CN109493061A - A kind of verification method, device, electronic equipment and the storage medium of the data of block chain - Google Patents

A kind of verification method, device, electronic equipment and the storage medium of the data of block chain Download PDF

Info

Publication number
CN109493061A
CN109493061A CN201811622433.5A CN201811622433A CN109493061A CN 109493061 A CN109493061 A CN 109493061A CN 201811622433 A CN201811622433 A CN 201811622433A CN 109493061 A CN109493061 A CN 109493061A
Authority
CN
China
Prior art keywords
block
block chain
upper layer
data
chain network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811622433.5A
Other languages
Chinese (zh)
Other versions
CN109493061B (en
Inventor
张焱
施逸
邓晓军
田宝同
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Da Pu Hui Couplet Technology Co Ltd
Original Assignee
Hefei Da Pu Hui Couplet Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Da Pu Hui Couplet Technology Co Ltd filed Critical Hefei Da Pu Hui Couplet Technology Co Ltd
Priority to CN201811622433.5A priority Critical patent/CN109493061B/en
Publication of CN109493061A publication Critical patent/CN109493061A/en
Application granted granted Critical
Publication of CN109493061B publication Critical patent/CN109493061B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of data verification methods of block chain, device, electronic equipment and storage medium, block chain network includes bottom block chain network and at least one upper layer block chain network, the bottom block chain network includes multiple bottom block chain link points, the upper layer block chain network includes multiple upper layer block chain link points, the method is applied to upper layer block chain link point, it include: that the block data in block chain network corresponding upper layer block chain in upper layer belonging to this node is sent to bottom block chain link point, so that each bottom block chain link point will be in the corresponding bottom block chain of block data deposit bottom block chain network by common recognition verifying;For the either block in block chain network corresponding upper layer block chain in upper layer belonging to this node, the block data corresponding with the block stored in bottom block chain is obtained, the legitimacy of the block is verified based on the block data.Using the embodiment of the present invention, data can be verified.

Description

A kind of verification method, device, electronic equipment and the storage medium of the data of block chain
Technical field
This disclosure relates to Internet technical field, verification method, dress more particularly, to a kind of data of block chain It sets, electronic equipment and storage medium.
Background technique
Block chain is a kind of distributed book keeping operation technology.It since block chain has decentralization, can not distort, be not necessarily to third party Trust the advantages of assuring and earns widespread respect.
There is variety of problems for current main-stream block chain network.Wherein distinct issues are transaction handling capacities per second the most (tps) wretched insufficiency.Visa average 1667 transactions of processing per second at 2016, and bit coin is per second is only capable of handling 3 to 4 Transaction, ether mill is per second to be only capable of 20 transactions of processing.In order to make block chain become a kind of really available technology of transferring accounts, expand Transaction handling capacity per second is very urgent.
Also, block chain network is at the initial stage being created, due to full node rare numbers and machine power at long last it is frail, Node of easily being done evil is distorted or is attacked by hacker.Thus it may cause the even entire block chain of a large amount of economic loss The avalanche of system.
Summary of the invention
Technical problem to be solved by the present invention lies in verification method, device, the electricity of the data for providing a kind of block chain Sub- equipment and storage medium, to be verified to data.
The present invention is to solve above-mentioned technical problem by the following technical programs:
The embodiment of the invention provides a kind of data verification method of block chain, block chain network includes bottom block link network Network and at least one upper layer block chain network, the bottom block chain network includes multiple bottom block chain link points, the upper layer Block chain network includes multiple upper layer block chain link points, and the method is applied to upper layer block chain link point, comprising:
Block data in block chain network corresponding upper layer block chain in upper layer belonging to this node is sent to bottom region Block chain node, so that each bottom block chain link point is corresponding by block data deposit bottom block chain network by common recognition verifying Bottom block chain in.
For the either block in block chain network corresponding upper layer block chain in upper layer belonging to this node, bottom region is obtained The block data corresponding with the block stored in block chain, the legitimacy of the block is verified based on the block data.
Optionally, the block data includes the corresponding cryptographic Hash of block;
It is described to obtain the block data corresponding with the block stored in bottom block chain, it is based on the block data The legitimacy for verifying the block includes: the cryptographic Hash corresponding with the block for obtaining and being stored in bottom block chain, works as institute The cryptographic Hash of acquisition and the block currently corresponding cryptographic Hash difference when, determine that the block is illegal, when acquired Kazakhstan Uncommon value and the block determine that the block is legal when currently corresponding cryptographic Hash is identical.
Optionally, it when determining that the block is illegal, is stored using bottom block chain corresponding with the block Block data carries out data recovery to the block.
Optionally, different upper layer block chain networks corresponds to different upper layer block chains, and different upper layer block chains is deposited Storage corresponds to the Transaction Information of different type product.
The embodiment of the invention provides a kind of data verification device of block chain, block chain network includes bottom block link network Network and at least one upper layer block chain network, the bottom block chain network includes multiple bottom block chain link points, the upper layer Block chain network includes multiple upper layer block chain link points, and described device is applied to upper layer block chain link point, comprising:
Secure processing module, for by the block in block chain network corresponding upper layer block chain in upper layer belonging to this node Data are sent to bottom block chain link point, so that the block data is stored in bottom by common recognition verifying by each bottom block chain link point In the corresponding bottom block chain of layer block chain network.
Authentication module, for for any area in block chain network corresponding upper layer block chain in upper layer belonging to this node Block obtains the block data corresponding with the block stored in bottom block chain, based on described in block data verifying The legitimacy of block.
Optionally, the block data includes the corresponding cryptographic Hash of block;
The authentication module obtains the block data corresponding with the block stored in bottom block chain, based on described The legitimacy that block data verifies the block includes: the authentication module, for obtain stored in bottom block chain with The corresponding cryptographic Hash of the block determines institute when acquired cryptographic Hash is with the block currently corresponding cryptographic Hash difference It states that block is illegal, when currently corresponding cryptographic Hash is identical for acquired cryptographic Hash and the block, determines that the block closes Method.
Optionally, described device further include:
Recovery module being stored with the block for when determining that the block is illegal using bottom block chain Corresponding block data carries out data recovery to the block.
Optionally, different upper layer block chain networks corresponds to different upper layer block chains, and different upper layer block chains is deposited Storage corresponds to the Transaction Information of different type product.
The embodiment of the invention provides a kind of computer equipment, including memory, processor and storage are on a memory simultaneously The computer program that can be run on a processor realizes area described in any of the above embodiments when the processor executes described program The data processing method of block chain.
The embodiment of the invention provides a kind of computer readable storage mediums, are stored thereon with executable instruction, the instruction Processor is set to execute the data processing method of block chain described in any of the above embodiments when being executed by processor.
The present invention has the advantage that compared with prior art
Using the embodiment of the present invention, can at least be partially solved/mitigation/inhibit/or even avoid block in the prior art The problems such as chain network transaction handling capacity is small, embryonic stage safety is low, so that the legitimacy of the block data in the block chain of upper layer Obtain the double verification of upper layer block chain network and bottom block chain network.
Detailed description of the invention
Fig. 1 be according to the embodiment of the present disclosure can be with the exemplary system of the data processing method and device of application block chain Framework;
Fig. 2 is a kind of flow diagram of the verification method of block chain data provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of the verifying device of block chain data provided in an embodiment of the present invention;
Fig. 4 diagrammatically illustrates the block diagram of block catenary system according to an embodiment of the present disclosure;
Fig. 5 is diagrammatically illustrated according to the computer equipment for being adapted for carrying out method as described above of the embodiment of the present disclosure Block diagram.
Specific embodiment
It elaborates below to the embodiment of the present invention, the present embodiment carries out under the premise of the technical scheme of the present invention Implement, the detailed implementation method and specific operation process are given, but protection scope of the present invention is not limited to following implementation Example.
The embodiment of the invention provides verification method, device, electronic equipment and the storage medium of a kind of data of block chain, Just a kind of verification method of block chain data provided in an embodiment of the present invention is introduced first below.
In a kind of specific embodiment of the embodiment of the present invention,
The embodiment of the present invention is preferably applied to novel block chain network, which includes bottom block chain network With at least one upper layer block chain network, wherein bottom block chain network includes multiple bottom block chain link points, upper layer block chain Network includes multiple upper layer block chain link points.This method includes block data transmission phase and security hardening stage, block data Transmission phase is executed by upper layer block chain link point, will be in block chain network corresponding upper layer block chain in upper layer belonging to this node Block data is sent to bottom block chain link point,
Fig. 1 be according to the embodiment of the present disclosure can be with the exemplary system of the data processing method and device of application block chain Framework 100.It should be noted that being only the example that can apply the system architecture of the embodiment of the present disclosure shown in Fig. 1, to help this Field technical staff understands the technology contents of the disclosure, but be not meant to the embodiment of the present disclosure may not be usable for other equipment, System, environment or scene.
As shown in Figure 1, system architecture 100 may include multiple electronic equipments (101~107) according to this embodiment.Electricity Sub- equipment (101~107) can be PC (personal computer, PC), network server, database server Deng.Each of electronic equipment (101~107) electronic equipment can have identical or different computing capability.
As an implementation, it can be in communication with each other between multiple electronic equipments, constitute block chain network, each electronics Equipment as a block chain node in the block chain network, the identical block chain database of each block chain node maintenance (under " block chain " is referred to as in text).In addition, each block chain node can provide respectively from different services in system architecture 100 The calculating equipment (such as server/server cluster, terminal device) of side and/or client communication, i.e., respectively as each service Provider and/or the corresponding block chain node of client, each service provider and/or client can pass through corresponding block Chain node carries out the operation such as read-write of data in block chain.
It should be understood that the number of the electronic equipment in Fig. 1 is only schematical.According to needs are realized, it can have and appoint The electronic equipment for number of anticipating.
The data processing method for the block chain that the embodiment of the present disclosure provides can be run in electronic equipment shown in FIG. 1.
As shown in Fig. 2, this method is applied in block chain network novel constructed by the disclosure, the block chain network packet Bottom block chain network and at least one upper layer block chain network are included, the bottom block chain network includes multiple bottom block chains Node, the upper layer block chain network include multiple upper layer block chain link points.This method is by the upper layer block in block chain network Chain node executes, and the data handling procedure of block chain provided by the disclosure is illustrated from upper layer block chain link point side.
This method is included in operation S201, obtains in block chain network corresponding upper layer block chain in upper layer belonging to this node Block data.
Then, in operation S202, the block data is sent to bottom block chain link point, so that each bottom block chain link Point will be in the corresponding bottom block chain of block data deposit bottom block chain network by common recognition verifying.
As it can be seen that method shown in Fig. 2 is creatively constructed including bottom block chain network and at least one upper layer block The compound double-deck block chain network of chain network, the upper layer for any upper layer block chain network, in the upper layer block chain network Block data in the corresponding block chain of upper layer block chain network can be sent to bottom block chain network by block chain node, The block data in the block chain of upper layer is further stored in bottom block chain by common recognition verifying by bottom block chain link point, is made The legitimacy for obtaining the block data in upper layer block chain obtains the double verification of upper layer block chain network and bottom block chain network, The safety of block data obtains upper layer block chain and bottom block chain duplicate protection, further enhances seeing in many ways for block chain Card, the characteristic that can not be distorted, and since the combination that this programme passes through bottom block chain network and upper layer block chain network will show Some one-dimensional area chain networks are extended to two-dimentional block chain network, and the transaction that can greatly improve entire block chain network is handled up Amount meets demand of the transaction status of current fast development to block chain network.
In one embodiment of the present disclosure, in method shown in Fig. 2 that block chain network in upper layer belonging to this node is corresponding Upper layer block chain link point in block data be sent to bottom block chain link point and can specifically include: when this node is as knowing together It is when node creates new block and is added the new block into the upper layer block chain, the new block is corresponding Data are sent to bottom block chain link point.Alternatively, when this node creates new block and by the new area as node of knowing together When block is added into the upper layer block chain, the corresponding data of preset quantity block before the new block are sent to Bottom block chain link point.
According to the present embodiment, the upper layer for any upper layer block chain network, under a kind of situation, as common recognition node Block chain node can create new block and the block chain is entered the corresponding upper layer block chain of upper layer block chain network While end, the related data of the new block is sent to bottom block chain network, i.e., is generated in upper layer block chain newest Block while the related data of the new block is synchronized to bottom block chain network so that in bottom block chain network Each bottom block chain link point can deposit the related data of the newest block in the upper layer block chain after common recognition verifying Enter in bottom block chain, which is such for each newly generated block in the block chain of upper layer.In this way, upper layer block chain In the newest block that generates every time can synchronously be verified by each bottom block chain link point in bottom block chain network, If there are the feedbacks that problem will obtain bottom block chain network in time for the newest block, and then the upper layer block chain network New block can be entered to avoid the subsequent chain behind the problematic block.
In another scenario, the new area block Bing Jianggai can created as the upper layer block chain link point of common recognition node While block chain enters the end of the corresponding upper layer block chain of upper layer block chain network, the new area will be located in the block chain of upper layer The related data of preset quantity block before block is sent to bottom block chain network, i.e., will have existed in the block chain of upper layer The related data of a period of time, irreversible block is synchronized to bottom block chain network, so that in bottom block chain network Each bottom block chain link point by common recognition verifying after can be by the related data of the irreversible block in the block chain of upper layer It is stored in bottom block chain, which is such for the irreversible block of each of upper layer block chain.In this way, top regions Block chain network by the block chain of upper layer after a period of time state be irreversible block be synchronized to bottom block chain, that is, The higher block of confidence level is directly synchronized to bottom block chain.
It is recognised that no matter which kind of using, the block data in the block chain of upper layer is synchronized to the side in bottom block chain Formula, what is saved in bottom block chain is only legal, the believable block data in each upper layer block chain, especially on upper layer Block chain network is still incomplete, upper layer block chain link point quantity is smaller, leads to the legal of the block stored in the block chain of upper layer In the case of property and safety are lower, this programme stores the block counts for confirming believable upper layer block chain in bottom block chain According to, help upper layer block chain network carry out trust data reinforcing and backup, using as in the block chain of upper layer block it is legal according to According to, facilitate safeguard upper layer block chain network stabilization.
In operation S203, for any area in block chain network corresponding upper layer block chain in upper layer belonging to this node Block obtains the block data corresponding with the block in the block chain of upper layer stored in bottom block chain, based on acquired Block data verifies the legitimacy of the block in upper layer block chain.
In accordance with an embodiment of the present disclosure, can at least be partially solved/mitigation/inhibit/or even avoid area in the prior art Block chain network is traded, and handling capacity is small, the problems such as embryonic stage safety is low, so that the block data in the block chain of upper layer is legal Property obtains the double verification of upper layer block chain network and bottom block chain network, and the safety of block data obtains upper layer block chain With bottom block chain duplicate protection, the multi-party characteristic that witnesses, can not distort of block chain is further enhanced, and due to this programme Existing one-dimensional area chain network is extended to two-dimentional block by the combination of bottom block chain network and upper layer block chain network Chain network can greatly improve the transaction handling capacity of entire block chain network, meet the transaction status pair of current fast development The demand of block chain network.
Specifically, as an optional embodiment, block data includes the corresponding cryptographic Hash of block.Above-mentioned acquisition bottom The block data corresponding with the block in the block chain of upper layer stored in block chain is verified based on acquired block data The legitimacy of the block in the block chain of upper layer include: obtain bottom block chain in stored with the upper layer area block Lian Zhonggai The corresponding cryptographic Hash of block, when acquired cryptographic Hash is with the block currently corresponding cryptographic Hash difference in the block chain of upper layer, Determine that the block in the block chain of upper layer is illegal, when acquired cryptographic Hash and the block in the block chain of upper layer are currently corresponding Cryptographic Hash it is identical when, determine that the block in the block chain of upper layer is legal.
The present embodiment can cope with the case where block in the block chain of upper layer is by malicious attack, for example, upper layer block A certain block A in chain its data for being included when generating be it is legal, the corresponding block data of block A is synchronized to In bottom block chain network, the corresponding block data of block A is stored in bottom after common recognition verifying by each bottom block chain link point In layer block chain, since the more complete and bottom block chain link point number of bottom block chain network development is more, it is stored in bottom block The corresponding block data of block A in upper layer block chain in chain will not be tampered under common recognition supervision.Then when upper layer block When block A in chain may be tampered, the block data of the block A that can be stored using in bottom block chain is as closing Method foundation specifically obtains the corresponding cryptographic Hash 1 of block A stored in bottom block chain, obtains current upper layer block chain In the corresponding cryptographic Hash 2 of block A determine that the block A in the block chain of upper layer is certain when cryptographic Hash 2 is different from cryptographic Hash 1 It is tampered, otherwise is not tampered, be still legal.
Further, the block data of the upper layer block chain stored in above-described embodiment using in bottom block chain is as upper layer The validity judgement foundation of block in block chain, judgement obtain block in the block chain of upper layer it is whether legal after, in the disclosure One embodiment in, method shown in Fig. 2 further include: when determining that the block in the block chain of upper layer is illegal, utilize bottom The block data corresponding with the block in the block chain of upper layer that block chain is stored carries out the block in the block chain of upper layer Data are restored.
Example above is continued to use, after the block A in confirmation upper layer block chain is tampered really, can use bottom In layer block chain the corresponding believable block data of block A that is stored to the block A being tampered in the block chain of upper layer into Row restores, to restore the genuine and believable of upper layer block chain.The present embodiment is less for upper layer block chain network interior joint, top regions Block is easy the case where being tampered, forging, can be with when upper layer, block chain can not lean on itself common recognition mechanism to restore correct data The backup in bottom block chain is relied on to restore to the data in the block chain of upper layer.
Corresponding with embodiment illustrated in fig. 2 of the present invention, the embodiment of the invention also provides a kind of data verifications of block chain Device.
Fig. 3 is a kind of structural schematic diagram of the verifying device of block chain data provided in an embodiment of the present invention, such as Fig. 3 institute Show, the data verification device 300 of the block chain is applied to upper layer block chain link point, comprising: secure processing module 310, verifying mould Block 320.
Wherein secure processing module 310, for by block chain network corresponding upper layer block chain in upper layer belonging to this node In block data be sent to bottom block chain link point so that each bottom block chain link point is by common recognition verifying by the block counts According in the corresponding bottom block chain of deposit bottom block chain network.
Authentication module 320 is used for for any in block chain network corresponding upper layer block chain in upper layer belonging to this node Block obtains the block data corresponding with the block stored in bottom block chain, verifies institute based on the block data State the legitimacy of block.
Specifically, as an optional embodiment, above-mentioned block data includes the corresponding cryptographic Hash of block.Authentication module The block data corresponding with the block stored in 320 acquisition bottom block chains, based on described in block data verifying The legitimacy of block includes: authentication module 320 for obtaining the Hash corresponding with the block stored in bottom block chain Value, when acquired cryptographic Hash is with the block currently corresponding cryptographic Hash difference, determines that the block is illegal, when being obtained The cryptographic Hash taken and the block determine that the block is legal when currently corresponding cryptographic Hash is identical.
In one embodiment of the present disclosure, 330 (not shown) of recovery module is used to not conform to when the determining block When method, data recovery is carried out to the block using the block data corresponding with the block that bottom block chain is stored.
Fig. 4 diagrammatically illustrates the block diagram of block catenary system according to an embodiment of the present disclosure.
As shown in figure 4, the block catenary system 400 includes: bottom block chain network 410 and at least one upper layer block link network Network 420.
Bottom block chain network 410 includes multiple bottom block chain link points 411, and upper layer block chain network 420 includes multiple Upper layer block chain link point 421.
Upper layer block chain link point 421 is used for will be in the corresponding upper layer block chain of upper layer block chain network 420 belonging to it Block data is sent to bottom block chain link point 411.
Bottom block chain link point 411 is used to broadcast the block data received to each bottom block chain link point 411, so that The block data is stored in the corresponding bottom of bottom block chain network 410 by common recognition verifying by each bottom block chain link point 411 In block chain.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution Art problem, the function of realization and the technical effect reached respectively with the implementation of corresponding step each in method section Example Mode, the technical issues of solving, the function of realization and the technical effect that reaches are same or like, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, secure processing module 310, authentication module 320 may be incorporated in a module and realize or therein Module of anticipating can be split into multiple modules.Alternatively, at least partly function of one or more modules in these modules It can combine at least partly function of other modules, and be realized in a module.In accordance with an embodiment of the present disclosure, safety Processing module 310, authentication module 320 can at least be implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC), it or can be realized by carrying out the hardware such as any other rational method that is integrated or encapsulating or firmware to circuit, Or it several appropriately combined is realized with any one in three kinds of software, hardware and firmware implementations or with wherein any. Alternatively, secure processing module 310, authentication module 320 can at least be implemented partly as computer program module, when the calculating When machine program module is run, corresponding function can be executed.
Fig. 5 is diagrammatically illustrated according to the computer equipment for being adapted for carrying out method as described above of the embodiment of the present disclosure Block diagram.Computer equipment shown in Fig. 5 is only an example, should not function to the embodiment of the present disclosure and use scope bring Any restrictions.
As shown in figure 5, include processor 501 according to the computer equipment 500 of the embodiment of the present disclosure, it can be according to storage It is loaded into random access storage device (RAM) 503 in the program in read-only memory (ROM) 502 or from storage section 508 Program and execute various movements appropriate and processing.Processor 501 for example may include general purpose microprocessor (such as CPU), refer to Enable set processor and/or related chip group and/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processing Device 501 can also include the onboard storage device for caching purposes.Processor 501 may include for executing according to disclosure reality Apply single treatment unit either multiple processing units of the different movements of the method flow of example.
In RAM 503, it is stored with equipment 500 and operates required various programs and data.Processor 501, ROM 502 with And RAM 503 is connected with each other by bus 504.Processor 501 is held by executing the program in ROM 502 and/or RAM 503 The various operations gone according to the method flow of the embodiment of the present disclosure.It is noted that described program also can store except ROM 502 In one or more memories other than RAM 503.Processor 501 can also be stored in one or more of by execution Program in memory executes the various operations of the method flow according to the embodiment of the present disclosure.
In accordance with an embodiment of the present disclosure, equipment 500 can also include input/output (I/O) interface 505, input/output (I/O) interface 505 is also connected to bus 504.Equipment 500 can also include be connected to I/O interface 505 with one in lower component Item is multinomial: the importation 506 including keyboard, mouse etc.;Including such as cathode-ray tube (CRT), liquid crystal display (LCD) Deng and loudspeaker etc. output par, c 507;Storage section 508 including hard disk etc.;And including such as LAN card, modulatedemodulate Adjust the communications portion 509 of the network interface card of device etc..Communications portion 509 executes communication process via the network of such as internet. Driver 510 is also connected to I/O interface 505 as needed.Detachable media 511, such as disk, CD, magneto-optic disk, semiconductor Memory etc. is mounted on as needed on driver 510, in order to be pacified as needed from the computer program read thereon It is packed into storage section 508.
In accordance with an embodiment of the present disclosure, computer software journey may be implemented as according to the method flow of the embodiment of the present disclosure Sequence.For example, embodiment of the disclosure includes a kind of computer program product comprising carry meter on a computer-readable medium Calculation machine program, the computer program include the program code for method shown in execution flow chart.In such embodiments, The computer program can be downloaded and installed from network by communications portion 509, and/or be pacified from detachable media 511 Dress.When the computer program is executed by processor 501, the above-mentioned function of limiting in the system of the embodiment of the present disclosure is executed.Root According to embodiment of the disclosure, system as described above, unit, module, unit etc. can by computer program module come It realizes.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/ In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.For example, in accordance with an embodiment of the present disclosure, computer readable storage medium may include above-described One or more memories other than ROM 502 and/or RAM 503 and/or ROM 502 and RAM 503.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of data verification method of block chain, block chain network includes bottom block chain network and at least one upper layer block Chain network, the bottom block chain network include multiple bottom block chain link points, and the upper layer block chain network includes on multiple Layer block chain node, which is characterized in that the method is applied to upper layer block chain link point, comprising:
Block data in block chain network corresponding upper layer block chain in upper layer belonging to this node is sent to bottom block chain Node, so that the block data is stored in the corresponding bottom of bottom block chain network by common recognition verifying by each bottom block chain link point In layer block chain;
For the either block in block chain network corresponding upper layer block chain in upper layer belonging to this node, bottom block chain is obtained Middle stored block data corresponding with the block, the legitimacy of the block is verified based on the block data.
2. the method according to claim 1, wherein the block data includes the corresponding cryptographic Hash of block;
It is described to obtain the block data corresponding with the block stored in bottom block chain, it is verified based on the block data The legitimacy of the block includes: the cryptographic Hash corresponding with the block for obtaining and being stored in bottom block chain, when acquired Cryptographic Hash and the block currently corresponding cryptographic Hash difference when, determine that the block is illegal, when acquired cryptographic Hash When currently corresponding cryptographic Hash is identical with the block, determine that the block is legal.
3. according to the method described in claim 2, it is characterized in that, utilizing bottom block when determining that the block is illegal The block data corresponding with the block that chain is stored carries out data recovery to the block.
4. the method according to claim 1, wherein different upper layer block chain networks corresponds to different upper layers Block chain, different upper layer block chain storages correspond to the Transaction Information of different type product.
5. a kind of data verification device of block chain, block chain network includes bottom block chain network and at least one upper layer block Chain network, the bottom block chain network include multiple bottom block chain link points, and the upper layer block chain network includes on multiple Layer block chain node, which is characterized in that described device is applied to upper layer block chain link point, comprising:
Secure processing module, for by the block data in block chain network corresponding upper layer block chain in upper layer belonging to this node It is sent to bottom block chain link point, so that the block data is stored in bottom region by common recognition verifying by each bottom block chain link point In the corresponding bottom block chain of block chain network.
Authentication module, for for the either block in block chain network corresponding upper layer block chain in upper layer belonging to this node, The block data corresponding with the block stored in bottom block chain is obtained, the block is verified based on the block data Legitimacy.
6. device according to claim 5, which is characterized in that the block data includes the corresponding cryptographic Hash of block;
The authentication module obtains the block data corresponding with the block stored in bottom block chain, is based on the block The legitimacy of block described in data verification includes: the authentication module, for obtain stored in bottom block chain with it is described The corresponding cryptographic Hash of block determines the area when acquired cryptographic Hash is with the block currently corresponding cryptographic Hash difference Block is illegal, when currently corresponding cryptographic Hash is identical for acquired cryptographic Hash and the block, determines that the block is legal.
7. device according to claim 6, which is characterized in that described device further include:
Recovery module, for being stored using bottom block chain corresponding with the block when determining that the block is illegal Block data to the block carry out data recovery.
8. device according to claim 5, which is characterized in that different upper layer block chain networks corresponds to different upper layers Block chain, different upper layer block chain storages correspond to the Transaction Information of different type product.
9. a kind of computer equipment, which is characterized in that on a memory and can be in processor including memory, processor and storage The computer program of upper operation when the processor executes described program, realizes such as area of any of claims 1-4 The data processing method of block chain.
10. a kind of computer readable storage medium, which is characterized in that be stored thereon with executable instruction, the instruction is by processor Processor is set to execute the data processing method such as block chain of any of claims 1-4 when execution.
CN201811622433.5A 2018-12-28 2018-12-28 Verification method and device for data of block chain, electronic equipment and storage medium Active CN109493061B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811622433.5A CN109493061B (en) 2018-12-28 2018-12-28 Verification method and device for data of block chain, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811622433.5A CN109493061B (en) 2018-12-28 2018-12-28 Verification method and device for data of block chain, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109493061A true CN109493061A (en) 2019-03-19
CN109493061B CN109493061B (en) 2021-03-23

Family

ID=65712928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811622433.5A Active CN109493061B (en) 2018-12-28 2018-12-28 Verification method and device for data of block chain, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109493061B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110942316A (en) * 2019-12-04 2020-03-31 趣派(海南)信息科技有限公司 Transfer verification method and system based on multi-party verification
CN110995664A (en) * 2019-11-15 2020-04-10 国网河南省电力公司信息通信公司 Block chain-based Internet of things heterogeneous identifier analysis system and method
CN111143381A (en) * 2019-12-11 2020-05-12 支付宝(杭州)信息技术有限公司 Method and apparatus for updating trust points in a multi-level blockchain structure
CN111262921A (en) * 2020-01-13 2020-06-09 北京百度网讯科技有限公司 Application request processing method, device, equipment and medium based on block chain network
CN111488349A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 Data query method and device based on service data block chain
CN111723158A (en) * 2020-03-16 2020-09-29 支付宝(杭州)信息技术有限公司 Method, apparatus and computing device for data synchronization in blockchain network
CN111768202A (en) * 2019-04-24 2020-10-13 北京京东尚科信息技术有限公司 Payment verification method, payment verification node, full-amount node and storage medium
CN111902815A (en) * 2020-03-11 2020-11-06 合肥达朴汇联科技有限公司 Data transfer method, system, device, electronic device, and readable storage medium
CN111915301A (en) * 2020-08-05 2020-11-10 腾讯科技(深圳)有限公司 Data processing method and device based on block chain, electronic equipment and readable medium
CN112633882A (en) * 2020-12-28 2021-04-09 青岛海链数字科技有限公司 Block chain network, data storage method and device, electronic equipment and storage medium
CN113010903A (en) * 2021-02-22 2021-06-22 杭州肥牛信息科技有限公司 Catering industry oil smoke online monitoring method and system based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
CN107358420A (en) * 2017-06-09 2017-11-17 北京博晨技术有限公司 Method for realizing the block catenary system of focus account and realizing focus account
EP3413254A1 (en) * 2017-06-06 2018-12-12 Siemens Aktiengesellschaft Method and device for providing a transaction dataset

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
EP3413254A1 (en) * 2017-06-06 2018-12-12 Siemens Aktiengesellschaft Method and device for providing a transaction dataset
CN107358420A (en) * 2017-06-09 2017-11-17 北京博晨技术有限公司 Method for realizing the block catenary system of focus account and realizing focus account

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768202A (en) * 2019-04-24 2020-10-13 北京京东尚科信息技术有限公司 Payment verification method, payment verification node, full-amount node and storage medium
CN110995664A (en) * 2019-11-15 2020-04-10 国网河南省电力公司信息通信公司 Block chain-based Internet of things heterogeneous identifier analysis system and method
CN110995664B (en) * 2019-11-15 2021-10-08 国网河南省电力公司信息通信公司 Block chain-based Internet of things heterogeneous identifier analysis system and method
CN110942316A (en) * 2019-12-04 2020-03-31 趣派(海南)信息科技有限公司 Transfer verification method and system based on multi-party verification
CN111143381A (en) * 2019-12-11 2020-05-12 支付宝(杭州)信息技术有限公司 Method and apparatus for updating trust points in a multi-level blockchain structure
CN111143381B (en) * 2019-12-11 2023-05-19 支付宝(杭州)信息技术有限公司 Method and device for updating trust points in multi-layer block chain structure
CN111262921A (en) * 2020-01-13 2020-06-09 北京百度网讯科技有限公司 Application request processing method, device, equipment and medium based on block chain network
CN111902815A (en) * 2020-03-11 2020-11-06 合肥达朴汇联科技有限公司 Data transfer method, system, device, electronic device, and readable storage medium
WO2021179203A1 (en) * 2020-03-11 2021-09-16 合肥达朴汇联科技有限公司 Data transmission method, system and device, electronic device, and readable storage medium
CN111902815B (en) * 2020-03-11 2023-06-27 合肥达朴汇联科技有限公司 Data transmission method, system, device, electronic device and readable storage medium
CN111723158A (en) * 2020-03-16 2020-09-29 支付宝(杭州)信息技术有限公司 Method, apparatus and computing device for data synchronization in blockchain network
CN111488349A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 Data query method and device based on service data block chain
CN111915301A (en) * 2020-08-05 2020-11-10 腾讯科技(深圳)有限公司 Data processing method and device based on block chain, electronic equipment and readable medium
CN112633882A (en) * 2020-12-28 2021-04-09 青岛海链数字科技有限公司 Block chain network, data storage method and device, electronic equipment and storage medium
CN113010903A (en) * 2021-02-22 2021-06-22 杭州肥牛信息科技有限公司 Catering industry oil smoke online monitoring method and system based on block chain

Also Published As

Publication number Publication date
CN109493061B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
CN109493061A (en) A kind of verification method, device, electronic equipment and the storage medium of the data of block chain
US11444777B2 (en) Method and system for providing validated, auditable, and immutable inputs to a smart contract
CN106230851B (en) Data security method and system based on block chain
US10410018B2 (en) Cryptographic assurances of data integrity for data crossing trust boundaries
US11977537B2 (en) Method and device of processing data for blockchain, and blockchain system
CN102170440B (en) Method suitable for safely migrating data between storage clouds
US20190378220A1 (en) Automated remote payments between a vehicle and a refueling station
CN107508806A (en) Internet financial electronic data safety system and method based on block chain
US20120324229A1 (en) System and method for generating keyless digital multi-signatures
CN109727132B (en) Method and device for acquiring block chain consensus node, electronic equipment and storage medium
CN107171812A (en) It is a kind of based on block chain without key signature infrastructure construction method
CN110084600B (en) Processing and verifying method, device, equipment and medium for resolution transaction request
CN110245522B (en) Data processing method, terminal and medium in block chain fund settlement system
CN109729163A (en) A kind of data processing method of block chain, device electronic equipment and storage medium
CN109447384A (en) Verification method, device, equipment and the storage medium of air control system
CN112311779B (en) Data access control method and device applied to block chain system
US9246688B1 (en) Dataset licensing
CN109785145B (en) Fixed-point drugstore financing method based on block chain, storage medium and computer equipment
CN107612969A (en) Cloud storage data integrity auditing method based on B Tree Bloom filters
CN104394166A (en) Certificate anti-fake authentication system and method for mobile terminal under cloud environment
CN106991332A (en) The method and device that a kind of mass data is stored safely
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN111144958B (en) Electronic invoice issuing method, device and system based on block chain
CN112835854A (en) File storage method and device, electronic equipment and storage medium
CN111698227A (en) Information synchronization management method, device, computer system and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant