CN110808839B - Processing method, device, equipment and medium for block chain abnormal data - Google Patents

Processing method, device, equipment and medium for block chain abnormal data Download PDF

Info

Publication number
CN110808839B
CN110808839B CN201911047943.9A CN201911047943A CN110808839B CN 110808839 B CN110808839 B CN 110808839B CN 201911047943 A CN201911047943 A CN 201911047943A CN 110808839 B CN110808839 B CN 110808839B
Authority
CN
China
Prior art keywords
data
transaction
deletion
transaction data
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911047943.9A
Other languages
Chinese (zh)
Other versions
CN110808839A (en
Inventor
张苗
孙君意
朱月俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Original Assignee
Baidu Online Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baidu Online Network Technology Beijing Co Ltd filed Critical Baidu Online Network Technology Beijing Co Ltd
Priority to CN201911047943.9A priority Critical patent/CN110808839B/en
Publication of CN110808839A publication Critical patent/CN110808839A/en
Application granted granted Critical
Publication of CN110808839B publication Critical patent/CN110808839B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a method, a device, equipment and a medium for processing block chain abnormal data, and relates to the technical field of block chains. The specific implementation scheme is as follows: deleting the transaction data to which the abnormal data stored in the block chain belong as target deletion transaction data; deleting the data content in the target deletion transaction data, and reserving the transaction identifier in the block; and setting a deletion mark which is used for indicating that the transaction identification of the target deletion transaction data is valid in the verification process of the target deletion transaction data for the target deletion transaction data in the block chain. According to the method and the device, the data content of the transaction data to which the abnormal data belongs is deleted, the transaction identifier of the deleted transaction data is reserved, and meanwhile, the deletion mark is introduced to indicate that the transaction identifier corresponding to the deleted transaction data is effective, so that the abnormal data such as error information or illegal records in the block chain are physically deleted, and the influences of the abnormal data on the correctness and the legality of the data stored in the block chain due to the fact that the abnormal data cannot be modified are avoided.

Description

Processing method, device, equipment and medium for block chain abnormal data
Technical Field
The present application relates to computer technologies, and in particular, to the field of a block chain technology, and in particular, to a method, an apparatus, a device, and a medium for processing abnormal data of a block chain.
Background
The nature of the blockchain is that the uplink storage of data is realized through technologies such as consensus, encryption and p2p communication, and the blockchain is not tamperproof. However, as each service uses the block chain for data storage, the problem that the uplink data cannot be modified if there is an illegal or wrong data is inevitable.
Therefore, it is possible to make the blockchain platform have security holes or someone use the blockchain to do something that is not in accordance with the conventional, and these wrong information or illegal records cannot be modified once they are linked up.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a medium for processing abnormal data of a block chain, so as to effectively process the abnormal data stored in the block chain.
In a first aspect, an embodiment of the present application provides a method for processing block chain abnormal data, where the method is performed by a block chain node, and the method includes:
deleting transaction data by taking the transaction data to which the abnormal data belongs as a target, wherein the abnormal data is data stored in a block chain;
deleting the data content in the target deletion transaction data, and reserving the transaction identifier in the block;
setting a deletion mark for the target deletion transaction data in a block chain;
wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation of the target delete transaction data.
In the embodiment of the application, the transaction data to which the abnormal data stored in the block chain belongs is used as the target deletion transaction data; deleting the data content in the target deletion transaction data, and reserving the transaction identifier in the block; and setting a deletion mark for the target deletion transaction data in the block chain, wherein the deletion mark is used for indicating that the transaction identifier of the target deletion transaction data is valid in the verification process of the target deletion transaction data. According to the technical scheme, the data content of the transaction data to which the abnormal data belongs is deleted, the transaction identifier of the deleted transaction data is reserved, and meanwhile, the deletion mark is introduced to indicate that the transaction identifier corresponding to the deleted transaction data is effective, so that the abnormal data such as error information or illegal records in the block chain are physically deleted, the purpose of effectively processing the abnormal data stored in the block chain is achieved, and the influences of the irredifiable abnormal data on the correctness and the legality of the data stored in the block chain are avoided.
Optionally, when deleting the data content in the target deletion transaction data, the method further includes:
and marking the signature of the deletion participant for the deletion operation of the target deletion transaction data in the block chain.
In an optional implementation manner of the foregoing application, when deleting data content in the target deletion transaction data, the signature is marked on the deletion initiator, so that subsequent verification of the deletion operation is facilitated.
Optionally, when deleting the data content in the target deletion transaction data, the method further includes:
marking a valid time range for the target delete transaction data in a blockchain.
In an optional implementation manner of the foregoing application, when deleting data content in the target deletion transaction data, an effective time range is marked for the target deletion transaction data in the block chain, so that a usable range of the target deletion transaction data is limited, and it is avoided that other operations are performed outside the effective time range using the target deletion transaction data, which causes a waste of computing resources in the block chain network, and it is also avoided that the target deletion transaction data is completely eradicated within the effective time range, which causes a large number of transaction requests that cannot be normally processed, thereby preventing a plurality of functions from being unable to be implemented.
Optionally, at least one of the delete marker, the delete participant signature and the validity time range is recorded in a set field in the data content of the target delete transaction data.
In an optional implementation manner of the foregoing application, at least one of a deletion flag, a deletion participant signature, and a valid time range is recorded in a set field in data content of the target deletion transaction data, so that data storage formats of different target deletion transaction data are specified, and search, verification, and use of the target deletion transaction data are facilitated.
Optionally, the method further includes:
when any transaction data stored in the block chain is verified, if the dependent data of the transaction data to be verified is identified as the target deletion transaction data and the uplink block of the transaction data to be verified is in the valid time range, determining that the transaction data to be verified is valid, otherwise, determining that the transaction data to be verified is invalid.
In an optional embodiment of the foregoing application, a verification process for transaction data associated with target deletion transaction data is added, specifically, when the verification process relates to target deletion transaction data, to-be-verified transaction data corresponding to the target deletion transaction data in an uplink block within an effective time range is determined as valid by default, so that a situation that verification cannot be performed due to deletion of the target deletion transaction data is avoided, and a verification mechanism for other transaction data associated with the deleted transaction data is perfected.
Optionally, deleting the transaction data to which the abnormal data belongs as a target includes:
acquiring a data deletion notice or a data deletion transaction request initiated by a set supervisory user;
and determining target deleted transaction data according to the screening condition of the abnormal data in the data deletion notification or the data deletion transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs.
In an optional implementation manner in the above application, a supervising user sends a data deletion notification or a data deletion transaction request to trigger processing of abnormal data, and the target deletion transaction data is determined based on a screening condition of the abnormal data in the data deletion notification or the data transaction request initiated by the supervising user, and the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs, so that the determination manner of the target deletion transaction request is enriched, and different optional channels are provided for the supervising user to delete the abnormal data.
Optionally, deleting the transaction data to which the abnormal data belongs as a target includes:
acquiring a data deletion voting transaction request initiated by a user;
determining target deleted transaction data according to the screening condition of the abnormal data in the data deletion voting transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs;
and determining the validity of the target deletion transaction data according to the voting result of the block link point aiming at the data deletion voting transaction request.
In an optional implementation manner in the above application, a user initiates a data deletion voting transaction request, triggers abnormal data processing, and determines target deletion transaction data based on screening and tuning of abnormal data in the data deletion voting transaction request initiated by the user, abnormal data content, or a transaction identifier of the transaction data to which the abnormal data belongs, so that the determination manner of the target deletion transaction request is enriched, and the determination of the target deletion transaction data is performed in a voting manner, so that subsequent deletion of the target deletion transaction data is made public and transparent, and the possibility is provided for abnormal data deletion of each participating user of a block chain network.
Optionally, the method further includes:
acquiring a specified valid time range from the data deletion notification or the data deletion transaction request; or
And determining a block before a voting result validation block of the data deletion voting transaction request as the valid time range.
In an optional implementation manner of the foregoing application, in the processing process of abnormal data in a blockchain, an effective time range determination operation is added to limit an available range of other transaction data associated with the abnormal data, which is not deleted in the blockchain, and reduce an influence of a large amount of deletions of the abnormal data on the overall integrity of the content stored in the blockchain. Meanwhile, the effective time range is specified in the data deletion notification or the data deletion transaction request, or the effective time range is determined through the voting result validation block of the data deletion voting transaction request, so that the determination process of the effective time range can be adapted to different abnormal data deletion scenes, and the determination of the effective time range under different scenes is possible.
Optionally, deleting the data content in the target deletion transaction data includes:
and if the target deletion transaction data are transfer transaction data, deleting the transfer-out account information in the transfer transaction data, and reserving the transfer-in account information.
In an optional implementation manner of the application, when the target deletion transaction data is transfer transaction data, the roll-out account information in the transfer transaction data is deleted, and the roll-in account information is retained, so that the roll-in account is penalized to show punishment.
In a second aspect, an embodiment of the present application further provides an apparatus for processing blockchain exception data, where the apparatus is configured at a blockchain node, and the apparatus includes:
the target deletion transaction data determining module is used for taking the transaction data to which the abnormal data belongs as target deletion transaction data, wherein the abnormal data is data which is stored in a block chain;
the data content deleting module is used for deleting the data content in the target deleted transaction data and reserving the transaction identifier in the block;
a delete marker setting module, configured to set a delete marker for the target delete transaction data in a block chain;
wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation of the target delete transaction data.
In a third aspect, an embodiment of the present application further provides an electronic device, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute a method for processing block chain exception data as provided in an embodiment of the first aspect.
In a fourth aspect, the present application further provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute a processing method of block chain exception data as provided in the embodiments of the first aspect.
Other effects of the above-described alternative will be described below with reference to specific embodiments.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 is a flowchart of a method for processing block chaining abnormal data according to a first embodiment of the present application;
fig. 2 is a flowchart of a method for processing block chaining abnormal data according to a second embodiment of the present application;
fig. 3A is a flowchart of a method for processing block chaining abnormal data according to a third embodiment of the present application;
fig. 3B is a flowchart of another method for processing block chaining exception data according to the third embodiment of the present application;
fig. 4 is a block diagram of a processing apparatus for processing block chaining abnormal data according to a fourth embodiment of the present application;
fig. 5 is a block diagram of an electronic device for implementing a method for processing block chain exception data according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Example one
Fig. 1 is a flowchart of a method for processing block chain abnormal data in one embodiment of the present application, where the embodiment of the present application is suitable for a case where abnormal data such as error data and illegal data stored in a block chain network is processed, and the method is executed by a block chain abnormal data processing apparatus, which is implemented by software and/or hardware and is specifically configured in an electronic device that carries a block chain node.
A method for processing block chain exception data as shown in fig. 1 includes:
s101, deleting the transaction data which the abnormal data belong to as a target, wherein the abnormal data are data which are stored in a block chain.
Illustratively, the exception data may be error data or illegal data already stored in the block chain, or the like.
The transaction data to which the abnormal data belongs may be transaction data including the abnormal data, or transaction data using the abnormal data as input data and/or output data.
It can be understood that, since the stored content of each block in the block chain is usually presented in the form of transaction data item by item, in order to facilitate processing of the abnormal data in the block chain, the abnormal data is usually located in units of the transaction data to which the abnormal data belongs.
S102, deleting the data content in the target deletion transaction data, and keeping the transaction identification in the block.
Because hash calculation is performed on each piece of transaction data in the block, a hash value corresponding to the transaction data is obtained as a transaction identifier and is stored in the block. Thus, in a block, the transaction identification of the target delete transaction data associated with the exception data is included in addition to the target delete transaction data corresponding to the exception data.
Because the transaction identifier can be used for assisting operations such as query positioning of the transaction data, generation of a block header, verification of correctness or validity of the transaction data, and the like, in order to avoid synchronous deletion of the transaction identifier, a large influence is brought to the block link point when other operations are performed, and the transaction identifier of the target deleted transaction data in the block is retained while the data content in the target deleted transaction data is deleted.
In an optional implementation manner of the embodiment of the application, if the target deletion transaction data is transfer transaction data, the roll-out account information in the transfer transaction data is deleted, and the roll-in account information is reserved. The transfer-out account information may be information related to the transfer-out account, such as transfer output information, intelligent contract output information, and transaction description information.
For example, in the transfer transaction, when the user a transfers a set number of block chain circulation elements to the user B, if it is determined that the transfer transaction is abnormal data, the operation information of the set number of block chain circulation elements is transferred from the block chain account to a roll-out account (an account of the user B) in the transfer is deleted, and the operation information of the set number of block chain circulation elements is reserved from the roll-in account (an account of the user a) to the block chain account to a transfer-in account (an account of the user a), so that the block chain circulation elements owned by the roll-in account (an account of the user a) are normally deducted, which is equivalent to performing penalty on the roll-in account (an account of the user a), so as to perform penalty on illegal transfer behaviors of the roll-in account (an account of the user a).
S103, deleting marks are set for the target deleting transaction data in the block chain.
Wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation of the target delete transaction data.
In order to effectively identify the deletion state of the target deletion transaction data and distinguish the deletion condition of the stored transaction data from the incomplete storage condition of the data (for example, in a lightweight node, only a transaction identifier is stored, and only part of the transaction data is not stored or is only stored) at the same time, a corresponding deletion flag is generally set for the target deletion transaction data in a block chain.
Illustratively, the deletion marker may be obtained by character concatenation of a set length. Wherein the delete marker may include a delete identification marked for the deleted transaction data. To ensure consistency of the stored formats in different blocks, the delete markers may also include an undelete identification that marks the transaction data that was not deleted.
It can be understood that, in order to facilitate the subsequent verification of the deletion operation of the transaction data, the deletion participant signature may also be marked in the blockchain for the operation of deleting the transaction data targeted at the same time as the deletion of the data content in the targeted deletion transaction data. The deletion participant may include at least one of a deletion initiator, a deletion executor, a deletion supervisor, and the like. Wherein the number of deletion participants is at least one.
The deleting initiator can be understood as a blockchain account which actively initiates a request to delete the abnormal data; the deletion executor can understand as the node identifier of the block chain node for performing the deletion operation of the data content in the target deletion transaction data; the deletion supervisor can be each block chain link point account authorizing the abnormal data deletion request initiated by the deletion initiator or each block chain link point account authorizing the deletion authority when the deletion executor executes the deletion operation.
In order to reduce the influence of the deleted transaction data on the normal operation of the block chain network, the valid time range can be marked for the target deletion transaction data in the block chain while deleting the data content in the target deletion transaction data, and the valid time range is used for marking the usable interval range of the deleted target deletion transaction data. Illustratively, the valid time range may be determined by the block height.
For example, when the data to be verified is firstly uplink-stored in the 100 th block in the block chain, and the data to be verified is determined to be abnormal data in the 200 th block, and the transaction request to which the abnormal data belongs is deleted, the interval range corresponding to the 100 th to 200 th blocks is used as the valid time range, and the transaction data in the range is determined to be valid when the abnormal data is represented to be used in the valid time range; at block 200 and blocks thereafter, it is determined that the transaction data associated with the exception data within the range is invalid.
It can be understood that, in order to implement the standardized management of the data stored in the block chain and implement the unification of the data formats stored in the blocks, corresponding fields may be set in the blocks in advance corresponding to the respective flag contents: a delete marker field is set for delete marker, a party marker field is set for delete party signature, and a validity time field is set for validity time range. Accordingly, at least one of the deletion flag, the deletion participant signature, and the validity time range is recorded in a set field in the data content of the target deletion transaction data.
In the embodiment of the application, the transaction data to which the abnormal data stored in the block chain belongs is used as the target to delete the transaction data; deleting the data content in the target deletion transaction data, and reserving the transaction identifier in the block; and setting a deletion mark for the target deletion transaction data in the block chain, wherein the deletion mark is used for indicating that the transaction identifier of the target deletion transaction data is valid in the verification process of the target deletion transaction data. According to the technical scheme, the data content of the transaction data to which the abnormal data belongs is deleted, the transaction identifier of the deleted transaction data is reserved, and the deletion mark is introduced to indicate that the transaction identifier corresponding to the deleted transaction data is effective, so that the abnormal data such as error information or illegal records in the block chain are physically deleted, the purpose of effectively processing the abnormal data stored in the block chain is achieved, and the influences of the irreparability of the abnormal data on the correctness and the legality of the data stored in the block chain are avoided.
Example two
Fig. 2 is a flowchart of a method for processing block chain anomaly data in the second embodiment of the present application, and the second embodiment of the present application performs optimization and improvement on the basis of the technical solutions of the foregoing embodiments.
Further, in the process of executing processing of the block chain exception data, when any transaction data stored in the block chain is verified, if the dependent data of the transaction data to be verified is identified as the target deleted transaction data and the uplink block of the transaction data to be verified is within the valid time range, the transaction data to be verified is determined to be valid, otherwise, the transaction data to be verified is determined to be invalid, so as to verify the validity of the transaction data to which the deleted exception data belongs.
A method for processing block chain exception data as shown in fig. 2 includes:
s201, deleting the transaction data by taking the transaction data to which the abnormal data belongs as a target, wherein the abnormal data is data stored in a block chain.
S202, deleting the data content in the target deletion transaction data, and keeping the transaction identification in the block.
S203, setting a deletion mark for the target deletion transaction data in the block chain.
Wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation of the target delete transaction data.
S204, when any transaction data stored in the block chain is verified, judging whether the dependent data of the transaction data to be verified is the target deletion transaction data or not; if so, S205 is executed, otherwise, S208 is executed.
It should be noted that, when a node in the blockchain network needs to synchronize data stored in the blockchain (for example, a new blockchain link point is added to the blockchain network, or a lightweight node acquires blockchain data from all nodes), data acquired from other blockchain nodes needs to be verified to verify the validity of the acquired data.
When any transaction data stored in the block chain is verified, if the identified to-be-verified transaction data is realized depending on the target deletion transaction data, for example, the target deletion transaction data is input data in the process of forming the to-be-verified transaction data, the data content of the target deletion transaction data is deleted and cannot be acquired, and the verification process of the to-be-verified transaction data cannot be performed by adopting a conventional verification mode.
In order to avoid the above situation, it is necessary to first determine whether the transaction data to be verified is the target deletion transaction data, so as to screen the target deletion transaction data from the block chain.
The dependent data may be data depended on when executing a transaction request corresponding to the transaction data to be verified. Illustratively, it may be input data when executing a transaction request. The input data can be carried in the transaction request and directly obtained by analyzing the transaction request. Wherein the transaction request can be obtained from the corresponding transaction data.
Illustratively, read data of the transaction request in the form of an intelligent contract can be acquired from the transaction request of the transaction data to be verified as dependent data; or optionally, the input field data of the transaction request in the form of a field may also be obtained from the transaction request of the transaction data to be verified as the dependency data. For example, when the transaction request is an unspent transaction output (UTXO), the input field data may be an input account address and/or an output account address, respectively.
For example, the transaction request may be a transaction data acquisition transaction request, and correspondingly, the dependency data may be a transaction identifier corresponding to the acquired transaction data. For another example, the transaction request may be a function call transaction request, and accordingly, the dependency data may be input data of the smart contract corresponding to the called function. For another example, the transaction request may be a block data query transaction request, and correspondingly, the dependency data may be a transaction identifier of each transaction data included in the queried block.
In an optional implementation manner of the embodiment of the application, it is determined whether the dependency data of the transaction data to be verified is identified as the target deletion transaction data, it may be determined whether the dependency data of the transaction data to be verified is the transaction data, and when the dependency data is the transaction data, it is read whether the dependency data has a deletion flag, and if the dependency data has the deletion flag, it is indicated that the dependency data is the target deletion transaction data; or if the dependent data has the deletion marker and the marker information of the read deletion marker is the deletion identifier, indicating that the dependent data is the target deletion transaction data.
S205, judging whether the uplink block of the transaction data to be verified is within the valid time range; if so, perform S206, otherwise perform S207.
When the uplink block of the transaction data to be verified is within the valid time range, it indicates that although the dependent data of the transaction data to be verified is the deleted target deletion transaction data, the target deletion transaction data is not deleted yet when the transaction data to be verified uses the target deletion transaction data, and the target deletion transaction data can be successfully acquired and used. However, since the dependent data itself cannot be acquired in the verification process, the transaction data to be verified can be directly considered to be valid subsequently, that is, the transaction identifier directly receiving the transaction data is correct, and the correctness of the transaction data is no longer verified by executing the transaction request.
When the uplink block of the transaction data to be verified is not in the valid time range, it indicates that the dependency data used in processing the transaction request of the transaction data to be verified, that is, the target deletion transaction data is deleted, and accordingly the use of the target deletion transaction data is limited, and it is obviously not reasonable to use the target deletion transaction data in the generation process of the transaction data to be verified, so that the transaction data to be verified can be directly considered invalid subsequently.
S206, determining that the transaction data to be verified is valid.
And S207, determining that the transaction data to be verified is invalid.
And S208, verifying the transaction data to be verified by adopting the mode of the prior art.
Because the dependent data of the transaction data to be verified is not the deleted target deleted transaction data, the transaction request of the transaction data to be verified can be directly processed, the hash value of the transaction data obtained by processing is compared with the transaction identifier of the transaction data to be verified, if the comparison result is consistent, the transaction data to be verified is determined to be valid, and otherwise, the transaction data to be verified is determined to be invalid.
According to the method and the device, when the validity of the transaction data is verified in the block chain with abnormal data, and the verification process relates to the target deletion transaction data, the transaction data to be verified corresponding to the target deletion transaction data of the uplink block in the valid time range is defaulted to be valid, so that the situation that the verification cannot be performed due to the fact that the target deletion transaction data are deleted is avoided, and a verification mechanism of other transaction data related to the deleted transaction data is perfected.
EXAMPLE III
Fig. 3A and fig. 3B are flowcharts of a method for processing block chain anomaly data in a third embodiment of the present application, and the embodiment of the present application performs optimization and improvement on the basis of the technical solutions of the above embodiments.
Further, the operation of ' deleting the transaction data to which the abnormal data belongs as the target transaction data ' is refined into ' acquiring a data deletion notification or a data deletion transaction request initiated by a set supervisory user; and determining target deleted transaction data according to the screening condition of the abnormal data in the data deletion notice or the data deletion transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs, so as to enrich the determination mode of the target deleted transaction data.
A method for processing block chain exception data as shown in fig. 3A includes:
S301A, acquiring a data deletion notice or a data deletion transaction request initiated by a setting supervisory user.
S302A, determining the target deleted transaction data according to the screening condition of the abnormal data in the data deletion notice or the data deletion transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs.
And the abnormal data is data which is stored in a block chain. The supervising user can be at least one specific account in the whole block chain network, and is used for supervising, managing, even controlling and the like the building and using processes of the block chain network. Typically, the administrative user is typically specified at the beginning of the building of the blockchain network, or before the building of the blockchain network. For example, the administrative user may be a user account with public trust.
In an optional implementation manner of the embodiment of the present application, the supervising user may send the data deletion notification through offline; correspondingly, the block link point acquires the data deletion notification sent offline, and determines the target deletion transaction data based on the data deletion notification, so as to limit the range of the data to be deleted subsequently.
In another optional implementation manner of the embodiment of the present application, in order to facilitate subsequent verification of deletion operation of abnormal data, a data deletion transaction request may also be initiated in the blockchain network by a supervisory user; correspondingly, the block chain node acquires the data deleting transaction request, and determines the target deleting transaction data based on the data deleting transaction request, so as to limit the range of the data to be deleted subsequently.
It can be understood that, in order to facilitate the determination of the target deletion transaction data, the administrative user generally adds the abnormal data association information to the initiated data in the data deletion notification or the data deletion transaction request, so that when the block link node receives the data deletion notification or the data deletion transaction request, the block link node obtains the corresponding abnormal data association information by analyzing the received data, thereby determining the target deletion transaction data according to the obtained abnormal data association information. The abnormal data association information comprises at least one of a screening condition of the abnormal data, content of the abnormal data, a transaction identifier of the transaction data to which the abnormal data belongs, and the like.
Illustratively, when the associated information includes a filtering condition for abnormal data, the included filtering condition may include, but is not limited to, a block height interval, or transaction data including specified data, or the like. For example, the transaction data defined within the block height interval by the block height interval is abnormal data; as another example, a certain data is specified, and the transaction data containing the specified data is defined as anomalous data.
S304, deleting the data content in the target deletion transaction data, and keeping the transaction identification in the block.
S305, setting a deletion mark for the target deletion transaction data in the block chain.
Wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation process of the target delete transaction data.
It can be understood that, in order to define the usable range of other transaction data associated with abnormal data that is not deleted in the block chain, reduce the influence of a large amount of deletion of abnormal data on the overall integrity of the stored content of the block chain, and also define the valid time range of the target deleted transaction data.
Optionally, when the administrative user generates the data deletion notification or the data deletion transaction request, the administrative user may delete the valid time range of the transaction data of the present price target in the data deletion notification or the data deletion transaction request; accordingly, a chunk chain node may obtain a specified validity time range from a data delete notification or data delete transaction request.
The method and the device have the advantages that the supervision user sends the data deletion notification or the data deletion transaction request to trigger the abnormal data processing, and the target deletion transaction data is determined based on the screening condition of the abnormal data in the data deletion notification or the data transaction request initiated by the supervision user, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs, so that the determination mode of the target deletion transaction request is enriched, and different optional channels are provided for the supervision user to delete the abnormal data.
In order to avoid centralization of the block chain network supervision process and influence on the openness and transparency of data stored in the block chain, a plurality of users can be used as voting participants to vote on abnormal data deletion. For example, S301A to S302A in the above embodiment may be replaced with S301B to S303B to achieve the above object.
As shown in fig. 3B, a method for processing block chain exception data includes:
S301B, acquiring a data deletion voting transaction request initiated by a user.
The user initiating the data deletion voting transaction request may be any user in the blockchain network, or may be a supervising user.
Specifically, a user initiates a data deletion voting transaction request to a block link network; accordingly, the blockchain node receives and processes the data deletion voting transaction request.
It will be appreciated that in order to facilitate the voting participant users in the blockchain to know the relevant information of the pre-deleted data, the users will typically add abnormal data relevant information in the data deletion voting transaction request. The abnormal data association information comprises at least one of a screening condition of the abnormal data, content of the abnormal data, a transaction identifier of the transaction data to which the abnormal data belongs, and the like.
It should be noted that, in order to facilitate the voting participation user to respond to the voting in time, the voting deadline may also be carried in the data deletion voting transaction request. Of course, in order to clarify the coverage of the voting participation users, the account information of each voting participation user can be added to the data deletion voting transaction request.
S302B, determining the target deleted transaction data according to the screening condition of the abnormal data in the data deletion voting transaction request, the content of the abnormal data or the transaction identification of the transaction data to which the abnormal data belongs.
And the abnormal data is data which is stored in a block chain.
And the block chain node determines target deleted transaction data according to the screening condition of the abnormal data in the received data deletion voting transaction request, the specified content of the abnormal data or the transaction identifier of the abnormal data in the transaction data so as to define the range of the data to be deleted subsequently. Correspondingly, the voting participation user can vote according to the determined target deletion transaction data so as to support or object the validity of the target deletion transaction data corresponding to the deletion operation.
S303B, determining validity of the target deletion transaction data according to the voting result of the block link point for the data deletion voting transaction request.
Illustratively, the block chain node collects the voting conditions of all voting participation users, and if the voting result meets the set requirement, the target deletion transaction data is determined to be valid; otherwise, the target delete transaction data is determined to be invalid.
Optionally, the voting result meets the setting requirement, which may be: the ratio of the number of supported votes to the total number of votes satisfies a set proportion threshold. Or, optionally, the voting result meets the setting requirement, and may also be: presetting voting weights of different participants, determining a final voting result according to the product of the voting conditions of different voting participants and the voting weights, and determining that the voting result meets the set requirement if the final voting result meets the set proportion threshold. The setting proportion threshold value can be set by a block chain creator in the initial stage of block chain creation according to needs; the voting weight of different voting users can be set when each block chain link point participates in the block chain network.
S304, deleting the data content in the target deletion transaction data, and keeping the transaction identification in the block.
S305, setting a deletion mark for the target deletion transaction data in a block chain;
wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation of the target delete transaction data.
Alternatively, when determining the validity of the target deletion transaction data for the voting result of the data deletion voting transaction request, the block link node may determine, as the valid time range, a block before the voting result validation block of the data deletion voting transaction request.
For example, if abnormal data corresponding to the data deletion voting transaction request is firstly uplink-stored in the 100 th block in the block chain, and a user starts voting to each block chain link point in the 180 th block, and statistics of voting results is required in the 200 th block; if it is determined that abnormal data needs to be masked at the 200 th block, it is determined that a block before the 200 th block is determined as a valid time range. Of course, in order to reduce the storage amount of the abnormal data or other data depending on the abnormal data in the block chain, the block before the data is questioned (i.e. the 180 th block) may be determined as the valid time range; or determining the block before the first ul storage of data (i.e., 100 th block) as the valid time range.
According to the technical scheme, the user initiates a data deletion voting transaction request, triggers abnormal data processing, and determines the target deletion transaction data based on screening and training of the abnormal data in the data deletion voting transaction request initiated by the user, the abnormal data content or the transaction identifier of the transaction data to which the abnormal data belongs, so that the determination mode of the target deletion transaction request is enriched, and the determination of the target deletion transaction data is performed in a voting mode, so that the subsequent deletion operation of the target deletion transaction data is public and transparent, and the possibility of abnormal data deletion is provided for each participating user of the block link network.
Example four
Fig. 4 is a structural diagram of a device for processing blockchain abnormal data in a fourth embodiment of the present application, where the embodiment of the present application is applied to a case where abnormal data such as error data and illegal data stored in a blockchain network is processed, and the device is implemented by software and/or hardware and is specifically configured in an electronic device carrying a blockchain node.
As shown in fig. 4, an apparatus 400 for processing block chain abnormal data configured at a block chain node includes: a target delete transaction data determination module 401, a data content delete module 402, and a delete flag setting module 403. Wherein the content of the first and second substances,
a target deletion transaction data determining module 401, configured to use transaction data to which abnormal data belongs as target deletion transaction data, where the abnormal data is data that has been stored in a block chain;
a data content deleting module 402, configured to delete the data content in the target deletion transaction data, and keep the transaction identifier in the block;
a delete flag setting module 403, configured to set a delete flag for the target delete transaction data in a block chain;
wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation process of the target delete transaction data.
In the embodiment of the application, the transaction data to which the abnormal data stored in the block chain belongs is used as the target deletion transaction data by the target deletion transaction data determining module; deleting the data content in the target deletion transaction data through a data content deletion module, and reserving the transaction identifier in the block; and setting a deletion mark for indicating that the transaction identifier of the target deletion transaction data is valid in the verification process of the target deletion transaction data for the target deletion transaction data in the block chain through a deletion mark setting module. According to the technical scheme, the data content of the transaction data to which the abnormal data belongs is deleted, the transaction identifier of the deleted transaction data is reserved, and meanwhile, the deletion mark is introduced to indicate that the transaction identifier corresponding to the deleted transaction data is effective, so that the abnormal data such as error information or illegal records in the block chain are physically deleted, the purpose of effectively processing the abnormal data stored in the block chain is achieved, and the influences of non-amendability of the abnormal data and correctness and legality of the data stored in the block chain are avoided.
Further, the apparatus includes an initiator signature marking module configured to:
and marking a deletion participant signature for the deletion operation of the target deletion transaction data in the block chain while deleting the data content in the target deletion transaction data.
Further, the apparatus further comprises a valid timestamp module configured to:
marking a valid time range for the target deletion transaction data in a block chain while deleting data content in the target deletion transaction data.
Further, at least one of the delete marker, the delete participant signature and the validity time range is recorded in a set field in the data content of the target delete transaction data.
Further, the apparatus poster may, a verification module to:
when any transaction data stored in the block chain is verified, if the dependent data of the transaction data to be verified is identified as the target deletion transaction data and the uplink block of the transaction data to be verified is in the valid time range, determining that the transaction data to be verified is valid, otherwise, determining that the transaction data to be verified is invalid.
Further, the target deletion transaction data determining module 401 is specifically configured to:
acquiring a data deletion notice or a data deletion transaction request initiated by a set supervisory user;
and determining target deleted transaction data according to the screening condition of the abnormal data in the data deletion notice or the data deletion transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs.
Further, the target deletion transaction data determining module 401 is specifically configured to:
acquiring a data deletion voting transaction request initiated by a user;
determining target deleted transaction data according to the screening condition of the abnormal data in the data deletion voting transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs;
and determining the validity of the target deletion transaction data according to the voting result of the block link point aiming at the data deletion voting transaction request.
Further, the apparatus further comprises an effective time determination module configured to:
acquiring a specified effective time range from the data deletion notification or the data deletion transaction request; or
And determining a block before a voting result validation block of the data deletion voting transaction request as the valid time range.
Further, the data content deleting module 402, when executing deleting the data content in the target deletion transaction data, is specifically configured to:
and if the target deleted transaction data is transfer transaction data, deleting the roll-out account information in the transfer transaction data, and reserving the roll-in account information.
The processing device for processing the block chain abnormal data can execute the processing method for the block chain abnormal data provided by any embodiment of the application, and has the corresponding functional modules and the beneficial effects of executing the processing method for the block chain abnormal data.
EXAMPLE five
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
As shown in fig. 5, the block diagram is a block diagram of an electronic device executing a method for processing block chain exception data according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 5, the electronic apparatus includes: one or more processors 501, memory 502, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, if desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 5, one processor 501 is taken as an example.
Memory 502 is a non-transitory computer readable storage medium as provided herein. The memory stores instructions executable by at least one processor to cause the at least one processor to perform the method for processing block chain exception data provided herein. The non-transitory computer-readable storage medium of the present application stores computer instructions for causing a computer to execute the processing method of block chain anomaly data provided by the present application.
The memory 502, which is a non-transitory computer-readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the processing method of block chain exception data in the embodiment of the present application (for example, the processing apparatus 400 of block chain exception data including the target deletion transaction data determination module 401, the data content deletion module 402, and the deletion flag setting module 403 shown in fig. 4). The processor 501 executes various functional applications of the server and data processing, i.e., a processing method of the block chain exception data in the above method embodiment, by running the non-transitory software programs, instructions, and modules stored in the memory 502.
The memory 502 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by use of an electronic device that performs a processing method of block chaining exception data, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 502 may optionally include a memory remotely located from the processor 501, and these remote memories may be connected over a network to an electronic device that performs the processing method of the blockchain exception data. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device performing the processing method of the block chain exception data may further include: an input device 503 and an output device 504. The processor 501, the memory 502, the input device 503 and the output device 504 may be connected by a bus or other means, and fig. 5 illustrates the connection by a bus as an example.
The input device 503 may receive input numeric or character information and generate key signal input related to user settings and function control of an electronic apparatus that performs a processing method of block chain abnormal data, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, or the like. The output devices 504 may include a display device, auxiliary lighting devices (e.g., LEDs), and haptic feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the transaction data to which the abnormal data stored in the block chain belongs is used as the target deletion transaction data; deleting the data content in the target deletion transaction data, and reserving the transaction identifier in the block; and setting a deletion mark for the target deletion transaction data in the block chain, wherein the deletion mark is used for indicating that the transaction identifier of the target deletion transaction data is valid in the verification process of the target deletion transaction data. According to the technical scheme, the data content of the transaction data to which the abnormal data belongs is deleted, the transaction identifier of the deleted transaction data is reserved, and the deletion mark is introduced to indicate that the transaction identifier corresponding to the deleted transaction data is effective, so that the abnormal data such as error information or illegal records in the block chain are physically deleted, the purpose of effectively processing the abnormal data stored in the block chain is achieved, and the influences of the irreparability of the abnormal data on the correctness and the legality of the data stored in the block chain are avoided.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (11)

1. A method for processing block chain exception data, performed by a block chain node, the method comprising:
deleting transaction data by taking the transaction data to which the abnormal data belongs as a target, wherein the abnormal data is data stored in a block chain; the transaction data to which the abnormal data belongs is transaction data containing the abnormal data, or transaction data using the abnormal data as input data and/or output data;
deleting the data content in the target deletion transaction data, and reserving the transaction identifier in the block;
when deleting the data content in the target deletion transaction data, marking a deletion participant signature for the deletion operation of the target deletion transaction data in a block chain;
setting a deletion mark for the target deletion transaction data in a block chain;
wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation process of the target delete transaction data.
2. The method of claim 1, wherein, while deleting the data content in the target deletion transaction data, further comprising:
marking a valid time range for the target delete transaction data in a blockchain.
3. The method of claim 2, wherein at least one of the delete marker, the delete participant signature, and the validity time range is recorded in a set field in data content of the target delete transaction data.
4. The method of claim 2, further comprising:
when any transaction data stored in the block chain is verified, if the dependent data of the transaction data to be verified is identified as the target deletion transaction data and the uplink block of the transaction data to be verified is in the valid time range, determining that the transaction data to be verified is valid, otherwise, determining that the transaction data to be verified is invalid.
5. The method of claim 1, wherein deleting the transaction data to which the abnormal data belongs as a target comprises:
acquiring a data deletion notification or a data deletion transaction request initiated by a set supervisory user;
and determining target deleted transaction data according to the screening condition of the abnormal data in the data deletion notice or the data deletion transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs.
6. The method of claim 1, wherein deleting the transaction data to which the abnormal data belongs as a target comprises:
acquiring a data deletion voting transaction request initiated by a user;
determining target deleted transaction data according to the screening condition of the abnormal data in the data deletion voting transaction request, the content of the abnormal data or the transaction identifier of the transaction data to which the abnormal data belongs;
and determining the validity of the target deletion transaction data according to the voting result of the block link point aiming at the data deletion voting transaction request.
7. The method of claim 5 or 6, further comprising:
acquiring a specified valid time range from the data deletion notification or the data deletion transaction request; or
And determining a block before a voting result validation block of the data deletion voting transaction request as the valid time range.
8. The method of claim 1, wherein deleting data content in the target deletion transaction data comprises:
and if the target deleted transaction data is transfer transaction data, deleting the roll-out account information in the transfer transaction data, and reserving the roll-in account information.
9. An apparatus for processing block chain abnormal data, configured at a block chain node, the apparatus comprising:
the target deletion transaction data determining module is used for taking the transaction data to which the abnormal data belongs as target deletion transaction data, wherein the abnormal data are data stored in a block chain; the transaction data to which the abnormal data belongs is transaction data containing the abnormal data, or transaction data using the abnormal data as input data and/or output data;
the data content deleting module is used for deleting the data content in the target deleted transaction data and reserving the transaction identifier in the block;
the initiator signature marking module is used for marking the signature of a deletion participant for the deletion operation of the target deletion transaction data in a block chain while deleting the data content in the target deletion transaction data;
a delete marker setting module, configured to set a delete marker for the target delete transaction data in a block chain;
wherein the delete marker is used to indicate that the transaction identifier of the target delete transaction data is valid during the validation of the target delete transaction data.
10. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of processing block chain exception data as claimed in any one of claims 1 to 8.
11. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform a method of processing block chain anomaly data according to any one of claims 1 to 8.
CN201911047943.9A 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data Active CN110808839B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911047943.9A CN110808839B (en) 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911047943.9A CN110808839B (en) 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data

Publications (2)

Publication Number Publication Date
CN110808839A CN110808839A (en) 2020-02-18
CN110808839B true CN110808839B (en) 2022-07-12

Family

ID=69489646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911047943.9A Active CN110808839B (en) 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data

Country Status (1)

Country Link
CN (1) CN110808839B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111445210B (en) * 2020-03-27 2023-10-20 咪咕文化科技有限公司 Account cleaning method and device, electronic equipment and storage medium
CN112035497B (en) * 2020-08-31 2023-08-04 北京百度网讯科技有限公司 Method and apparatus for cleaning committed transaction information
WO2023279059A2 (en) * 2021-06-30 2023-01-05 Artema Labs, Inc Distributed ledgers with ledger entries containing redactable payloads
CN114124641B (en) * 2021-11-26 2023-06-02 成都质数斯达克科技有限公司 Block chain exception service processing method, device, equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108615153A (en) * 2018-04-28 2018-10-02 百度在线网络技术(北京)有限公司 Processing method, device, system, equipment and the storage medium of block chain data
CN108961052A (en) * 2018-06-25 2018-12-07 百度在线网络技术(北京)有限公司 Verification method, storage method, device, equipment and the medium of block chain data
CN109299335A (en) * 2018-08-31 2019-02-01 阿里巴巴集团控股有限公司 Control method, device, server and the readable storage medium storing program for executing of data storage
US10365922B1 (en) * 2018-04-10 2019-07-30 Sap Se Distributed-ledger based enterprise application deployment and management
CN110209681A (en) * 2019-05-22 2019-09-06 深圳壹账通智能科技有限公司 Block chain data enter chain method, apparatus, computer equipment and storage medium
CN110232576A (en) * 2019-05-21 2019-09-13 深圳壹账通智能科技有限公司 A kind of trace to the source data processing method and relevant apparatus based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10171509B2 (en) * 2016-11-10 2019-01-01 International Business Machines Corporation Filtering and redacting blockchain transactions

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10365922B1 (en) * 2018-04-10 2019-07-30 Sap Se Distributed-ledger based enterprise application deployment and management
CN108615153A (en) * 2018-04-28 2018-10-02 百度在线网络技术(北京)有限公司 Processing method, device, system, equipment and the storage medium of block chain data
CN108961052A (en) * 2018-06-25 2018-12-07 百度在线网络技术(北京)有限公司 Verification method, storage method, device, equipment and the medium of block chain data
CN109299335A (en) * 2018-08-31 2019-02-01 阿里巴巴集团控股有限公司 Control method, device, server and the readable storage medium storing program for executing of data storage
CN109815373A (en) * 2018-08-31 2019-05-28 阿里巴巴集团控股有限公司 Control method, device, server and the readable storage medium storing program for executing of data storage
CN110232576A (en) * 2019-05-21 2019-09-13 深圳壹账通智能科技有限公司 A kind of trace to the source data processing method and relevant apparatus based on block chain
CN110209681A (en) * 2019-05-22 2019-09-06 深圳壹账通智能科技有限公司 Block chain data enter chain method, apparatus, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Study of Blockchains’s Consensus Mechanism Based on Credit;Yuhao Wang ET AL;《IEEE Access》;20190108;全文 *
基于联盟区块链的智能电网数据安全存储与共享系统;吴振铨等;《计算机应用》;20171010;全文 *

Also Published As

Publication number Publication date
CN110808839A (en) 2020-02-18

Similar Documents

Publication Publication Date Title
CN110808839B (en) Processing method, device, equipment and medium for block chain abnormal data
JP7199775B2 (en) Data processing method, data processing device, node device, and computer program based on smart contract
CN111930852B (en) Data processing method, device and equipment based on block chain and storage medium
US11823178B2 (en) Optimization of high volume transaction performance on a blockchain
CN110417918B (en) Distributed storage method and device for archive information, electronic equipment and medium
CN110661658B (en) Node management method and device of block chain network and computer storage medium
CN111163182B (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
CN108683668B (en) Resource checking method, device, storage medium and equipment in content distribution network
EP4216077A1 (en) Blockchain network-based method and apparatus for data processing, and computer device
CN110602108B (en) Data communication method, device, equipment and storage medium based on block chain network
CN111523890A (en) Data processing method and device based on block chain, storage medium and equipment
CN108260015B (en) Voting data processing method and device and electronic equipment
CN111464353A (en) Block link point management method, device, computer and readable storage medium
CN105022815A (en) Information interception method and device
CN111639309B (en) Data processing method and device, node equipment and storage medium
KR102011363B1 (en) Method for software authentication using block-chain authentication
CN104348905B (en) A kind of method and device of off-line PUSH message
CN107241312B (en) A kind of right management method and device
CN115114372A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN112200680B (en) Block link point management method, device, computer and readable storage medium
US11736299B2 (en) Data access control for edge devices using a cryptographic hash
CN116451210A (en) Rights recovery method, device, equipment and storage medium
CN109698974A (en) A kind of method, apparatus, electronic equipment and the medium of display progress
CN111405297A (en) Activity list settlement method and device and storage medium
CN110879835A (en) Data processing method, device and equipment based on block chain and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant