CN109145651A - A kind of data processing method and device - Google Patents

A kind of data processing method and device Download PDF

Info

Publication number
CN109145651A
CN109145651A CN201810959037.5A CN201810959037A CN109145651A CN 109145651 A CN109145651 A CN 109145651A CN 201810959037 A CN201810959037 A CN 201810959037A CN 109145651 A CN109145651 A CN 109145651A
Authority
CN
China
Prior art keywords
user data
user
terminal
data block
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810959037.5A
Other languages
Chinese (zh)
Other versions
CN109145651B (en
Inventor
何晓行
赵长江
黄永洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810959037.5A priority Critical patent/CN109145651B/en
Publication of CN109145651A publication Critical patent/CN109145651A/en
Application granted granted Critical
Publication of CN109145651B publication Critical patent/CN109145651B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6272Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party

Abstract

The embodiment of the invention discloses a kind of data processing method and devices, wherein method includes: the user data Block status for obtaining each terminal in terminal set, target terminal is selected from terminal set according to the user data Block status, and user data block chain is generated according to the user data block in the target terminal;The user data block chain is stored, and the user data block chain is issued into each terminal in the terminal set;In the data verification request for receiving requesting terminal, verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain according to data verification request;Initial Hash value is matched with the verifying cryptographic Hash, and determines the integrality of the user data according to matching result, can the integrality to user data effectively verified.

Description

A kind of data processing method and device
Technical field
The present invention relates to computer technology more particularly to a kind of data processing method and devices.
Background technique
With the continuous development of computer, can decentralization, open and clear block chain technology also obtained flourishing hair Exhibition.
Currently, participating in the terminal (such as smart phone, tablet computer, laptop etc.) or service of record user data One or more user data of generation can be packaged into a user data block by device, then with another user data area Block is engaged togather, and forms new user data block.One user data block is ined succession a user data block, thus shape At user data block chain.
However, when whether terminal is wanted to verify the user data in user data block chain and modified, how to user The integrality of the corresponding user data of data block chain, which carries out effectively verifying, becomes a urgent problem to be solved.
Summary of the invention
The technical problem to be solved by the embodiment of the invention is that provide a kind of data processing method and device, can to The integrality of user data is effectively verified.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of data processing method and devices, comprising:
Obtain terminal set in each terminal user data Block status, according to the user data Block status from Target terminal is selected in terminal set, and user data block is generated according to the user data block in the target terminal Chain;The user data block chain is stored, and the user data block chain is issued into each terminal in the terminal set;
In the data verification request for receiving requesting terminal, requested according to the data verification to the user data area Verifying cryptographic Hash is calculated in the corresponding user data of block chain, and the data verification request is the first definitive result of requests verification Request, first definitive result are the result for the integrality that the requesting terminal determines the user data;
Initial Hash value is matched with the verifying cryptographic Hash, and the user data is determined according to matching result Integrality, for the integrality for indicating whether the user data is modified, the initial Hash value is the user data Cryptographic Hash in block chain.
Wherein, after the integrality that the user data is determined according to matching result, further includes:
The integrality for the user data determined and first definitive result are compared, it is true with determination described first Determine the correctness of result;
It sends a notification message to the requesting terminal, the notification message includes the correct of determining first definitive result The result of property.
Wherein, the corresponding user data of the user data block chain, includes at least: the first user data and the second use User data, the second user data and first user data have relevance;
The described corresponding user data of the user data block chain is calculated according to data verification request is tested Cryptographic Hash is demonstrate,proved, is specifically included:
The first cryptographic Hash is calculated according to the first user data in the user data block chain;
According in the user data block chain second user data and first cryptographic Hash verifying is calculated Cryptographic Hash.
It is wherein, described after the data verification for receiving requesting terminal request, further includes:
The corresponding user information in the requesting terminal is obtained, the user that requesting terminal is included at least in the user information marks Know;
Storage assembly is called to obtain the corresponding peace of user identifier for the requesting terminal being stored in the storage assembly Full information;
If the corresponding security information of the user identifier of the requesting terminal meets preset condition, execute according to the data Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain in checking request.
Wherein, the method also includes: obtain the user identifier of each user data in the target terminal, and determine The corresponding job information of user identifier of each user data;
The corresponding ability rating of user identifier of each user data is determined according to the job information;
If the ability rating of the user identifier is within a preset range, the ability rating is being received in preset range When the recommendation information of interior user identifier, the corresponding content of the recommendation information is executed.
Correspondingly, the embodiment of the invention also provides a kind of data processing equipments, comprising:
Processing module, for obtaining the user data Block status of each terminal in terminal set, according to the user Data block state selects target terminal from terminal set, and is generated according to the user data block in the target terminal User data block chain stores the user data block chain;
Communication module, for the user data block chain to be issued to each terminal in the terminal set;
Computing module, for receive requesting terminal data verification request when, according to the data verification request pair Verifying cryptographic Hash is calculated in the corresponding user data of the user data block chain, and the data verification request is requests verification The request of first definitive result, first definitive result are the knot for the integrality that the requesting terminal determines the user data Fruit;
First determining module, for matching initial Hash value with the verifying cryptographic Hash, and according to matching result Determine the integrality of the user data, the integrality is for indicating whether the user data is modified, the initial Kazakhstan Uncommon value is the cryptographic Hash in the user data block chain.
Wherein, described device further include: the second determining module, for by the integrality for the user data determined with it is described First definitive result compares, with the correctness of determination first definitive result;
Wherein, the communication module is also used to send a notification message to the requesting terminal, and the notification message includes true The result of the correctness of fixed first definitive result.
Wherein, the corresponding user data of the user data block chain, includes at least: the first user data and the second use User data, the second user data and first user data have relevance;
The computing module, specifically for being calculated according to the first user data in the user data block chain One cryptographic Hash, according in the user data block chain second user data and first cryptographic Hash verifying is calculated Cryptographic Hash.
Wherein, described device further include: module is obtained, it is described for obtaining the corresponding user information in the requesting terminal The user identifier of requesting terminal is included at least in user information, and storage assembly acquisition is called to be stored in the storage assembly The corresponding security information of the user identifier of the requesting terminal, if the corresponding security information of the user identifier of the requesting terminal is full Sufficient preset condition is then executed by the computing module corresponding to the user data block chain according to data verification request User data verifying cryptographic Hash is calculated.
Wherein, described device further include: third determining module, for obtaining each user data in the target terminal User identifier, and determine the corresponding job information of user identifier of each user data, it is true according to the job information The corresponding ability rating of user identifier of fixed each user data;
Execution module is receiving the ability if the ability rating for the user identifier is within a preset range When the recommendation information of the user identifier of grade within a preset range, the corresponding content of the recommendation information is executed.
The implementation of the embodiments of the present invention has the following beneficial effects: user data block chain is generated by choosing target terminal, Then the user data block chain is stored and is sent to each terminal in terminal set, receive requesting terminal When data verification is requested, verifying is calculated to the corresponding user data of user data block chain according to data verification request Initial Hash value is finally matched with the verifying cryptographic Hash, and determines the user data according to matching result by cryptographic Hash Integrality, can use cryptographic Hash, the integrality of the corresponding user data of user data block chain effectively verified.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of data processing method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another data processing method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawing, the embodiment of the present invention is described.Based on the embodiments of the present invention, this field is common Technical staff's every other embodiment obtained without creative efforts belongs to the model that the present invention protects It encloses.
It should be noted that the executing subject of the embodiment of the present invention can be various types of terminals or server, terminal Such as it can be smart phone, tablet computer, wearable device, computer, personal digital assistant (English: Personal Digital Assistant, abbreviation: PDA), mobile internet device (English: Mobile Internet Device, abbreviation: ) etc. MID the terminal of data processing can be carried out, server for example can be text server, database server etc. and can be counted According to the server of processing, the present invention is not intended to be limited in any this.
Wherein, for ease of description, it is further explained so that executing subject is server as an example in following methods embodiment It states.
It referring to Figure 1, is that the embodiment of the present invention provides a kind of flow diagram of data processing method, as shown in Figure 1 Data processing method can include:
S101, obtain terminal set in each terminal user data Block status, according to the user data block State selects target terminal from terminal set, and generates user data according to the user data block in the target terminal Block chain.
It should be noted that the terminal set can be the terminal set for participating in record user data.In the terminal set Each terminal, can store and record the user data.
It should be noted the user data Block status, can be server according to each in the terminal set Terminal generates the parameters such as the speed, accuracy, error rate of the user data block, which can be used to divide The each terminal being precipitated records the record quality of the user data block.
In some possible embodiments, which can generate each terminal the speed of the user data block As the user data Block status.Specifically, the server can according near slow sequence in the terminal set The speed that each terminal generates the user data block is ranked up, and is then chosen and is generated the fastest of the user data block Corresponding terminal be target terminal.
In some possible embodiments, which can also generate each terminal the user data block just Then true rate or error rate generate the number of users according to each terminal in the terminal set as the user data Block status It is ranked up according to the accuracy or error rate of block, then chooses target terminal according to ranking results.
In some possible embodiments, which can also generate the use for each terminal in the terminal set The generation quality that speed, accuracy, the error rate comprehensive analysis of user data block go out, as the user data Block status. Certainly, aforesaid way is only illustrated, and non exhaustive, including but not limited to above-mentioned optional way.
It should be noted the user data block, can be the target terminal one generated in a period of time Or the block that multiple user data are packaged into.
In the specific implementation, the server can obtain after selecting target terminal according to the user data Block status The user data block in the target terminal is taken, which can be to be multiple, which can be according to time elder generation Each user data block is associated by sequence afterwards, and generates the user data block chain.
S102, the storage user data block chain, and the user data block chain is issued in the terminal set Each terminal.
It should be noted that the server can be after generating the user data block chain, by the user data block Chain is stored in the storage assembly of the server.Further, which can also issue end for the user data block chain Each terminal in set is held, each terminal in the terminal set can use the user data block chain to the user data The integrality of the data of block chain is verified.
S103, receive requesting terminal data verification request when, according to the data verification request to the user Verifying cryptographic Hash is calculated in the corresponding user data of data block chain.
Wherein, the data verification request is the request of the first definitive result of requests verification, and first definitive result is The requesting terminal determines the result of the integrality of the user data.
In the specific implementation, the requesting terminal can be one of them of each terminal in the terminal set, alternatively, this is asked Terminal is asked to be also possible to receive the user data block chain by any one terminal of each terminal in the terminal set Terminal, alternatively, the requesting terminal is also possible to any other terminal, the embodiment of the present invention is not intended to be limited in any this.
In some possible embodiments, which can be according to the user data block chain to the user data User data in block chain carries out integrity verification.
Specifically, the verifying cryptographic Hash of terminal side can be calculated in the user data by the requesting terminal, and can incite somebody to action The verifying cryptographic Hash of the terminal side is matched with the initial Hash value in user data block chain, if matching result indicates to be somebody's turn to do The verifying cryptographic Hash of terminal side is identical as the initial Hash value, which can generate the first definitive result, this first Definitive result can be to determine that the integrality of the user data is the result that the user data is not modified.
Wherein, if matching result indicates that the verifying cryptographic Hash of the terminal side and the initial Hash value be not identical, the request Terminal can generate the first definitive result, which can be to determine that the integrality of the user data is the user The result that data are modified.
It in some possible embodiments, can be to the clothes after which generates first definitive result Whether device requests verification first definitive result of being engaged in is correct.It is tested specifically, the requesting terminal can send data to the server Card is requested, and may include first definitive result in data verification request, which may include terminal side Verify cryptographic Hash.
In some possible embodiments, which, can be in the data verification request for receiving requesting terminal The corresponding user data of user data block chain in the server is calculated according to data verification request, is serviced The verifying cryptographic Hash of device side.
S104, initial Hash value is matched with the verifying cryptographic Hash, and the user is determined according to matching result The integrality of data.
Wherein, for the integrality for indicating whether the user data is modified, the initial Hash value is the use Cryptographic Hash in user data block chain.
It should be noted that the initial Hash value can be the cryptographic Hash in the user data block chain.The server can User data area can be generated simultaneously when generating user data block chain according to the user data block in the target terminal Cryptographic Hash corresponding to the user data of block chain, and cryptographic Hash corresponding to the user data is added to the user data area In block chain.
In some possible embodiments, which carries out matched tool for initial Hash value and the verifying cryptographic Hash Body mode may is that the server determines whether the initial Hash value and the verifying cryptographic Hash are identical.
Further, if matching result is that the server determines that the initial Hash value is identical as the verifying cryptographic Hash, that The server may further determine that the integrality of the user data is that the user data is not modified.If matching result is It is different from the verifying cryptographic Hash that the server determines the initial Hash value, then the server may further determine that the number of users According to integrality be the user data modified.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal When, verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request, finally Initial Hash value is matched with the verifying cryptographic Hash, and determines the integrality of the user data according to matching result, it can To utilize cryptographic Hash, the integrality of the corresponding user data of user data block chain is effectively verified.
Referring to Fig. 2, for the flow diagram of another data processing method provided in an embodiment of the present invention.Such as Fig. 2 institute The data processing method shown, it may include:
S201, obtain terminal set in each terminal user data Block status, according to the user data block State selects target terminal from terminal set, and generates user data according to the user data block in the target terminal Block chain.
Optionally, which can also obtain the user identifier of each user data in the target terminal, and really The corresponding job information of user identifier of fixed each user data;Each number of users is determined according to the job information According to the corresponding ability rating of user identifier;If the ability rating of the user identifier is within a preset range, receiving When stating the recommendation information of the user identifier of ability rating within a preset range, the corresponding content of the recommendation information is executed.
It should be noted that the user identifier can be address name, user account, the identity ID of user, user's head portrait Etc., the embodiment of the present invention is not intended to be limited in any this.
It wherein, may include the corresponding user data of multiple user identifiers in the target terminal.For example, user data 1 can To indicate the corresponding data of user identifier A, user data 2 can indicate corresponding data of user data B etc..
It should also be noted that, the job information for example can be the corresponding work of workload, working strength, user identifier Processing speed etc., the embodiment of the present invention is not intended to be limited in any this.
For example, which can obtain the same of the user data Block status of each terminal in terminal set When, obtain the corresponding user identifier of each user data in the target terminal, the corresponding user identifier A of user data 1, number of users According to 2 corresponding user identifier B, the corresponding user identifier C of user data 3.The terminal can record user identifier A, Yong Hubiao in advance Know B and the corresponding job information of user identifier C (for example, workload).
Wherein, the corresponding workload of user identifier A is, for example, 50, and the corresponding workload of user identifier B is, for example, 20, The corresponding workload of user identifier C is, for example, 70.If the server presets the workload in the user identifier of 0-20, Corresponding ability rating is a, and the workload is in the user identifier of 21-50, and corresponding ability rating is b, and the workload is 51 And its above user identifier, corresponding ability rating is c, then the corresponding ability rating of user identifier A is b, the use It is a that family, which identifies the corresponding ability rating of B, and the corresponding ability rating of user identifier C is c.
Further, the preset range of the ability rating can be b and its ratings above.Therefore, which can be true Fixed user identifier A and user identifier C is the user identifier of the ability rating within a preset range.
Further, if the server receives user identifier A or user identifier C issues the recommendation of the server When information (such as data refresh mode, data verification mode etc.), it is corresponding that the recommendation information can be executed according to the recommendation information Content (such as being adjusted the data refresh mode of the server according to the data refresh mode of recommendation).
In some possible embodiments, which it is corresponding can also to receive user identifier A or user identifier C User data when, if the user data is to need the data that are executed by the server, which can directly be held Row user identifier A or the corresponding user data of user identifier C.
S202, the storage user data block chain, and the user data block chain is issued in the terminal set Each terminal.
It should be noted that the S202 step in the embodiment of the present invention can be according to the S102 step in above method embodiment It realizes, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
S203, receive requesting terminal data verification request when, obtain the corresponding user information in the requesting terminal.
Wherein, the user identifier of requesting terminal is included at least in the user information.
Wherein, data verification request is the request of the first definitive result of requests verification, and first definitive result is institute State the result that requesting terminal determines the integrality of the user data.
It should be noted that the corresponding user information in the requesting terminal, the user that can include at least the requesting terminal is marked Know.Alternatively, the user information can also include amount of user data, size etc. of the requesting terminal in the server, this hair It is bright to this with no restriction.
In some possible embodiments, which can be in the data verification request for receiving requesting terminal transmission When, according to the user data of the data verification request requesting terminal.And use of the requesting terminal in the server Amount data bulk, size etc..
S204, the user identifier for calling storage assembly to obtain the requesting terminal being stored in the storage assembly are corresponding Security information.
It should be noted that the storage assembly can be the storage medium of server special secondary school for storing data.
It should also be noted that, the corresponding security information of the user identifier of the requesting terminal can be stored in advance in the service In the storage assembly of device, which can determine whether the data verification request of the requesting terminal is non-according to the security information Method request.
Wherein, the security information can be for determine the requesting terminal whether be the server authentication security terminal Information etc..
If the corresponding security information of the user identifier of S205, the requesting terminal meets preset condition, according to the number Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain according to checking request.
It for example, may include the security key of the requesting terminal in the security information, which can be should The safety certification of server itself.If the server can pass through the server itself according to the security key of the requesting terminal Safety certification, then the server can determine the requesting terminal be safety terminal.
In some possible embodiments, the server determine the requesting terminal be safety terminal after, The verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request.
Wherein, if it is safe terminal that the server, which determines the requesting terminal not, which can not be to this The corresponding user data of user data block chain makees any processing, wherein the server can also be sent to the requesting terminal should The unverified notification message in requesting terminal.
Optionally, the corresponding user data of the user data block chain, includes at least: the first user data and second User data, the second user data and first user data have relevance.
It should be noted that the relevance that the second user data and first user data have can be time sequencing On relevance.For example, first user data is time forward data, which is time rearward suitable Sequence.
It should be noted that the user data can also include third user data, fourth user data etc., when having When 2 or more user data, processing method can be similar to processing method when 2 user data, the embodiment of the present invention pair This is not intended to be limited in any.
Optionally, described that the corresponding user data of the user data block chain is calculated according to data verification request It is verified cryptographic Hash, is specifically included: the first Kazakhstan is calculated according to the first user data in the user data block chain Uncommon value;According in the user data block chain second user data and first cryptographic Hash verifying Hash is calculated Value.
In some possible embodiments, the data which can be forward for the time, the second user Data can be the data of time rearward.Correspondence can be calculated using hash algorithm in first user data by the server The first cryptographic Hash, then the server can be calculated corresponding second using hash algorithm according to the second user data Then cryptographic Hash generates the verifying cryptographic Hash according to first cryptographic Hash and the second cryptographic Hash.
In some possible embodiments, which can also be calculated first user data using hash algorithm Corresponding first cryptographic Hash is obtained, then the server can pass through Kazakhstan according to the second user data and first cryptographic Hash Uncommon algorithm obtains the verifying cryptographic Hash.
S206, initial Hash value is matched with the verifying cryptographic Hash, and the user is determined according to matching result The integrality of data.
It should be noted that the S206 step in the embodiment of the present invention can be according to the S104 step in above method embodiment It realizes, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
S207, the integrality for the user data determined and first definitive result are compared, described in determination The correctness of first definitive result.
Wherein, first definitive result is the result for the integrality that the requesting terminal determines the user data.
In some possible embodiments, which can determine that the integrality of the user data is the user data Do not modified, if first definitive result is also that the user data is not modified, the server can determine this One definitive result is correct.Alternatively, the server can determine that the integrality of the user data is that the user data is modified, If first definitive result is also that the user data is modified, which can determine first definitive result It is correct.
In some possible embodiments, which can determine that the integrality of the user data is the user data Do not modified, if first definitive result is also that the user data is modified, the server can determine this first Definitive result is wrong.Alternatively, the server can determine that the integrality of the user data is that the user data is modified, such as Fruit first definitive result is also that the user data is not modified, then the server can determine first definitive result It is wrong.
S208, it sends a notification message to the requesting terminal.
Wherein, the notification message includes the result of the correctness of determining first definitive result.
In the specific implementation, the server can be after the correctness for determining first definitive result, to the requesting terminal Send the notification message.Wherein it is determined that the correctness of first definitive result can be two kinds: first definitive result is correct, Or the first definitive result mistake.
Wherein, if first definitive result is correct, which can be for for notifying first determination As a result correct message.If the first definitive result mistake, the notification message can with for for notify this first really Determine the message of result mistake.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal When, if the security information of the user identifier of the requesting terminal meets preset condition, requested according to the data verification to the use Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, finally by initial Hash value and the verifying cryptographic Hash into Row matches, and the integrality of the user data is determined according to matching result, and the definitive result is finally sent to request end End, can use cryptographic Hash, is effectively verified to the integrality of the corresponding user data of user data block chain, and will verifying Result afterwards issues the requesting terminal, and the requesting terminal is helped to determine the correctness of the definitive result of itself, strengthens request eventually Hold the confidence level of the definitive result of itself.
The following is an embodiment of the apparatus of the present invention, apparatus of the present invention embodiment for execute the method for the present invention first embodiment and The method that second embodiment is realized illustrates only the relevant part of the embodiment of the present invention, does not disclose specifically for ease of description Part please refers to first embodiment of the invention to second embodiment.
Referring to Fig. 3, being a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention.As shown in Figure 3 Device, may include:
Processing module 301, for obtaining the user data Block status of each terminal in terminal set, according to the use User data Block status selects target terminal from terminal set, and raw according to the user data block in the target terminal At user data block chain, the user data block chain is stored.
Communication module 302, for the user data block chain to be issued to each terminal in the terminal set.
Computing module 303, for being requested according to the data verification in the data verification request for receiving requesting terminal Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain, the data verification request is tested for request The request of the first definitive result is demonstrate,proved, first definitive result is the integrality that the requesting terminal determines the user data As a result.
First determining module 304 is tied for matching initial Hash value with the verifying cryptographic Hash, and according to matching Fruit determines the integrality of the user data, and the integrality is described initial for indicating whether the user data is modified Cryptographic Hash is the cryptographic Hash in the user data block chain.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal When, verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request, finally Initial Hash value is matched with the verifying cryptographic Hash, and determines the integrality of the user data according to matching result, it can To utilize cryptographic Hash, the integrality of the corresponding user data of user data block chain is effectively verified.
Referring to Fig. 4, for the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention.Such as Fig. 4 institute The device shown may include:
Processing module 401, for obtaining the user data Block status of each terminal in terminal set, according to the use User data Block status selects target terminal from terminal set, and raw according to the user data block in the target terminal At user data block chain, the user data block chain is stored.
Communication module 402, for the user data block chain to be issued to each terminal in the terminal set;
Computing module 403, for being requested according to the data verification in the data verification request for receiving requesting terminal Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain, the data verification request is tested for request The request of the first definitive result is demonstrate,proved, first definitive result is the integrality that the requesting terminal determines the user data As a result.
First determining module 404 is tied for matching initial Hash value with the verifying cryptographic Hash, and according to matching Fruit determines the integrality of the user data, and the integrality is described initial for indicating whether the user data is modified Cryptographic Hash is the cryptographic Hash in the user data block chain.
Optionally, described device further include: the second determining module 405, for by the integrality for the user data determined It is compared with first definitive result, with the correctness of determination first definitive result.
Wherein, the usual module 402 is also used to send a notification message to the requesting terminal, the notification message packet Include the result for determining the correctness of first definitive result.
Optionally, the corresponding user data of the user data block chain, includes at least: the first user data and second User data, the second user data and first user data have relevance.
The computing module 403, specifically for being calculated according to the first user data in the user data block chain To the first cryptographic Hash, according in the user data block chain second user data and first cryptographic Hash be calculated Verify cryptographic Hash.
Optionally, described device further include: module 406 is obtained, for obtaining the corresponding user information in the requesting terminal, The user identifier of requesting terminal is included at least in the user information, and storage assembly acquisition is called to be stored in the storage assembly In the requesting terminal the corresponding security information of user identifier, if the user identifier of the requesting terminal it is corresponding safety letter Breath meets preset condition, then is executed by the computing module 403 and requested according to the data verification to the user data area Verifying cryptographic Hash is calculated in the corresponding user data of block chain.
Optionally, described device further include: third determining module 407, for obtaining each use in the target terminal The user identifier of user data, and determine the corresponding job information of user identifier of each user data, according to the work Information determines the corresponding ability rating of user identifier of each user data.
Execution module 408 is receiving the energy if the ability rating for the user identifier is within a preset range When the recommendation information of the user identifier of power grade within a preset range, the corresponding content of the recommendation information is executed.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal When, if the security information of the user identifier of the requesting terminal meets preset condition, requested according to the data verification to the use Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, finally by initial Hash value and the verifying cryptographic Hash into Row matches, and the integrality of the user data is determined according to matching result, and the definitive result is finally sent to request end End, can use cryptographic Hash, is effectively verified to the integrality of the corresponding user data of user data block chain, and will verifying Result afterwards issues the requesting terminal, and the requesting terminal is helped to determine the correctness of the definitive result of itself, strengthens request eventually Hold the confidence level of the definitive result of itself.
Referring to Fig. 5, being the structural schematic diagram of another data processing equipment provided in an embodiment of the present invention.Wherein, should Data processing equipment can be server or terminal.
As shown in figure 5, the data processing equipment in the embodiment of the present invention includes: at least one input equipment 1000;At least One processor 2000, such as CPU;At least one processor 3000;At least one output equipment 4000, above-mentioned input equipment 1000, processor 2000, memory 3000 are connected with output equipment 4000 by bus.Wherein, bus is for realizing these groups Connection communication between part.Wherein, the input equipment 1000 of device and output equipment 4000 can be in the embodiment of the present invention Line sending port, or wireless device, for example including antenna assembly, for carrying out signaling or data with other node devices Communication.
The processor 2000 can be central processing unit 2000 (central processing unit, CPU), at network Manage the combination of device 2000 (network processor, NP) or CPU and NP.
The processor 2000 can further include hardware chip.Above-mentioned hardware chip can be specific integrated circuit (application-specific integrated circuit, ASIC), programmable logic device (programmable Logic device, PLD) or combinations thereof.Above-mentioned PLD can be Complex Programmable Logic Devices (complex Programmable logic device, CPLD), field programmable gate array (field-programmable gate Array, FPGA), Universal Array Logic (generic array logic, GAL) or any combination thereof.
The memory 3000 may include volatile memory 3000 (volatile memory), such as arbitrary access is deposited Reservoir 3000 (random-access memory, RAM);Memory 3000 also may include nonvolatile memory 3000 (non-volatile memory), such as flash memory 3000 (flash memory), hard disk (hard disk drive, ) or solid state hard disk (solid-state drive, SSD) HDD;Memory 3000703 can also include the memory of mentioned kind 3000 combination.
Optionally, which is also used to store program instruction.The processor 2000 can call the memory The program instruction of 3000 storages, realizes the method as shown in first embodiment of the invention, second embodiment.
The bus can be Peripheral Component Interconnect standard (peripheral component interconnect, abbreviation PCI) bus or expanding the industrial standard structure (extended industry standard architecture, abbreviation EISA) Bus etc..The bus can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, in Fig. 5 only with one slightly Line indicates, it is not intended that an only bus or a type of bus.
Specifically, processor 2000, the user of each terminal in terminal set is obtained for controlling input equipment 1000 Data block state selects target terminal according to the user data Block status from terminal set, and according to target end User data block in end generates user data block chain.
Memory 3000, for storing the user data block chain.
Output equipment 4000, for the user data block chain to be issued to each terminal in the terminal set.
The processor 2000 is also used to when the input equipment 1000 receives the data verification request of requesting terminal, root Verifying cryptographic Hash is calculated to the corresponding user data of user data block chain according to data verification request;By initial Hash Value is matched with the verifying cryptographic Hash, and the integrality of the user data is determined according to matching result.
Wherein, data verification request is the request of the first definitive result of requests verification, which asks for this Terminal is asked to determine the result of the integrality of the user data.
Wherein, for the integrality for indicating whether the user data is modified, which is the user data area Cryptographic Hash in block chain.
Optionally, the processor 2000, the integrality for the user data for being also used to determine and first definitive result It compares, to determine the correctness of first definitive result.
Wherein, the output equipment 4000, for sending a notification message to the requesting terminal, which includes determining to be somebody's turn to do The result of the correctness of first definitive result.
Optionally, the corresponding user data of user data block chain, includes at least: the first user data and the second use User data, the second user data and first user data have relevance.
Optionally, processor 2000, specifically for being calculated according to the first user data in the user data block chain Obtain the first cryptographic Hash;According in the user data block chain second user data and first cryptographic Hash be calculated and test Demonstrate,prove cryptographic Hash.
Optionally, the processor 2000 is also used to control the input equipment 1000 and obtains the corresponding user in the requesting terminal Information includes at least the user identifier of requesting terminal in the user information;Storage assembly acquisition in control memory 3000 is deposited Store up the corresponding security information of user identifier of the requesting terminal in the storage assembly;If the user identifier pair of the requesting terminal The security information answered meets preset condition, then executes and requested according to the data verification to the corresponding user of the user data block chain Verifying cryptographic Hash is calculated in data.
Optionally, the processor 2000 is also used to obtain the user identifier of each user data in the target terminal, and It determines the corresponding job information of the user identifier of each user data, which is determined according to the job information The corresponding ability rating of user identifier connects if the ability rating of the user identifier is within a preset range in input equipment 1000 When receiving the recommendation information of the user identifier of the ability rating within a preset range, the corresponding content of the recommendation information is executed.
As it can be seen that user data block chain is generated by choosing target terminal, then by the number of users in the embodiment of the present invention Each terminal in terminal set is stored and is sent to according to block chain, in the data verification request for receiving requesting terminal When, if the security information of the user identifier of the requesting terminal meets preset condition, requested according to the data verification to the use Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, finally by initial Hash value and the verifying cryptographic Hash into Row matches, and the integrality of the user data is determined according to matching result, and the definitive result is finally sent to request end End, can use cryptographic Hash, is effectively verified to the integrality of the corresponding user data of user data block chain, and will verifying Result afterwards issues the requesting terminal, and the requesting terminal is helped to determine the correctness of the definitive result of itself, strengthens request eventually Hold the confidence level of the definitive result of itself.
A kind of computer readable storage medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program and may be implemented when the computer program is executed by processor: obtaining each in terminal set The user data Block status of terminal selects target terminal from terminal set according to the user data Block status, and User data block chain is generated according to the user data block in the target terminal;The user data block chain is stored, and The user data block chain is issued into each terminal in the terminal set;It is asked in the data verification for receiving requesting terminal When asking, verifying Hash is calculated to the corresponding user data of the user data block chain according to data verification request Value, the data verification request are the request of the first definitive result of requests verification, and first definitive result is that the request is whole End determines the result of the integrality of the user data;Initial Hash value is matched with the verifying cryptographic Hash, and according to Matching result determines the integrality of the user data, and the integrality is for indicating whether the user data is modified, institute Stating initial Hash value is the cryptographic Hash in the user data block chain.
It should be noted that the detailed process that the computer readable storage medium is executed by processor can be found in the first implementation Method described in example and second embodiment, details are not described herein.
The computer readable storage medium can be the internal storage unit of terminal described in aforementioned any embodiment, example Such as the hard disk or memory of terminal.The computer readable storage medium is also possible to the External memory equipment of the terminal, such as The plug-in type hard disk being equipped in the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer readable storage medium can also be wrapped both The internal storage unit for including the terminal also includes External memory equipment.The computer readable storage medium is described for storing Other programs and data needed for computer program and the terminal.The computer readable storage medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above disclosure is only one embodiment of the present invention, cannot limit the right model of the present invention with this certainly It encloses, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and wants according to right of the present invention Made equivalent variations is sought, the range that the present invention is covered is still fallen within.

Claims (10)

1. a kind of data processing method characterized by comprising
The user data Block status for obtaining each terminal in terminal set, according to the user data Block status from terminal Target terminal is selected in set, and user data block chain is generated according to the user data block in the target terminal;It deposits The user data block chain is stored up, and the user data block chain is issued into each terminal in the terminal set;
In the data verification request for receiving requesting terminal, requested according to the data verification to the user data block chain Verifying cryptographic Hash is calculated in corresponding user data;
Initial Hash value is matched with the verifying cryptographic Hash, and the complete of the user data is determined according to matching result Property, for the integrality for indicating whether the user data is modified, the initial Hash value is the user data block Cryptographic Hash in chain.
2. the method as described in claim 1, which is characterized in that the data verification request determines knot for requests verification first Fruit, first definitive result are the result for the integrality that the requesting terminal determines the user data;
After the integrality for determining the user data according to matching result, further includes:
The integrality for the user data determined and first definitive result are compared, knot is determined with determination described first The correctness of fruit;
It sends a notification message to the requesting terminal, the notification message includes the correctness of determining first definitive result As a result.
3. the method as described in claim 1, which is characterized in that the corresponding user data of the user data block chain, at least It include: the first user data and second user data, the second user data have with first user data to be associated with Property;
It is described that verifying Kazakhstan is calculated to the corresponding user data of the user data block chain according to data verification request Uncommon value, specifically includes:
The first cryptographic Hash is calculated according to the first user data in the user data block chain;
According in the user data block chain second user data and first cryptographic Hash verifying Hash is calculated Value.
4. method as described in any one of claims 1 to 3, which is characterized in that described to be tested in the data for receiving requesting terminal After card request, further includes:
The corresponding user information in the requesting terminal is obtained, the user identifier of requesting terminal is included at least in the user information;
Storage assembly is called to obtain the corresponding safety letter of user identifier for the requesting terminal being stored in the storage assembly Breath;
If the corresponding security information of the user identifier of the requesting terminal meets preset condition, execute according to the data verification Verifying cryptographic Hash is calculated to the corresponding user data of the user data block chain in request.
5. the method as described in claim 1, which is characterized in that the method also includes:
The user identifier of each user data in the target terminal is obtained, and determines user's mark of each user data Know corresponding job information;
The corresponding ability rating of user identifier of each user data is determined according to the job information;
If the ability rating of the user identifier is within a preset range, the ability rating is being received within a preset range When the recommendation information of user identifier, the corresponding content of the recommendation information is executed.
6. a kind of data verification device characterized by comprising
Processing module, for obtaining the user data Block status of each terminal in terminal set, according to the user data Block status selects target terminal from terminal set, and generates user according to the user data block in the target terminal Data block chain stores the user data block chain;
Communication module, for the user data block chain to be issued to each terminal in the terminal set;
Computing module, for being requested to described according to the data verification in the data verification request for receiving requesting terminal Verifying cryptographic Hash is calculated in the corresponding user data of user data block chain, and the data verification request is requests verification first The request of definitive result, first definitive result are the result for the integrality that the requesting terminal determines the user data;
First determining module is determined for matching initial Hash value with the verifying cryptographic Hash, and according to matching result The integrality of the user data, the integrality is for indicating whether the user data is modified, the initial Hash value For the cryptographic Hash in the user data block chain.
7. device as claimed in claim 6, which is characterized in that further include:
Second determining module, for the integrality for the user data determined and first definitive result to be compared, with Determine the correctness of first definitive result;
Wherein, the communication module is also used to send a notification message to the requesting terminal, and the notification message includes determining institute State the result of the correctness of the first definitive result.
8. device as claimed in claim 6, which is characterized in that the corresponding user data of the user data block chain, at least It include: the first user data and second user data, the second user data have with first user data to be associated with Property;
The computing module, specifically for the first Kazakhstan is calculated according to the first user data in the user data block chain Uncommon value, according in the user data block chain second user data and first cryptographic Hash verifying Hash is calculated Value.
9. such as the described in any item devices of claim 6 to 8, which is characterized in that further include:
Module is obtained, for obtaining the corresponding user information in the requesting terminal, request is included at least in the user information eventually The user identifier at end, and the user identifier pair for the requesting terminal for calling storage assembly acquisition to be stored in the storage assembly The security information answered passes through the meter if the corresponding security information of the user identifier of the requesting terminal meets preset condition It calculates module execution and verifying is calculated to the corresponding user data of the user data block chain according to data verification request Cryptographic Hash.
10. device as claimed in claim 6, which is characterized in that further include:
Third determining module for obtaining the user identifier of each user data in the target terminal, and determines described each The corresponding job information of the user identifier of a user data determines the user of each user data according to the job information Identify corresponding ability rating;
Execution module is receiving the ability rating if the ability rating for the user identifier is within a preset range When the recommendation information of user identifier within a preset range, the corresponding content of the recommendation information is executed.
CN201810959037.5A 2018-08-22 2018-08-22 Data processing method and device Active CN109145651B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810959037.5A CN109145651B (en) 2018-08-22 2018-08-22 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810959037.5A CN109145651B (en) 2018-08-22 2018-08-22 Data processing method and device

Publications (2)

Publication Number Publication Date
CN109145651A true CN109145651A (en) 2019-01-04
CN109145651B CN109145651B (en) 2021-12-28

Family

ID=64790684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810959037.5A Active CN109145651B (en) 2018-08-22 2018-08-22 Data processing method and device

Country Status (1)

Country Link
CN (1) CN109145651B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110083775A (en) * 2019-05-13 2019-08-02 北京顺丰同城科技有限公司 A kind of configuration method and configuration device for recommending resource
CN110351089A (en) * 2019-05-23 2019-10-18 西安电子科技大学 A kind of data signature authentication method and device
CN111429136A (en) * 2020-03-05 2020-07-17 合肥达朴汇联科技有限公司 Data auditing method and device based on block chain
CN112487492A (en) * 2019-04-04 2021-03-12 创新先进技术有限公司 Data verification method, system and equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040205315A1 (en) * 2000-12-28 2004-10-14 Ripley Micheal S. Verifying the integrity of a media key block by storing validation data in the validation area of media
KR100772881B1 (en) * 2006-05-25 2007-11-05 삼성전자주식회사 Apparatus and method for checking self modifying code
US20080256363A1 (en) * 2007-04-13 2008-10-16 Boris Balacheff Trusted component update system and method
CN102609658A (en) * 2012-02-15 2012-07-25 何晓行 Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system
CN106203179A (en) * 2016-07-12 2016-12-07 何晓行 A kind of completeness check system and method to file
CN106230880A (en) * 2016-07-12 2016-12-14 何晓行 A kind of storage method of data and application server
CN107580030A (en) * 2017-08-18 2018-01-12 重庆邮电大学 A kind of data managing method, device and server
CN108256353A (en) * 2018-01-11 2018-07-06 武汉斗鱼网络科技有限公司 A kind of data integrity verifying method, apparatus and client
CN108427601A (en) * 2017-02-13 2018-08-21 北京航空航天大学 A kind of cluster transaction processing method of privately owned chain node

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040205315A1 (en) * 2000-12-28 2004-10-14 Ripley Micheal S. Verifying the integrity of a media key block by storing validation data in the validation area of media
KR100772881B1 (en) * 2006-05-25 2007-11-05 삼성전자주식회사 Apparatus and method for checking self modifying code
US20080256363A1 (en) * 2007-04-13 2008-10-16 Boris Balacheff Trusted component update system and method
CN102609658A (en) * 2012-02-15 2012-07-25 何晓行 Electronic evidence consolidating device, electronic evidence consolidating method and electronic evidence consolidating system
CN106203179A (en) * 2016-07-12 2016-12-07 何晓行 A kind of completeness check system and method to file
CN106230880A (en) * 2016-07-12 2016-12-14 何晓行 A kind of storage method of data and application server
CN108427601A (en) * 2017-02-13 2018-08-21 北京航空航天大学 A kind of cluster transaction processing method of privately owned chain node
CN107580030A (en) * 2017-08-18 2018-01-12 重庆邮电大学 A kind of data managing method, device and server
CN108256353A (en) * 2018-01-11 2018-07-06 武汉斗鱼网络科技有限公司 A kind of data integrity verifying method, apparatus and client

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
NISHARA NIZAMUDDIN: "IPFS-Blockchain-based Authenticity of Online Publications", 《ICBC 2018》 *
WENTONG WANG: "BlockCAM: A Blockchain-based Cross-domain Authentication Model", 《2018 IEEE THIRD INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE》 *
XUEPING LIANG: "Towards Data Assurance and Resilience in IoT Using Blockchain", 《2017 IEEE MILITARY COMMUNICATIONS CONFERENCE(MILCOM)》 *
丁庆洋 等: "基于区块链的信息物理融合系统的信息安全保护框架", 《计算机科学》 *
颜湘涛 等: "基于哈希树的云存储完整性检测算法", 《计算机科学》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112487492A (en) * 2019-04-04 2021-03-12 创新先进技术有限公司 Data verification method, system and equipment
CN112487492B (en) * 2019-04-04 2023-11-17 创新先进技术有限公司 Data verification method, system and equipment
CN110083775A (en) * 2019-05-13 2019-08-02 北京顺丰同城科技有限公司 A kind of configuration method and configuration device for recommending resource
CN110083775B (en) * 2019-05-13 2021-06-25 北京顺丰同城科技有限公司 Configuration method and configuration device for recommended resources
CN110351089A (en) * 2019-05-23 2019-10-18 西安电子科技大学 A kind of data signature authentication method and device
CN111429136A (en) * 2020-03-05 2020-07-17 合肥达朴汇联科技有限公司 Data auditing method and device based on block chain
CN111429136B (en) * 2020-03-05 2023-04-28 合肥达朴汇联科技有限公司 Block chain-based data auditing method and device

Also Published As

Publication number Publication date
CN109145651B (en) 2021-12-28

Similar Documents

Publication Publication Date Title
CN109145651A (en) A kind of data processing method and device
CN109815657B (en) Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment
CN106453415B (en) Block chain-based equipment authentication method, authentication server and user equipment
CN107798038B (en) Data response method and data response equipment
CN106911687B (en) Page construction control method and device
CN107040585A (en) A kind of method and device of business verification
CN104767714B (en) A kind of ID and the correlating method of user resources information, terminal and system
CN109831487A (en) Fragmented file verification method and terminal equipment
CN110351089A (en) A kind of data signature authentication method and device
CN104917749A (en) Account registration method and device
CN108173938A (en) Server load shunt method and device
CN104836777B (en) Identity verification method and system
CN108073351A (en) The date storage method and credible chip of nonvolatile storage space in chip
CN109344599A (en) A kind of authentication management method, device, terminal and medium
CN111176918A (en) Server testing method, system, equipment and computer readable storage medium
CN113268336A (en) Service acquisition method, device, equipment and readable medium
CN107612877A (en) Verify the methods, devices and systems of multimedia file legitimacy
CN105072197A (en) Information-recommending method and device
CN106209970A (en) Determine the method and apparatus of the network state being connected between subscriber equipment with routing device
CN108280024B (en) Flow distribution strategy testing method and device and electronic equipment
CN113468276A (en) Trusted data acquisition method and device of on-chain prediction machine and electronic equipment
CN104917720A (en) Method and device for resetting password
CN116701367A (en) Data repeatability verification method, device and equipment based on bloom filter
CN109818915B (en) Information processing method and device, server and readable storage medium
CN110585717B (en) Information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant