CN109688186A - Data interactive method, device, equipment and readable storage medium storing program for executing - Google Patents
Data interactive method, device, equipment and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN109688186A CN109688186A CN201811008900.5A CN201811008900A CN109688186A CN 109688186 A CN109688186 A CN 109688186A CN 201811008900 A CN201811008900 A CN 201811008900A CN 109688186 A CN109688186 A CN 109688186A
- Authority
- CN
- China
- Prior art keywords
- interactive information
- chain
- data
- alliance
- interaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Abstract
The invention discloses a kind of data interactive method, device, equipment and readable storage medium storing program for executing, the method comprising the steps of: after the receiving node in alliance's chain receives the interaction request of data interaction, obtain corresponding first interactive information of the interaction request, wherein, alliance's chain is arranged in the server;First interactive information is detected with the presence or absence of in the white list and the first blacklist of each node of alliance's chain, obtains testing result;If the testing result meets the first preset condition, the interaction request is executed.The present invention reduces the data interaction of server by the decentralization characteristic of block chain, reduce the data processing pressure of server, and due to each node in alliance's chain be it is mutually indepedent and only authorize after node can just coalize in chain, improve the reliability of server.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of data interactive method, device, equipment and readable storage mediums
Matter.
Background technique
The server that current data interaction is all based on centralization carries out data interaction, i.e. first terminal needs and second
Terminal carries out data interaction, needs first to send the data to server, is transmitted to the second client by server, when client terminates
After receiving the data, then response results are sent to server, response results are sent to first terminal by server, to realize
The data interaction of first terminal and second terminal.It follows that frequent data interaction will cause huge pressure to server
Power, and the framework based on central server, only central server are reliable and are trusted, other nodes are all not trusted,
Cause the reliability of server low.
Summary of the invention
The main purpose of the present invention is to provide a kind of data interactive method, device, equipment and readable storage medium storing program for executing, it is intended to
Solve existing in data exchange process, server data processing pressure is big, the low technical problem of reliability.
To achieve the above object, the present invention provides a kind of data interactive method, the data interactive method comprising steps of
After the receiving node in alliance's chain receives the interaction request of data interaction, it is corresponding to obtain the interaction request
First interactive information, wherein alliance's chain setting is in the server;
First interactive information is detected with the presence or absence of in the white list and the first blacklist of each node of alliance's chain, is obtained
Testing result;
If the testing result meets the first preset condition, the interaction request is executed.
Preferably, after the receiving node when in alliance's chain receives the interaction request of data interaction, the friendship is obtained
Before the step of mutually requesting corresponding first interactive information, further includes:
When detect the receiving node registration registration request after, detect the registration request whether meet it is described
The registration condition of alliance's chain;
If the registration request meets the registration condition, the registration request is executed, and is infused described in successful execution
It detects whether to receive the interaction request after volume request.
Preferably, detection first interactive information is black with the presence or absence of the white list of each node of alliance's chain and first
In list, after the step of obtaining testing result, further includes:
If the testing result does not meet first preset condition, corresponding second interaction of the interaction request is obtained
Information;
The corresponding air control strategy of the receiving node is obtained, detecting second interactive information by the air control strategy is
It is no to meet the second preset condition;
If second interactive information meets second preset condition, start manual examination and verification process, and detect whether
Receive auditing result;
When receiving the auditing result, and determine that the interaction request passes through manual examination and verification according to the auditing result
Afterwards, the interaction request is executed.
Preferably, described to obtain the corresponding air control strategy of the receiving node, described the is detected by the air control strategy
After the step of whether two interactive information meet the second preset condition, further includes:
If second interactive information meets second preset condition, second interactive information is sent to described
Other nodes in alliance's chain in addition to the receiving node, so that whether the second interactive information described in other nodal tests deposits
In corresponding second blacklist, and return to corresponding testing result, wherein each node in alliance's chain all exists pair
The second blacklist answered;
After receiving the testing result, is determined according to the testing result and find institute in second blacklist
State the blacklist quantity of the second interactive information;
If the blacklist quantity is less than or equal to preset quantity, the interaction request is executed.
Preferably, if second interactive information meets second preset condition, second interaction is believed
Breath is sent to other nodes in alliance's chain in addition to the receiving node, so that second hands over described in other nodal tests
Mutual information whether there is in corresponding second blacklist, and the step of returning to corresponding testing result includes:
If second interactive information meets second preset condition, second interactive information is sent to described
Other nodes in alliance's chain in addition to the receiving node, so that other nodes are receiving second interactive information
Afterwards, the classification of second interactive information is determined;
When determining that second interactive information belongs to the first kind, the second interactive information as described in other nodal tests
With the presence or absence of in corresponding second blacklist, and resulting testing result is sent to the receiving node;
When determining that second interactive information belongs to the second class, the current utilization of resources is obtained by other nodes
Rate;
When the resource utilization is less than preset threshold, it is black with the presence or absence of described second to detect second interactive information
In list, and resulting testing result is sent to the receiving node.
Preferably, if second interactive information meets second preset condition, second interaction is believed
Breath is sent to other nodes in alliance's chain in addition to the receiving node, so that second hands over described in other nodal tests
Mutual information whether there is in corresponding second blacklist, and the step of returning to corresponding testing result includes:
If second interactive information meets second preset condition, second interactive information is sent to described
Other nodes in alliance's chain in addition to the receiving node, and when detecting whether to receive the waiting that other nodes are sent
It is long, wherein the waiting time is that other nodes receive second interactive information to obtaining the testing result
Duration;
When receiving the waiting time, and when the waiting time is less than preset duration, detection request is sent to described
Other nodes, so that other nodes are after receiving the detection request, detecting second interactive information whether there is
In corresponding second blacklist, and return to corresponding testing result.
Preferably, the data interactive method further include:
After the receiving node detects loss of data, data have been lost in determination;
Data have been lost described in obtaining from other nodes in alliance's chain, and have lost data described in storage.
In addition, to achieve the above object, the present invention also provides a kind of data interaction device, the data interaction device packet
It includes:
Module is obtained, after for receiving the interaction request of data interaction when the receiving node in alliance's chain, described in acquisition
Corresponding first interactive information of interaction request, wherein alliance's chain setting is in the server;
Detection module whether there is the white list and first of each node of alliance's chain for detecting first interactive information
In blacklist, testing result is obtained;
Execution module executes the interaction request if meeting the first preset condition for the testing result.
In addition, to achieve the above object, the present invention also provides a kind of data interaction equipment, the data interaction equipment includes
Memory, processor and it is stored in the data interaction program that can be run on the memory and on the processor, the number
The step of realizing data interactive method as described above when being executed according to interactive program by the processor.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
Data interaction program is stored on storage medium, the data interaction program realizes data as described above when being executed by processor
The step of exchange method.
The present invention was by the way that after some node in server federation's chain receives the interaction request of data interaction, detection should
Corresponding first interactive information of interaction request is examined with the presence or absence of in the white list and the first blacklist of each node of alliance's chain
It surveys as a result, execute the interaction request if the testing result meets the first preset condition, which is sent to another
Terminal reduces the data processing pressure of server to reduce the data interaction of server by the decentralization characteristic of block chain
Power, and due to each node in alliance's chain be it is mutually indepedent and only authorize after node can just coalize in chain, mention
The high reliability of server;Further, due to each nodes sharing white and black list in alliance's chain, number is improved
According to interactive safety.
Detailed description of the invention
Fig. 1 is the flow diagram of data interactive method first embodiment of the present invention;
Fig. 2 is the flow diagram of data interactive method second embodiment of the present invention;
Fig. 3 is the flow diagram of data interactive method 3rd embodiment of the present invention;
Fig. 4 is the functional schematic module map of data interaction device preferred embodiment of the present invention;
Fig. 5 is the structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present invention provides a kind of data interactive method, and referring to Fig.1, Fig. 1 is data interactive method first embodiment of the present invention
Flow diagram.
The embodiment of the invention provides the embodiments of data interactive method, it should be noted that although showing in flow charts
Go out logical order, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.
In each embodiment of data interactive method, for ease of description, master is executed with some node in alliance's chain
Body is illustrated each embodiment.
Professional term use herein is explained below:
A series of chain that block chain is made of blocks, in addition to the data of minute book block also will record on each piece
One piece Hash (Hash) value forms a chain in this way.There are two the core concepts of block chain, and one is cryptography
Technology, the other is decentralization thought, accomplishes that the historical information on block chain can not be tampered based on the two theories.One
Block is made of build and block, and wherein build is defined including the block height, the significant fields such as cryptographic Hash of a upper block,
And the main store transaction data of block.
Block chain (also referred to as " decentralization degree "), can be divided into three classes: publicly-owned from the degree of opening of access authority
Chain, privately owned chain and alliance's chain.
Each node of alliance's chain usually has corresponding physical mechanism tissue, by that could be added and exit after authorization
Network.Alliance's chain substantially also belongs to privately owned chain, but the node on chain is by more mechanism controls, the privately owned chain of the degree of privatization
It is low.Permission control between the two has a difference simultaneously, the access limit of alliance's chain towards all or part of node on chain,
Permission control design case is increasingly complex.
Node refers in particular to participate in block chain network, carries out the network node of transaction and data exchange, each independent agency
Member can possess one to multiple transaction nodes, and each transaction node is one group of physical network, and computer, block chain is using soft
The combination of part and database.Between node and node, pass through TCP/IP (Transmission Control Protocol/
Internet Protocol, transmission control protocol/Internet Protocol) agreement interconnection.
Data interactive method includes:
Step S10 obtains the interaction and asks after the receiving node in alliance's chain receives the interaction request of data interaction
Seek corresponding first interactive information, wherein alliance's chain setting is in the server.
In the present embodiment, the setting of alliance's chain in the server, will receive what user was sent by its terminal in alliance's chain
The node of interaction request is known as receiving node.After receiving node receives the interaction request of data interaction, receiving node is obtained
Corresponding first interactive information of interaction request.Wherein, which can be triggered as needed by corresponding user, the first interaction
Information includes but is not limited to login account, ID card No. and phone number etc..Login account is that the user infuses in alliance's chain
Account after volume for login.In the present embodiment, just necessary if user needs to carry out data interaction with the node in alliance's chain
It is registered in alliance's chain, possesses its corresponding login account.It should be noted that carrying the first interaction in interaction request
Therefore information after receiving node receives interaction request, can extract the first interactive information, in interaction request to get
First interactive information.
Step S20, detecting first interactive information whether there is the white list and the first black name of each node of alliance's chain
Dan Zhong obtains testing result.
In alliance's chain, each node is owned by the blacklist and white list of oneself, and the node in the chain that coalizes can be total to
Enjoy respective blacklist and white list.When receiving node gets the blacklist and white list of other nodes sharings in alliance's chain
When, the blacklist and white list of other nodes can be stored.In the present embodiment, by the corresponding blacklist of receiving node, alliance's chain
In the blacklists of other nodes sharings be known as the first blacklist.Wherein, there are corresponding nodes for each node in alliance's chain
Mark, in blacklist and white list, carries the node identification of corresponding node, therefore, can be distinguished respectively by node identification
The corresponding blacklist of a node and white list.
After receiving node gets interaction request corresponding first interactive information, receiving node detects the first interactive information
With the presence or absence of in the white list and the first blacklist of each node of alliance's chain, testing result is obtained.It should be noted that due to one
A corresponding blacklist of node and a white list, resulting testing result are respectively as follows: that there are first there are three kinds of situations
In blacklist;There are in white list;Or i.e. there is no in the first blacklist, also there is no in white list.Different detection knots
Fruit corresponds to different result marks, does not limit the form of expression of result mark in the present embodiment, the first black name can such as will be present
Result mark in list is set as " 00 ", and the result mark that will be present in white list is set as " 11 ", will be both black there is no first
In list, also there is no the result marks in white list to be set as " 01 ".
It should be noted that node identification is also carried in the corresponding testing result of difference node, to distinguish different nodes
Testing result.If the node identification of some node is " a ", corresponding testing result is to correspond to there are in the first blacklist
Detection be identified as " a00 ".It follows that detection mark was made of result mark and node identification, therefore, pass through detection
Mark can determine the corresponding testing result of the first interactive information.Result mark and node identification are not limited in the present embodiment
Building form.
Step S30 executes the interaction request if the testing result meets the first preset condition.
After receiving node obtains testing result, receiving node obtains the corresponding detection mark of testing result, passes through detection
Mark judges whether testing result meets the first preset condition.If it is determined that testing result meets the first preset condition, receiving node
The interaction request is then executed, which is sent to another terminal.It should be noted that different business scene corresponding
One preset condition may be different, and such as in banking scene, the first preset condition, which may be configured as Bank Account Number, to be existed
In first blacklist of any one of alliance's chain node, and need that there are in the white list of at least two node of alliance's chain;It is borrowing
In money business scenario, preset condition, which can be set to phone number and/or ID card No., cannot have any one of alliance's chain
In first blacklist of node, and need that there are in the white list of the one of node of alliance's chain.
Further, if receiving node determines that testing result does not meet the first preset condition, receiving node is refused to execute
The interaction request, and prompt information is generated, which is sent to the interaction request counterpart terminal.When terminal receives this
After prompt information, the prompt information is exported, to prompt user's interaction request to be rejected execution according to the prompt information, or according to
Prompt information prompt user's interaction request executes failure, in order to which user understands the implementing result of interaction request in time.At this
In embodiment, limiting terminal does not export the way of output of the prompt information, such as can export this by voice or text mode
Prompt information.
The present embodiment is by detecting the interaction after some node in alliance's chain receives the interaction request of data interaction
It requests corresponding first interactive information to whether there is in the white list and the first blacklist of each node of alliance's chain, obtains detection knot
Fruit executes the interaction request if the testing result meets the first preset condition, which is sent to another end
End reduces the data processing pressure of server to reduce the data interaction of server by the decentralization characteristic of block chain,
And due to each node in alliance's chain be it is mutually indepedent and only authorize after node can just coalize in chain, improve
The reliability of server;Further, due to each nodes sharing white and black list in alliance's chain, data friendship is improved
Mutual safety.
Further, data interactive method second embodiment of the present invention is proposed.
The difference of the data interactive method second embodiment and the data interactive method first embodiment is, reference
Fig. 2, data interactive method further include:
Step S40 detects whether the registration request accords with when detecting after the registration request of receiving node registration
Close the registration condition of alliance's chain.
After receiving node detects registration request, receiving node detects the registration whether registration request meets alliance's chain
Condition.It should be noted that the registration condition pre-set, the registration condition is according to specific needs in alliance's chain
And it is arranged.If there are 10 nodes in alliance's chain, then can set registration condition to only when 6 nodes are all agreed to execute to be somebody's turn to do
When registration request, just determine that the registration request meets the registration condition of alliance's chain.
Step S50 executes the registration request, and successfully holding if the registration request meets the registration condition
It detects whether to receive the interaction request after the row registration request.
If it is determined that the registration request meets registration condition, receiving node then executes the registration request, and is somebody's turn to do in successful execution
After registration request, i.e., in alliance's chain after successful registration, receiving node detects whether to receive interaction request user.It needs to illustrate
, when some user in alliance's chain some Node registry success after, the user can any node in alliance's chain into
Row data interaction.
Further, however, it is determined that the registration request does not meet registration condition, and receiving node then sends prompt information to registration
Request counterpart terminal.After the terminal receives the prompt information, the prompt information is exported, user is prompted according to the prompt information
Registration failure.
The present embodiment is by needing to detect whether the registration request meets registration item in the registration process of alliance's chain node
Part when only meeting registration condition, just executes the registration request, further improves the peace that data interaction is carried out based on alliance's chain
Quan Xing.
Further, data interactive method 3rd embodiment of the present invention is proposed.
The difference of the data interactive method 3rd embodiment and the data interactive method second embodiment is, reference
Fig. 3, data interactive method further include:
It is corresponding to obtain the interaction request if the testing result does not meet first preset condition by step S60
Second interactive information.
If it is determined that testing result does not meet the first preset condition, receiving node then obtains corresponding second interaction of interaction request
Information.Wherein, the second interactive information is the corresponding information of receiving node air control strategy, and the second interactive information can interact letter with first
Breath is different, can also be identical as the first interactive information.In alliance's chain, the corresponding air control strategy of each node is to pre-set
's.
Step S70 obtains the corresponding air control strategy of the receiving node, detects described second by the air control strategy and hands over
Whether mutual information meets the second preset condition.
Receiving node obtains its air control strategy, default by the way that whether the second interactive information of air control strategy detection meets second
Condition.Such as the air control strategy of some node are as follows: detection bank card number with the presence or absence of in its blacklist, and ID card No. whether
There are in white list.If the bank card number of the user there are in blacklist and/or ID card No. is there is no in white list,
Receiving node then determines that the second interactive information does not meet the second preset condition;If bank card number does not exist in blacklist, and body
For part card number there are in white list, receiving node then determines that the second interactive information meets the second preset condition.
Further, also the priority of the second interactive information can be set according to the difference of the data interaction request type.Such as
When data interaction request is the request to query the balance, the priority for being set as bank card account number is higher than the excellent of ID card No.
First grade, the priority of ID card No. are higher than the priority of phone number;When data interaction request is loan requests, setting
It is higher than ID card No. priority for the priority of telephone number, the priority of ID card No. is higher than the preferential of login account
Grade.At this point, different types of data interaction request can be arranged according to the priority of the second interactive information when air control strategy is arranged
Corresponding air control strategy.
It such as can be by the air control strategy setting for the corresponding interaction request that queries the balance are as follows: when detecting that bank card account number do not exist
In the blacklist of each node of alliance's chain, and there are the white names of the one of node of alliance's chain for ID card No. or phone number
When in list, receiving node determines that the second interactive information meets the second preset condition;When detecting bank card account number, there are alliance's chains
There is no in the blacklist of one of node and/or the white of each node of alliance's chain in the ID card No. or phone number
When in list, receiving node determines that the second interactive information does not meet the second preset condition.
It should be noted that the corresponding Rule of judgment of air control strategy Rule of judgment corresponding from the first preset condition is different
's.If the first preset condition of some node are as follows: Bank Account Number cannot have the first black name of any one of alliance's chain node
Dan Zhong, and need there are in the white list of at least two node of alliance's chain, then air control strategy may be configured as: as long as Bank Account Number is not
There are in the blacklist of any one node in alliance's chain.
Step S80 starts manual examination and verification process if second interactive information meets second preset condition, and
It detects whether to receive auditing result.
If it is determined that the second interactive information meets the second preset condition, receiving node then generates audit prompt information, this will be examined
Core prompt information is sent to auditor, specifically, audit prompt information can be sent to the held terminal of auditor, prompt to examine
Core personnel audit the interaction request, to start manual examination and verification process.It, can be in correspondence after auditor has audited the interaction request
Manual examination and verification result is inputted in the audit interface of terminal.When the held terminal of auditor receive auditor audit interface it is defeated
After the auditing result entered, which is sent to receiving node.
Further, however, it is determined that the second interactive information does not meet the second preset condition, and receiving node is then refused to execute the friendship
Mutually request.
Step S90 when receiving the auditing result, and determines that the interaction request passes through people according to the auditing result
After work audit, the interaction request is executed.
After receiving node receives auditing result, the audit mark in the auditing result is extracted, is identified according to the audit
Determine whether interaction request passes through manual examination and verification.After receiving node determines interaction request by manual examination and verification, receiving node is held
The row interaction request.Wherein, auditing result includes two kinds, and one kind is " passing through audit ", and another kind is " not passing through audit ".Specifically
The audit of " passing through audit " can be identified and be set as " 1 " by ground, and the audit mark of " not passing through audit " is set as " 0 ".It needs to illustrate
, the form of expression for auditing mark is not intended to limit described in the present embodiment, such as the audit mark that also " can will pass through audit "
It is set as " a ", the audit mark of " not passing through audit " is set as " b ".
Further, if determining that the interaction request does not pass through manual examination and verification according to the auditing result, receiving node is refused
Execute the interaction request.
The present embodiment is interactive by when determining that testing result does not meet the first preset condition, detect interaction request second
Whether information meets the second preset condition, when meeting the second preset condition, carries out manual examination and verification, when interaction request passes through manually
After audit, the interaction request is executed, the rate that runs succeeded of interaction request is improved, improves the success rate of data interaction.
Further, data interactive method fourth embodiment of the present invention is proposed.
The area of the data interactive method fourth embodiment and first, second or third embodiment of data interactive method
It is not, step S80 includes:
Step a sends second interactive information if second interactive information meets second preset condition
To other nodes in alliance's chain in addition to the receiving node, for the second interactive information described in other nodal tests
With the presence or absence of in corresponding second blacklist, and return to corresponding testing result, wherein each node in alliance's chain is all
There are corresponding second blacklists.
In order to guarantee that each node is unique in alliance's chain, each node in alliance's chain must share the black of preset ratio
List and white list, i.e. each node in permission alliance's chain retain part blacklist and/or white list, do not share to alliance's chain
In other nodes.In the present embodiment, the blacklist that each node retains is known as the second blacklist.Wherein, example is preset
It is arranged according to specific needs, such as may be configured as 70%, 80% or 85%.
When determining that the second interactive information meets the second preset condition, the second interactive information is sent to alliance by receiving node
Other nodes in chain in addition to the receiving node.When other nodes in alliance's chain receive the second interactive information, this is other
The second interactive information of nodal test obtains testing result with the presence or absence of in its corresponding second blacklist, and will test result hair
Give receiving node.All there is corresponding second blacklist in each node in alliance's chain.
It is understood that it is inspection in its corresponding second blacklist that other the second interactive information of nodal test, which whether there is,
It is corresponding with the presence or absence of its to survey the second interactive information, in the blacklist for not sharing to receiving node.
Further, in order to guarantee in alliance's chain carry out data interaction safety, and guarantee alliance's chain in it is each
The flexibility and independence of node, step a include:
Step a1 sends out second interactive information if second interactive information meets second preset condition
Other nodes in alliance's chain in addition to the receiving node are given, so that other nodes are receiving second friendship
After mutual information, the classification of second interactive information is determined.
If it is determined that the second interactive information meets the second preset condition, the second interactive information is then sent to alliance by receiving node
Other nodes in chain in addition to receiving node.After other nodes in alliance's chain receive second interactive information, is determined
The type of two interactive information.Second interactive information generic is pre-set, such as can be by ID card No. and bank card
Number is set as the first kind, sets the second class for phone number and login account.
Step a2, when determining that second interactive information belongs to the first kind, second as described in other nodal tests
Interactive information whether there is in corresponding second blacklist, and resulting testing result is sent to the receiving node.
The interaction of other nodal tests second when other nodes determine that the second interactive information belongs to the first kind, in alliance's chain
Information detects whether to find in the second blacklist and the second interactive information with the presence or absence of in its corresponding second blacklist
Identical information obtains testing result, and will test the receiving node that result is sent in alliance's chain.
Step a3 obtains current money by other nodes when determining that second interactive information belongs to the second class
Source utilization rate.
When other nodes determine that the second interactive information belongs to the second class, other nodes obtain its current corresponding resource benefit
With rate.Specifically, which can be CPU (Central Processing Unit, central processing unit) utilization of resources
Rate.
Step a4, when the resource utilization is less than preset threshold, detecting second interactive information whether there is institute
It states in the second blacklist, and resulting testing result is sent to the receiving node.
When other nodes get its corresponding resource utilization, other nodes judge whether its resource utilization is less than
Preset threshold.When determining that resource utilization is less than preset threshold, other the second interactive information of nodal test are right with the presence or absence of its
In the second blacklist answered, testing result is obtained, and the testing result is sent to receiving node.When determining that resource utilization is big
When preset threshold, other nodes refusal the second interactive information of detection whether there is its corresponding second blacklist
In.Wherein, preset threshold is arranged according to specific needs, does not limit the specific value of preset threshold in the present embodiment.
Further, in order to improve the efficiency of data interaction, step a further include:
Step a5 sends out second interactive information if second interactive information meets second preset condition
Other nodes in alliance's chain in addition to the receiving node are given, and detect whether to receive what other nodes were sent
Waiting time, wherein the waiting time is that other nodes receive second interactive information to obtaining the detection
As a result duration.
After determining that the second interactive information meets the second preset condition, the second interactive information is sent to alliance by receiving node
Other nodes in chain in addition to receiving node.After the second interactive information is sent to other nodes by receiving node, receiving node
It detects whether to receive the waiting time that other nodes are sent, wherein waiting time is that other nodes receive the second interaction letter
Breath is to obtaining the duration of the testing result.After other nodes receive the second interactive information, other nodes are current according to it
Resource utilization determination obtain the duration of testing result, that is, determine waiting time, and by the waiting time be sent to reception section
Point.It should be noted that the mapping relations between resource utilization and waiting time can be stored in advance in the other node, according to
The mapping relations can determine corresponding waiting time.
Step a6 sends detection request when receiving the waiting time, and when the waiting time is less than preset duration
To other nodes, so that other nodes are after receiving the detection request, detecting second interactive information is
It is no there are in corresponding second blacklist, and return to corresponding testing result.
After receiving node receives waiting time, judge whether the waiting time is less than preset duration, wherein when default
Length is arranged according to specific needs, does not limit the preset duration corresponding specific time in the present embodiment.When receiving node is true
After the fixed waiting time is less than preset duration, receiving node sends detection request to other nodes.When other nodes receive this
After detection request, according to second interactive information of detection request detection with the presence or absence of in corresponding second blacklist, detected
As a result, and the testing result is sent to receiving node.Further, when receiving node determines that waiting time is more than or equal to
When preset duration, receiving node sends inhibition request to other nodes.After other nodes receive inhibition request, other nodes
Forbid detecting the second interactive information with the presence or absence of in corresponding second blacklist according to the inhibition request.
Step b is determined according to the testing result and is looked into second blacklist after receiving the testing result
Find the blacklist quantity of second interactive information.
After receiving node receives testing result, receiving node is corresponding in other nodes according to testing result determination
The blacklist quantity of the second interactive information is found in second blacklist.It is understood that can determine according to detection mark
Blacklist quantity, i.e., according to testing result in carry that there are the mark numbers in the second blacklist can determine blacklist number
Amount.It is 3 as testing result is carried there are the mark number in the second blacklist, that is, can determine that blacklist quantity is 3.
Step c executes the interaction request if the blacklist quantity is less than or equal to preset quantity.
After receiving node determines blacklist quantity, it is default that receiving node judges whether blacklist quantity is less than or equal to
Quantity.After determining that blacklist quantity is less than or equal to preset quantity, receiving node executes the interaction request.Wherein, it presets
Quantity can be arranged according to the total node number amount in alliance's chain.As, there are 6 nodes, only blacklist quantity is less than in alliance's chain
Or when being equal to 2, receiving node can just execute the interaction request.
Further, after receiving node determines that blacklist quantity is greater than preset quantity, receiving node refusal executes the friendship
Mutually request.
The present embodiment is by the way that when determining that the second interactive information meets the second preset condition, the second interactive information is sent to
Other nodes in alliance's chain in addition to receiving node, only when the testing result returned according to other nodes determines blacklist quantity
When less than or equal to preset quantity, the interaction request is just executed, further improves the safety of data interaction.
Further, the 5th embodiment of data interactive method of the present invention is proposed.
The 5th embodiment of data interactive method and the data interactive method first, second, third or the 4th implementation
Example difference be, data interactive method further include:
Step d, after the receiving node detects loss of data, data have been lost in determination.
Receiving node is in real time or timing detects whether the data that it is stored lose.Wherein, receiving node is stored
Data include but is not limited to blacklist, white list and data related with interaction request.When receiving node detects that it is stored
Loss of data after, receiving node determination has lost data.
Step e, acquisition is described from other nodes in alliance's chain has lost data, and has lost number described in storage
According to.
After receiving node, which determines, has lost data, receiving node is obtained from other nodes in alliance's chain has lost number
According to, and store acquired in other nodes loss data.
After the present embodiment is by some node loss data in alliance's chain, through the characteristic of block chain from other nodes
Lost data are obtained to improve in data exchange process, data to guarantee the integrality of each node data in alliance's chain
Reliability.
In addition, the present invention also provides a kind of data interaction device, the data interaction device includes: referring to Fig. 4
Module 10 is obtained, after for receiving the interaction request of data interaction when the receiving node in alliance's chain, obtains institute
State corresponding first interactive information of interaction request, wherein alliance's chain setting is in the server;
Detection module 20, for detecting first interactive information with the presence or absence of the white list of each node of alliance's chain and the
In one blacklist, testing result is obtained;
Execution module 30 executes the interaction request if meeting the first preset condition for the testing result.
Further, the detection module 20 be also used to when detect the receiving node registration registration request after,
Detect the registration condition whether registration request meets alliance's chain;
If the execution module 30, which is also used to the registration request, meets the registration condition, executes the registration and ask
It asks;
The detection module 20 is also used to detect whether to receive after registration request described in successful execution the interaction and asks
It asks.
Further, if the acquisition module 10, which is also used to the testing result, does not meet first preset condition,
Obtain corresponding second interactive information of the interaction request;
The data interaction device further include:
Starting module, for obtaining the corresponding air control strategy of the receiving node;
The detection module 20 is also used to detect whether second interactive information meets second by the air control strategy
Preset condition;
If the starting module, which is also used to second interactive information, meets second preset condition, start artificial examine
Core process;
The detection module 20 is also used to detect whether to receive auditing result;
The execution module 30, which is also used to work as, receives the auditing result, and determines the friendship according to the auditing result
Mutually request is by executing the interaction request after manual examination and verification.
Further, the data interaction device further include:
Sending module, if meeting second preset condition for second interactive information, by second interaction
Information is sent to other nodes in alliance's chain in addition to the receiving node, for second described in other nodal tests
Interactive information whether there is in corresponding second blacklist, and return to corresponding testing result, wherein every in alliance's chain
All there is corresponding second blacklist in one node;
First determining module is determined described the according to the testing result for after receiving the testing result
The blacklist quantity of second interactive information is found in two blacklists;
If the execution module 30 is also used to the blacklist quantity less than or equal to preset quantity, the friendship is executed
Mutually request.
Further, if the sending module is also used to second interactive information and meets second preset condition,
Second interactive information is sent to other nodes in alliance's chain in addition to the receiving node, for other sections
Point determines the classification of second interactive information after receiving second interactive information;Wherein, when determine it is described second hand over
When mutual information belongs to the first kind, the second interactive information as described in other nodal tests is black with the presence or absence of corresponding described second
In list, and resulting testing result is sent to the receiving node;When determining that second interactive information belongs to the second class
When, current resource utilization is obtained by other nodes;When the resource utilization is less than preset threshold, described in detection
Second interactive information whether there is in second blacklist, and resulting testing result is sent to the receiving node.
Further, the sending module includes:
Transmission unit, if meeting second preset condition for second interactive information, by second interaction
Information is sent to other nodes in alliance's chain in addition to the receiving node;
Detection unit, for detecting whether receiving the waiting time that other nodes are sent, wherein when the waiting
A length of other nodes receive second interactive information to obtaining the duration of the testing result;
The transmission unit is also used to when receiving the waiting time, and when the waiting time is less than preset duration,
Detection request is sent to other nodes, so that other nodes are after receiving the detection request, detection described the
Two interactive information whether there is in corresponding second blacklist, and return to corresponding testing result.
Further, the data interaction device further include:
Second determining module, for after the receiving node detects loss of data, data to have been lost in determination;
The acquisition module 10 has lost data described in being also used to obtain from other nodes in alliance's chain;
Memory module described has lost data for storing.
It should be noted that each embodiment of data interaction device and each embodiment of above-mentioned data interactive method are basic
Identical, in this not go into detail.
In addition, the present invention also provides a kind of data interaction equipment.As shown in figure 5, Fig. 5 is that the embodiment of the present invention is related to
Hardware running environment structural schematic diagram.
It should be noted that Fig. 5 can be the structural schematic diagram of the hardware running environment of data interaction equipment.The present invention is real
It applies number of cases and can be PC, the terminal devices such as portable computer according to interactive device.
As shown in figure 5, the data interaction equipment may include: processor 1001, such as CPU, memory 1005, Yong Hujie
Mouth 1003, network interface 1004, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection between these components
Communication.User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user
Interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include having for standard
Line interface, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable storage
Device (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processing
The storage device of device 1001.
Optionally, data interaction equipment can also include camera, RF (Radio Frequency, radio frequency) circuit, sensing
Device, voicefrequency circuit, WiFi module etc..
It will be understood by those skilled in the art that the not structure paired data interaction of data interaction device structure shown in Fig. 5
The restriction of equipment may include perhaps combining certain components or different component cloth than illustrating more or fewer components
It sets.
As shown in figure 5, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium
Believe module, Subscriber Interface Module SIM and data interaction program.Wherein, operating system is to manage and control data interaction device hardware
With the program of software resource, the operation of data interaction program and other softwares or program is supported.
In data interaction equipment shown in Fig. 5, user interface 1003 is mainly used for receiving interaction request and registration request
Deng;Network interface 1004 is mainly used for connecting background server, carries out data communication with background server, such as obtains alliance's chain link
Blacklist and white list of point storage etc.;Processor 1001 can be used for calling the data interaction journey stored in memory 1005
Sequence, and the step of executing data interactive method as described above.
Data interaction equipment specific embodiment of the present invention and each embodiment of above-mentioned data interactive method are essentially identical, herein
It repeats no more.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium
On be stored with data interaction program, the data interaction program realizes data interactive method as described above when being executed by processor
The step of.
Computer readable storage medium specific embodiment of the present invention and the basic phase of each embodiment of above-mentioned data interactive method
Together, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of data interactive method, which is characterized in that the data interactive method the following steps are included:
After the receiving node in alliance's chain receives the interaction request of data interaction, the interaction request corresponding first is obtained
Interactive information, wherein alliance's chain setting is in the server;
First interactive information is detected with the presence or absence of in the white list and the first blacklist of each node of alliance's chain, is detected
As a result;
If the testing result meets the first preset condition, the interaction request is executed.
2. data interactive method as described in claim 1, which is characterized in that the receiving node when in alliance's chain receives
After the interaction request of data interaction, before the step of obtaining the interaction request corresponding first interactive information, further includes:
When detecting after the registration request of receiving node registration, detect whether the registration request meets alliance's chain
Registration condition;
If the registration request meets the registration condition, the registration request is executed, and registers and asks described in successful execution
It detects whether to receive the interaction request after asking.
3. data interactive method as described in claim 1, which is characterized in that whether detection first interactive information deposits
In the white list and the first blacklist of each node of alliance's chain, after the step of obtaining testing result, further includes:
If the testing result does not meet first preset condition, the corresponding second interaction letter of the interaction request is obtained
Breath;
The corresponding air control strategy of the receiving node is obtained, detects whether second interactive information accords with by the air control strategy
Close the second preset condition;
If second interactive information meets second preset condition, start manual examination and verification process, and detects whether to receive
To auditing result;
After receiving the auditing result, and determine that the interaction request passes through manual examination and verification according to the auditing result, hold
The row interaction request.
4. data interactive method as claimed in claim 3, which is characterized in that described to obtain the corresponding air control of the receiving node
Strategy also wraps after detecting the step of whether second interactive information meets the second preset condition by the air control strategy
It includes:
If second interactive information meets second preset condition, second interactive information is sent to the alliance
Other nodes in chain in addition to the receiving node, for the second interactive information described in other nodal tests with the presence or absence of pair
In the second blacklist answered, and return to corresponding testing result, wherein each node in alliance's chain all exists corresponding
Second blacklist;
After receiving the testing result, is determined according to the testing result and find in second blacklist described the
The blacklist quantity of two interactive information;
If the blacklist quantity is less than or equal to preset quantity, the interaction request is executed.
5. data interactive method as claimed in claim 4, which is characterized in that if second interactive information meet it is described
Second interactive information is then sent to other sections in alliance's chain in addition to the receiving node by the second preset condition
Point so that the second interactive information described in other nodal tests whether there is in corresponding second blacklist, and returns to correspondence
Testing result the step of include:
If second interactive information meets second preset condition, second interactive information is sent to the alliance
Other nodes in chain in addition to the receiving node, so that other nodes are after receiving second interactive information, really
The classification of fixed second interactive information;
When determining that second interactive information belongs to the first kind, whether the second interactive information as described in other nodal tests
There are in corresponding second blacklist, and resulting testing result is sent to the receiving node;
When determining that second interactive information belongs to the second class, current resource utilization is obtained by other nodes;
When the resource utilization is less than preset threshold, detecting second interactive information whether there is second blacklist
In, and resulting testing result is sent to the receiving node.
6. data interactive method as claimed in claim 4, which is characterized in that if second interactive information meet it is described
Second interactive information is then sent to other sections in alliance's chain in addition to the receiving node by the second preset condition
Point so that the second interactive information described in other nodal tests whether there is in corresponding second blacklist, and returns to correspondence
Testing result the step of include:
If second interactive information meets second preset condition, second interactive information is sent to the alliance
Other nodes in chain in addition to the receiving node, and detect whether to receive the waiting time that other nodes are sent,
In, the waiting time is that other nodes receive second interactive information to obtaining the duration of the testing result;
When receiving the waiting time, and when the waiting time is less than preset duration, detection request is sent to described other
Node detects second interactive information with the presence or absence of correspondence so that other nodes are after receiving the detection request
Second blacklist in, and return to corresponding testing result.
7. such as data interactive method as claimed in any one of claims 1 to 6, which is characterized in that the data interactive method also wraps
It includes:
After the receiving node detects loss of data, data have been lost in determination;
Data have been lost described in obtaining from other nodes in alliance's chain, and have lost data described in storage.
8. a kind of data interaction device, which is characterized in that the data interaction device includes:
It obtains module and obtains the interaction after for receiving the interaction request of data interaction when the receiving node in alliance's chain
Request corresponding first interactive information, wherein alliance's chain setting is in the server;
Detection module whether there is the white list and the first black name of each node of alliance's chain for detecting first interactive information
Dan Zhong obtains testing result;
Execution module executes the interaction request if meeting the first preset condition for the testing result.
9. a kind of data interaction equipment, which is characterized in that the data interaction equipment includes memory, processor and is stored in institute
The data interaction program that can be run on memory and on the processor is stated, the data interaction program is held by the processor
The step of data interactive method as described in any one of claims 1 to 7 is realized when row.
10. a kind of computer readable storage medium, which is characterized in that be stored with data friendship on the computer readable storage medium
Mutual program realizes the data interaction as described in any one of claims 1 to 7 when the data interaction program is executed by processor
The step of method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811008900.5A CN109688186B (en) | 2018-08-31 | 2018-08-31 | Data interaction method, device, equipment and readable storage medium |
PCT/CN2018/122639 WO2020042464A1 (en) | 2018-08-31 | 2018-12-21 | Data interaction method, apparatus and device, and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811008900.5A CN109688186B (en) | 2018-08-31 | 2018-08-31 | Data interaction method, device, equipment and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109688186A true CN109688186A (en) | 2019-04-26 |
CN109688186B CN109688186B (en) | 2021-01-08 |
Family
ID=66184479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811008900.5A Active CN109688186B (en) | 2018-08-31 | 2018-08-31 | Data interaction method, device, equipment and readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109688186B (en) |
WO (1) | WO2020042464A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110335031A (en) * | 2019-07-11 | 2019-10-15 | 中国银行股份有限公司 | A kind of problem account information investigation method and device |
WO2020233043A1 (en) * | 2019-05-20 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Blockchain-based list type query method and node |
CN112492591A (en) * | 2020-11-06 | 2021-03-12 | 广东电网有限责任公司电力调度控制中心 | Method and device for accessing power Internet of things terminal to network |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111813853B (en) * | 2020-05-29 | 2022-07-22 | 深圳平安医疗健康科技服务有限公司 | Data acquisition method and device based on block chain system and computer equipment |
CN114726561B (en) * | 2020-12-22 | 2024-04-05 | 京东科技信息技术有限公司 | Data processing method, device and system |
CN112613052A (en) * | 2020-12-24 | 2021-04-06 | 北京金山云网络技术有限公司 | Rights and interests management method and device |
CN113158212A (en) * | 2021-04-23 | 2021-07-23 | 深圳前海华兆新能源有限公司 | Distributed database security authentication method based on block chain technology |
CN115604035B (en) * | 2022-12-13 | 2023-03-28 | 杭州城市大脑有限公司 | City brain data sharing method based on alliance chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8473611B1 (en) * | 2009-09-04 | 2013-06-25 | Blue Coat Systems, Inc. | Referrer cache chain |
CN106878000A (en) * | 2017-03-06 | 2017-06-20 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of alliance's chain common recognition method and system |
CN107682331A (en) * | 2017-09-28 | 2018-02-09 | 复旦大学 | Internet of Things identity identifying method based on block chain |
CN107707644A (en) * | 2017-09-27 | 2018-02-16 | 北京趣拿软件科技有限公司 | Processing method, device, storage medium, processor and the terminal of request message |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256988A (en) * | 2016-12-30 | 2018-07-06 | 深圳壹账通智能科技有限公司 | The data processing method and device of alliance of credit information service |
CN108156159A (en) * | 2017-12-27 | 2018-06-12 | 质数链网科技成都有限公司 | A kind of multi-application system login method and block chain distribution general ledger system |
-
2018
- 2018-08-31 CN CN201811008900.5A patent/CN109688186B/en active Active
- 2018-12-21 WO PCT/CN2018/122639 patent/WO2020042464A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8473611B1 (en) * | 2009-09-04 | 2013-06-25 | Blue Coat Systems, Inc. | Referrer cache chain |
CN106878000A (en) * | 2017-03-06 | 2017-06-20 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of alliance's chain common recognition method and system |
CN107707644A (en) * | 2017-09-27 | 2018-02-16 | 北京趣拿软件科技有限公司 | Processing method, device, storage medium, processor and the terminal of request message |
CN107682331A (en) * | 2017-09-28 | 2018-02-09 | 复旦大学 | Internet of Things identity identifying method based on block chain |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233043A1 (en) * | 2019-05-20 | 2020-11-26 | 深圳壹账通智能科技有限公司 | Blockchain-based list type query method and node |
CN110335031A (en) * | 2019-07-11 | 2019-10-15 | 中国银行股份有限公司 | A kind of problem account information investigation method and device |
CN112492591A (en) * | 2020-11-06 | 2021-03-12 | 广东电网有限责任公司电力调度控制中心 | Method and device for accessing power Internet of things terminal to network |
CN112492591B (en) * | 2020-11-06 | 2022-12-09 | 广东电网有限责任公司电力调度控制中心 | Method and device for accessing power Internet of things terminal to network |
Also Published As
Publication number | Publication date |
---|---|
WO2020042464A1 (en) | 2020-03-05 |
CN109688186B (en) | 2021-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109688186A (en) | Data interactive method, device, equipment and readable storage medium storing program for executing | |
CN107294721B (en) | The method and apparatus of identity registration, certification based on biological characteristic | |
CN105306490B (en) | Payment verifying system, method and device | |
CN104579649B (en) | Personal identification method and system | |
CN104767613B (en) | Signature verification method, apparatus and system | |
CN105763547B (en) | Third party's authorization method and third party's authoring system | |
CN107566337A (en) | Communication means and device between a kind of block chain node | |
CN110291757A (en) | For providing the method for simplified account register service, user authentication service and utilizing its certificate server | |
CN104767714B (en) | A kind of ID and the correlating method of user resources information, terminal and system | |
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
CN105991709A (en) | Cloud desktop account number management method and apparatus thereof | |
CN106411950B (en) | Authentication method, apparatus and system based on block chain transaction id | |
CN105635168B (en) | A kind of application method of offline transaction device and its security key | |
CN109151820A (en) | One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 " | |
CN108805571A (en) | Data guard method, platform, block chain node, system and storage medium | |
CN106709730A (en) | Bio-feature identification-based transaction method and apparatus | |
CN110198265A (en) | Information processing method, system, device, equipment and medium | |
CN104935548B (en) | Auth method, apparatus and system based on intelligent equipment of tatooing | |
CN109766152A (en) | A kind of exchange method and device | |
CN110120928A (en) | A kind of identity authentication method, device, server and computer-readable medium | |
CN103401686B (en) | A kind of user's OTP WEB Authentication System and application process thereof | |
CN108322366A (en) | Access the methods, devices and systems of network | |
CN108829526A (en) | A kind of inter-process communication methods, electronic equipment and readable storage medium storing program for executing | |
CN110223128A (en) | A kind of method and relevant apparatus of data processing | |
CN109688096A (en) | Recognition methods, device, equipment and the computer readable storage medium of IP address |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |