponding user data;
Initial Hash value is matched with the verifying cryptographic Hash, and the complete of the user data is determined according to matching result
Property, for the integrality for indicating whether the user data is modified, the initial Hash value is the user data block
Cryptographic Hash in chain.
2. the method as described in claim 1, which is characterized in that the data verification request determines knot for requests verification first
Fruit, first definitive result are the result for the integrality that the requesting terminal determines the user data;
After the integrality for determining the user data according to matching result, further includes:
The integrality for the user data determined and first definitive result are compared, knot is determined with determination described first
The correctness of fruit;
It sends a notification message to the requesting terminal, the notification message includes the correctness of determining first definitive result
As a result.
3. the method as described in claim 1, which is characterized in that the corresponding user data of the user data block chain, at least
It include: the first user data and second user data, the second user data have with first user data to be associated with
Property;
It is described that verifying Kazakhstan is calculated to the corresponding user data of the user data block chain according to data verification request
Uncommon value, specifically includes:
The first cryptographic Hash is calculated according to the first user data in the user data block chain;
According in the user data block chain second user data and first cryptographic Hash verifying Hash is calculated
Value.
4. method as described in any one of claims 1 to 3, which is characterized in that described to be tested in the data for receiving requesting terminal
After card request, further includes:
The corresponding user information in the requesting terminal is obtained, the user identifier of requesting terminal is included at least in the user information;
Storage assembly is called to obtain the corresponding safety letter of user identifier for the requesting terminal being stored in the storage assembly
Breath;
If the corresponding security information of the user identifier of the requesting terminal meets preset condition, execute according to the data verification
Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain in request.
5. the method as described in claim 1, which is characterized in that the method also includes:
The user identifier of each user data in the target terminal is obtained, and determines user's mark of each user data
Know corresponding job information;
The corresponding ability rating of user identifier of each user data is determined according to the job information;
If the ability rating of the user identifier is within a preset range, the ability rating is being received within a preset range
When the recommendation information of user identifier, the corresponding content of the recommendation information is executed.
6. a kind of data verification device characterized by comprising
Processing module, for obtaining the user data Block status of each terminal in terminal set, according to the user data
Block status selects target terminal from terminal set, and generates user according to the user data block in the target terminal
Data block chain stores the user data block chain;
Communication module, for the user data block chain to be issued to each terminal in the terminal set;
Computing module, for being requested to described according to the data verification in the data verification request for receiving requesting terminal
Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, and the data verification request is requests verification first
The request of definitive result, first definitive result are the result for the integrality that the requesting terminal determines the user data;
First determining module is determined for matching initial Hash value with the verifying cryptographic Hash, and according to matching result
The integrality of the user data, the integrality is for indicating whether the user data is modified, the initial Hash value
For the cryptographic Hash in the user data block chain.
7. device as claimed in claim 6, which is characterized in that further include:
Second determining module, for the integrality for the user data determined and first definitive result to be compared, with
Determine the correctness of first definitive result;
Wherein, the communication module is also used to send a notification message to the requesting terminal, and the notification message includes determining institute
State the result of the correctness of the first definitive result.
8. device as claimed in claim 6, which is characterized in that the corresponding user data of the user data block chain, at least
It include: the first user data and second user data, the second user data have with first user data to be associated with
Property;
The computing module, specifically for the first Kazakhstan is calculated according to the first user data in the user data block chain
Uncommon value, according in the user data block chain second user data and first cryptographic Hash verifying Hash is calculated
Value.
9. such as the described in any item devices of claim 6 to 8, which is characterized in that further include:
Module is obtained, for obtaining the corresponding user information in the requesting terminal, request is included at least in the user information eventually
The user identifier at end, and the user identifier pair for the requesting terminal for calling storage assembly acquisition to be stored in the storage assembly
The security information answered passes through the meter if the corresponding security information of the user identifier of the requesting terminal meets preset condition
It calculates module execution and verifying is calculated to the corresponding user data of the user data block chain according to data verification request
Cryptographic Hash.
10. device as claimed in claim 6, which is characterized in that further include:
Third determining module for obtaining the user identifier of each user data in the target terminal, and determines described each
The corresponding job information of the user identifier of a user data determines the user of each user data according to the job information
Identify corresponding ability rating;
Execution module is receiving the ability rating if the ability rating for the user identifier is within a preset range
When the recommendation information of user identifier within a preset range, the corresponding content of the recommendation information is executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810959037.5A CN109145651B (en) | 2018-08-22 | 2018-08-22 | Data processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810959037.5A CN109145651B (en) | 2018-08-22 | 2018-08-22 | Data processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109145651A true CN109145651A (en) | 2019-01-04 |
CN109145651B CN109145651B (en) | 2021-12-28 |
Family
ID=64790684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810959037.5A Active CN109145651B (en) | 2018-08-22 | 2018-08-22 | Data processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109145651B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110083775A (en) * | 2019-05-13 | 2019-08-02 | 北京顺丰同城科技有限公司 | A kind of configuration method and configuration device for recommending resource |
CN110351089A (en) * | 2019-05-23 | 2019-10-18 | 西安电子科技大学 | A kind of data signature authentication method and device |
CN111429136A (en) * | 2020-03-05 | 2020-07-17 | 合肥达朴汇联科技有限公司 | Data auditing method and device based on block chain |
CN112487492A (en) * | 2019-04-04 | 2021-03-12 | 创新先进技术有限公司 | Data verification method, system and equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040205315A1 (en) * | 2000-12-28 | 2004-10-14 | Ripley Micheal S. | Verifying the integrity of a media key block by storing validation data in the validation area of media |
KR100772881B1 (en) * | 2006-05-25 | 2007-11-05 | 삼성전자주식회사 | Apparatus and method for checking self modifying code |
US20080256363A1 (en) * | 2007-04-13 | 2008-10-16 | Boris Balacheff | Trusted component update system and method |
CN102609658A (en) * | 2012-02-15 | 2012-07-25 | 何晓行 | Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system |
CN106203179A (en) * | 2016-07-12 | 2016-12-07 | 何晓行 | A kind of completeness check system and method to file |
CN106230880A (en) * | 2016-07-12 | 2016-12-14 | 何晓行 | A kind of storage method of data and application server |
CN107580030A (en) * | 2017-08-18 | 2018-01-12 | 重庆邮电大学 | A kind of data managing method, device and server |
CN108256353A (en) * | 2018-01-11 | 2018-07-06 | 武汉斗鱼网络科技有限公司 | A kind of data integrity verifying method, apparatus and client |
CN108427601A (en) * | 2017-02-13 | 2018-08-21 | 北京航空航天大学 | A kind of cluster transaction processing method of privately owned chain node |
-
2018
- 2018-08-22 CN CN201810959037.5A patent/CN109145651B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040205315A1 (en) * | 2000-12-28 | 2004-10-14 | Ripley Micheal S. | Verifying the integrity of a media key block by storing validation data in the validation area of media |
KR100772881B1 (en) * | 2006-05-25 | 2007-11-05 | 삼성전자주식회사 | Apparatus and method for checking self modifying code |
US20080256363A1 (en) * | 2007-04-13 | 2008-10-16 | Boris Balacheff | Trusted component update system and method |
CN102609658A (en) * | 2012-02-15 | 2012-07-25 | 何晓行 | Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system |
CN106203179A (en) * | 2016-07-12 | 2016-12-07 | 何晓行 | A kind of completeness check system and method to file |
CN106230880A (en) * | 2016-07-12 | 2016-12-14 | 何晓行 | A kind of storage method of data and application server |
CN108427601A (en) * | 2017-02-13 | 2018-08-21 | 北京航空航天大学 | A kind of cluster transaction processing method of privately owned chain node |
CN107580030A (en) * | 2017-08-18 | 2018-01-12 | 重庆邮电大学 | A kind of data managing method, device and server |
CN108256353A (en) * | 2018-01-11 | 2018-07-06 | 武汉斗鱼网络科技有限公司 | A kind of data integrity verifying method, apparatus and client |
Non-Patent Citations (5)
Title |
---|
NISHARA NIZAMUDDIN: "IPFS-Blockchain-based Authenticity of Online Publications", 《ICBC 2018》 * |
WENTONG WANG: "BlockCAM: A Blockchain-based Cross-domain Authentication Model", 《2018 IEEE THIRD INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE》 * |
XUEPING LIANG: "Towards Data Assurance and Resilience in IoT Using Blockchain", 《2017 IEEE MILITARY COMMUNICATIONS CONFERENCE(MILCOM)》 * |
丁庆洋 等: "基于区块链的信息物理融合系统的信息安全保护框架", 《计算机科学》 * |
颜湘涛 等: "基于哈希树的云存储完整性检测算法", 《计算机科学》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112487492A (en) * | 2019-04-04 | 2021-03-12 | 创新先进技术有限公司 | Data verification method, system and equipment |
CN112487492B (en) * | 2019-04-04 | 2023-11-17 | 创新先进技术有限公司 | Data verification method, system and equipment |
CN110083775A (en) * | 2019-05-13 | 2019-08-02 | 北京顺丰同城科技有限公司 | A kind of configuration method and configuration device for recommending resource |
CN110083775B (en) * | 2019-05-13 | 2021-06-25 | 北京顺丰同城科技有限公司 | Configuration method and configuration device for recommended resources |
CN110351089A (en) * | 2019-05-23 | 2019-10-18 | 西安电子科技大学 | A kind of data signature authentication method and device |
CN111429136A (en) * | 2020-03-05 | 2020-07-17 | 合肥达朴汇联科技有限公司 | Data auditing method and device based on block chain |
CN111429136B (en) * | 2020-03-05 | 2023-04-28 | 合肥达朴汇联科技有限公司 | Block chain-based data auditing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109145651B (en) | 2021-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109145651A (en) | A kind of data processing method and device | |
CN109815657B (en) | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment | |
CN106453415B (en) | Block chain-based equipment authentication method, authentication server and user equipment | |
CN107798038B (en) | Data response method and data response equipment | |
CN106911687B (en) | Page construction control method and device | |
CN107040585A (en) | A kind of method and device of business verification | |
CN104767714B (en) | A kind of ID and the correlating method of user resources information, terminal and system | |
CN109831487A (en) | Fragmented file verification method and terminal equipment | |
CN110351089A (en) | A kind of data signature authentication method and device | |
CN104917749A (en) | Account registration method and device | |
CN108173938A (en) | Server load shunt method and device | |
CN104836777B (en) | Identity verification method and system | |
CN108073351A (en) | The date storage method and credible chip of nonvolatile storage space in chip | |
CN109344599A (en) | A kind of authentication management method, device, terminal and medium | |
CN111176918A (en) | Server testing method, system, equipment and computer readable storage medium | |
CN113268336A (en) | Service acquisition method, device, equipment and readable medium | |
CN107612877A (en) | Verify the methods, devices and systems of multimedia file legitimacy | |
CN105072197A (en) | Information-recommending method and device | |
CN106209970A (en) | Determine the method and apparatus of the network state being connected between subscriber equipment with routing device | |
CN108280024B (en) | Flow distribution strategy testing method and device and electronic equipment | |
CN113468276A (en) | Trusted data acquisition method and device of on-chain prediction machine and electronic equipment | |
CN104917720A (en) | Method and device for resetting password | |
CN116701367A (en) | Data repeatability verification method, device and equipment based on bloom filter | |
CN109818915B (en) | Information processing method and device, server and readable storage medium | |
CN110585717B (en) | Information processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |