CN117851428A - Data updating method and device - Google Patents

Data updating method and device Download PDF

Info

Publication number
CN117851428A
CN117851428A CN202311755022.4A CN202311755022A CN117851428A CN 117851428 A CN117851428 A CN 117851428A CN 202311755022 A CN202311755022 A CN 202311755022A CN 117851428 A CN117851428 A CN 117851428A
Authority
CN
China
Prior art keywords
data
server
node
user
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311755022.4A
Other languages
Chinese (zh)
Inventor
田心
张平
刘振宇
宋若宁
张振
金洪亮
高帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN202311755022.4A priority Critical patent/CN117851428A/en
Publication of CN117851428A publication Critical patent/CN117851428A/en
Pending legal-status Critical Current

Links

Abstract

The application discloses a data updating method and device, wherein the method comprises the following steps: the method comprises the steps that a first server obtains user information and first data of a first user from a first client, wherein the first data is data of litigation cases related to the first user; the first server sends a data request to the second server according to the user information of the first user and the first data; the first server receives second data from the second server; the first server determines updated information of litigation cases related to the first user according to the second data; the first server provides the update information to the first client. The method can improve the accuracy of information acquisition of equipment in the civil litigation system.

Description

Data updating method and device
Technical Field
The embodiment of the application relates to the field of privacy computation, in particular to a data updating method and device.
Background
Currently, in the process of processing data by cooperation of multiple devices, in order to protect private data of each device, the multiple devices are required to be provided with a computing node and a local database, wherein the computing node is used for processing and operating acquired data by the devices at a local server, and the local database is used for storing the processed and operated data by the devices. In some of the more specialized fields, since the multiparty devices also need to verify the data after processing operation at the local server node, respectively. Taking litigation data processing in the field of government affairs as an example, in the case of civil litigation in which a server of any local court is not involved in processing the national litigation of the province inspection court, when a worker of any local court determines that the data sent by the case related party in the civil litigation are abnormal, the server of the local court needs to calculate update information for the case related party at a local server node after obtaining user data.
Therefore, although the security of the data is ensured, the computing resource overhead of the server is increased, so that the update efficiency of the server on the user data with abnormality is lower.
Disclosure of Invention
The embodiment of the application provides a data updating method and device, which are used for improving the updating efficiency of a server to user data.
In a first aspect, a data updating method provided in an embodiment of the present application includes:
the method comprises the steps that a first server obtains user information and first data of a first user from a first client, wherein the first data are data of litigation cases related to the first user; the first server sends a data request to a second server according to the user information of the first user and the first data, wherein the data request is used for requesting the second server to acquire second data, the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type; the first server receives the second data from the second server; the first server determines update information of litigation cases related to the first user according to the second data; the first server provides the update information to the first client, the update information being used by the first client to update the first data.
According to the method, the first server can obtain the user information and the first data of the first client, and request the second data from the second server according to the user information and the first data. The second data is data of litigation cases related to the first user, and the first data and the second data have the same data type. The first server can determine the update information at the local server according to the second data, and provide the update information for the first client, so that the first client does not need to consume computing resources at a server node of the client to obtain the update information, thereby saving the server computing resources of the client and improving the update efficiency of the first client to the user data.
In one possible design, the first server receiving the second data from the second server includes: the first server receiving the encrypted second data from the second server; the first server decrypts the encrypted second data to obtain the second data from the second server.
According to the design, data are transmitted between the first server and the second server through encryption, and the safety of the first server and the second server in the data transmission process is guaranteed.
In one possible design, the second server includes a first server node and a second server node, the second data includes first node data from the first server node and second node data from the second server node, the first server determines update information of litigation cases related to the first user according to the second data, including: the first server determines intersection data of the first node data and the second node data, the update information including the intersection data.
According to the design, the first server can acquire intersection data according to the node data of the plurality of server nodes, and the intersection data is used as update information, so that the first client can acquire the update information, and the accuracy of the update information can be improved.
In one possible design, the method further comprises: the first server acquires third data from a second client, wherein the third data is data of litigation cases related to the first user, and the third data has the same data type as the first data; the first server determining intersection data of the first node data and the second node data, comprising: the first server determines intersection data of the third data, the first node data, and the second node data.
According to the design, the first server can acquire intersection data according to node data of a plurality of server nodes and third data acquired by the first server from the database of the first server, and accuracy of the intersection data can be further improved.
In one possible design, the second server includes a third server node and a fourth server node, the second data includes third node data from the third server node and fourth node data from the fourth server node, and the first server determines update information of litigation cases related to the first user according to the second data, including: the first server obtains a data update model trained according to the third node data and the fourth node data, and the update information comprises the data update model.
According to the design, the first server can train according to the node data of the plurality of server nodes to obtain a data updating model, and the data updating model is provided for the first client, so that when the first client subsequently obtains abnormal data of the user, the user information and the data can be automatically updated according to the data updating model sent by the first client, and the updating efficiency of the first client to the user data is further improved.
In one possible design, the method further comprises: the first server acquires fourth data from the second client, wherein the fourth data is data of litigation cases related to the first user, and the fourth data has the same data type as the first data; the first server obtains a data update model obtained through training according to the third node data and the fourth node data, and the data update model comprises the following steps: and the first server obtains a data updating model obtained through training according to the fourth data, the third node data and the fourth node data.
According to the design, the first server can train to obtain the data updating model according to the node data of the plurality of server nodes and the third data obtained by the first server from the database of the first server, and the accuracy of the data updating model can be improved.
In one possible design, the first server and the second server belong to the same level of servers.
According to the design, the first server and the second server can belong to the same-level server, the same-level server can be provided with provincial computing nodes, and the first server can carry out privacy computation in the computing nodes according to the data of the same user sent by the plurality of servers of the same level, so that the accuracy of obtaining updated user data is improved.
In a second aspect, embodiments of the present application further provide a data updating method, including:
the method comprises the steps that a second server obtains a data request sent by a first server according to first data, wherein the data request is sent by the first server according to user information of a first user from a first client and the first data, and the first data is data of litigation cases related to the first user;
the second server obtains second data according to the data request, wherein the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type;
the second server sends the second data to the first server, the second data being used by the first server to determine updated information for litigation cases related to the first user.
According to the method, the second server can acquire the data request of the first server, determine the data type of second data to be acquired according to the data request, wherein the second data is the data of the data type of the first data of the same target user, determine the second data from the legal document, and send the second data to the first server, so that the accuracy of acquiring the second data by the first server can be improved.
In one possible design, the second server includes a first server node and a second server node, the second data includes first node data from the first server node and second node data from the second server node, the first node data and the second node data are used by the first server to determine the update information, the update information includes intersection data.
In one possible design, the second server includes a third server node and a fourth server node, the second data includes third node data from the third server node and fourth node data from the fourth server node, the third node data and the fourth node data are used by the first server to determine the update information, the update information includes a data update model.
In one possible design, the second server sending the second data to the first server includes: the second server transmits the encrypted second data to the first server.
According to the design, data are transmitted between the first server and the second server through encryption, and the safety of the first server and the second server in the data transmission process is guaranteed.
In a third aspect, an embodiment of the present application further provides a data updating device, including an acquisition module and a processing module. Wherein:
the acquisition module is used for acquiring user information and first data of a first user from a first client, wherein the first data is data of litigation cases related to the first user; the processing module is used for sending a data request to a second server according to the user information of the first user and the first data, wherein the data request is used for requesting the second server to acquire second data, the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type; the processing module is further configured to receive the second data from the second server; the processing module is further used for determining update information of litigation cases related to the first user according to the second data; the processing module is further configured to provide the update information to the first client, where the update information is used for the first client to update the first data.
In one possible design, the processing module is specifically configured to: receiving the encrypted second data from the second server; decrypting the encrypted second data to obtain the second data from the second server.
In one possible design, the second server includes a first server node and a second server node, the second data includes first node data from the first server node and second node data from the second server node, and the processing module is specifically configured to: and determining intersection data of the first node data and the second node data, wherein the update information comprises the intersection data.
In one possible design, the processing module is further configured to: acquiring third data from a second client, wherein the third data is data of litigation cases related to the first user, and the third data has the same data type as the first data; the processing module is specifically configured to: intersection data of the third data, the first node data, and the second node data is determined.
In one possible design, the second server includes a third server node and a fourth server node, the second data includes third node data from the third server node and fourth node data from the fourth server node, and the processing module is specifically configured to: and obtaining a data updating model obtained through training according to the third node data and the fourth node data, wherein the updating information comprises the data updating model.
In one possible design, the processing module is further configured to: acquiring fourth data from the second client, wherein the fourth data is data of litigation cases related to the first user, and the fourth data has the same data type as the first data; the processing module is specifically configured to: and obtaining a data updating model obtained through training according to the fourth data, the third node data and the fourth node data.
In one possible design, the first server and the second server belong to the same level of servers.
In a fourth aspect, an embodiment of the present application further provides a data updating device, including an acquisition module and a processing module. Wherein:
the acquisition module is used for acquiring a data request sent by a first server according to first data, wherein the data request is sent by the first server according to user information of a first user from a first client and the first data, and the first data is data of litigation cases related to the first user; the processing module is used for acquiring second data according to the data request, wherein the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type; the processing module is further configured to send the second data to the first server, where the second data is used for the first server to determine update information of litigation cases related to the first user.
In one possible design, the processing module is specifically configured to: and sending the encrypted second data to the first server.
In a fifth aspect, embodiments of the present application further provide a computer readable storage medium, where a computer program is stored, where the computer program, when executed by a processor, implements the method of the first aspect, the second aspect, and any one of the designs thereof.
In a sixth aspect, embodiments of the present application further provide an electronic device, including a memory and a processor, where the memory stores a computer program executable on the processor, and when the computer program is executed by the processor, causes the processor to implement the method of the first aspect, the second aspect, and any one of the designs thereof.
The technical effects of the third aspect to the sixth aspect and any one of the designs thereof may be referred to the technical effects of the corresponding designs in the first aspect and the second aspect, and will not be described herein.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a data updating method according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating another method for updating data according to an embodiment of the present disclosure;
FIG. 3 is a flowchart illustrating another method for updating data according to an embodiment of the present disclosure;
FIG. 4 is a flowchart illustrating another method for updating data according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the present application more apparent, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure. Embodiments and features of embodiments in this application may be combined with each other arbitrarily without conflict. Also, while a logical order of illustration is depicted in the flowchart, in some cases the steps shown or described may be performed in a different order than presented.
The terms first and second in the description and claims of the present application and in the above-described figures are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the term "include" and any variations thereof is intended to cover non-exclusive protection. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus. The term "plurality" in the present application may mean at least two, for example, two, three or more, and embodiments of the present application are not limited.
In the technical scheme, the data are collected, transmitted, used and the like, and all meet the requirements of national related laws and regulations.
Before describing a data updating method provided in the embodiments of the present application, for convenience of understanding, a technical background of the embodiments of the present application is first described in detail.
Currently, in the process of processing data by cooperation of multiple devices, in order to protect private data of each device, the multiple devices are required to be provided with a computing node and a local database, wherein the computing node is used for processing and operating acquired data locally by the devices, and the local database is used for storing the processed and operated data by the devices. And, the multiparty device may also need to verify the processed data at the local node. The method of processing operation adopted by the device is generally privacy calculation, and the device needs more calculation resources when accessing devices with different levels or devices with different authorities because sensitive data or privacy data are involved, so that usable sensitive data can be obtained.
Specifically, existing privacy calculations are applied in different fields such as: (1) The privacy computing method based on the container technology can determine a privacy data protection strategy based on the use habit and the historical privacy data of the user, and protect the privacy data of the user according to the protection strategy. (2) Privacy calculation is carried out in the block chain facing to the auditing service, equipment obtains data to be audited according to equipment data of more than two parties, a server database is accessed to obtain an operation instruction, and the data to be audited is forwarded according to the operation instruction. (3) The method is applied to cross-domain data calculation, and by constructing a zero-trust data storage environment, the data provider only needs to audit the application of the data user, and the application can approve the application to use the sensitive data of the data provider without malicious leakage behaviors. In the privacy computation related to the application method, the device needs to access the sensitive database and calculate based on the privacy disclosure coefficient to ensure that the data meets the security requirement. However, the above method may still cause leakage of part of user data in the process of calculation, and the device needs to additionally access databases of a plurality of servers, and calculate whether the data meets the security requirement for the private data multiple times. Taking litigation data processing in the government affairs field as an example, when a worker (such as a case transactor) of any place court determines that the data sent by the case related party in the civil litigation are abnormal, a server of the place court needs to calculate updated data for the case related party at a local server node after obtaining the user data. In a scenario where there is a higher demand for data security and data processing efficiency, such as in the field of civil litigation, it is difficult for the currently employed method to satisfy the demands of the server for data processing and updating.
Thus, in fields such as civil litigation, the update of user data by a server is inefficient.
In order to solve the above problems, the present application provides a data updating method for improving the updating efficiency of a server to user data.
For example, the computing node may be deployed at the first server, and the computing node of the first server may perform privacy computation according to data of any user provided by the first client, and provide update information for the user to the first client. When privacy calculation is performed, the method is not limited to privacy disclosure coefficient calculation, and secure multiparty calculation (secure multi-party computation, MPC) and federal learning calculation (Federated Learning, FL) such as quick secure exchange can be performed according to the data of the multiparty server, so that update information can be obtained by integrating multiparty data, and update efficiency of the server to user data can be improved.
By way of example, the method and the device can also realize that the computing resources are provided only at the first server, so that the first client side can be saved from purchasing high-performance computing power resources. In specific implementation, the method adopts a domestic cryptographic algorithm (or called national cryptographic algorithm), encrypts data aiming at actual service scenes, and realizes encrypted transmission of calculation results through a data sandbox mechanism, so that the security of sensitive data of a client is further improved. The data sandboxed mechanism refers to a device deployment data sandboxed component that may be used for data caching, determining an algorithm protocol (i.e., determining an algorithm to generate a key). The first server may encrypt or decrypt the data with the private key in the data sandboxed component, thereby further improving the security of the data. Data sandbox mechanism
The present application may also set a client-server (client-server) mode. The server may act as a server device. The client may act as a client device. The server has a computing node deployed therein. The client is deployed with a database. In this application, the first server and the second server may be server devices. The client-server is classified based on the algorithm component, so that the times of additional access of the client to databases of servers of different levels can be reduced, the first server and the second server which are in the same node process the data and provide operation results for the first client, the informatization operation and maintenance cost of the client can be reduced, and the problems of limited access capacity of the client and cross-level database access can be solved.
Fig. 1 schematically shows a flow chart of a data updating method. Illustratively, the method is performed by a first server.
Referring to the flow shown in fig. 1, the method provided in the embodiment of the present application may include the following steps:
in step 101, a first server obtains user information and first data of a first user from a first client, where the first data is data of litigation cases related to the first user.
Step 102, the first server sends a data request to the second server according to the user information of the first user and the first data.
Step 103, the second server obtains the second data according to the data request.
Step 104, the second server sends the second data to the first server.
In step 105, the first server determines updated information for litigation cases associated with the first user based on the second data.
In step 106, the first server provides the update information to the first client, and the update information is used for updating the first data by the first client.
Step 101 is described below. The first server obtains user information and first data of a first user from a first client, wherein the first data is data of litigation cases related to the first user.
Illustratively, the first server is any one of a plurality of servers. The plurality of servers further includes a second server, and the first server and the second server may be servers of the same level in the same region, or may be servers of the same level in different regions. For example, the first server and the second server are both provincial server nodes in the same region, or the first server and the second server are provincial server nodes across regions. In the litigation system, the inspection province level server and the inspection province level server, the inspection province level server and the court province level server all belong to the same-level server, and the inspection province level server and the inspection base level server (or the court base level server) belong to different-level servers.
It will be appreciated that any provincial server having a computing node deployed can be used as the first server, the first server being the party that receives the user information and the first data of the first user, and the second server being the party that receives the data request of the first server.
Alternatively, the first server or the second server may include a plurality of server nodes, and the plurality of server nodes may transmit data to each other. The first server and the second server may deploy a data sandbox, i.e. implement a data sandbox mechanism in the respective servers, the data transmitted in the data sandbox being encrypted data. For example, according to a data sandbox mechanism, the first server and the second server encrypt data according to a key, and transmit the encrypted data. The key may be generated based on a cryptographic algorithm, such as SM2 or SM4 algorithm, as used in the present application.
Illustratively, in litigation systems, either the first server or the second server is at a different level than the first client. The first client may have a database for the first client to receive user information and first data sent by the first user and for the first client to receive update information sent by the first server.
Illustratively, the first user refers to a user who sends data to be updated. The data to be updated sent by the first user comprises user information and first data of the first user, wherein the user information and the first data can be used for the first server to acquire update information from the second server, so that the first server can provide the update information for the first user.
For example, as shown in fig. 2, litigation systems can be divided into extranet and intranet. The government intranet may include a first server, a second server, and a first client. The plurality of servers of the litigation system can be classified into provincial servers (a review provincial server and a court provincial server) and basic-level servers (a review base-level server and a court base-level server) according to the level of the servers. The provincial server of the inspection department can be a first server, the provincial server of the court can be a second server, and the first server and the second server can mutually transmit data without limiting access additionally. And the inspection yard provincial server and the court provincial server can both carry out algorithm scheduling or service scheduling according to the deployed sandboxed program. The algorithm schedule may be used to determine the same privacy calculation key between the first server and the second server, and the traffic schedule may be used to transfer data between the first server and the second server. The specific process of algorithm scheduling and service scheduling may be determined based on the needs of the first server and the second server according to specific privacy calculations of the manager of the servers. The first client may include a plurality of clients, only one client is taken as an example in fig. 2, in practical situations, there may be a server corresponding to a plurality of clients, and each client may refer to the flow of obtaining the update information by the first client in the flow of obtaining the update information, so that details are not repeated. The first client may include a WEB page (WEB) front end and a database, the WEB front end may be used for the first client to obtain user information and data of a user, and the database may be used for the first client to store the user information and data of the user and also to store update information sent by the first server after the privacy calculation is completed. The government external network can comprise a privacy computing node front end processor, and the front end processor can be used for service scheduling and algorithm scheduling of the first server. The front-end processor can be set according to the needs of the manager of the server, and the application is not repeated.
In addition, in a litigation system, the first user may be the interested party of the litigation case. The user information may be information such as the name, identity information, etc. of the interested party in the litigation case. The first data may be data of litigation cases related to the interested party.
Optionally, the first client may generate a key according to a cryptographic algorithm, and encrypt the user information and the first data according to the key, so as to improve security of the first server for obtaining the user information and the first data of the first user. The first client may request the first server to receive encrypted first user data of the first client, where the first user data includes user information of the first user and the first data, and the request may be a post request. Correspondingly, the first server can receive the data of the first user sent by the first client after encryption, and then decrypt the data in the data sandbox to obtain the user information and the first data of the first user. The cryptographic algorithm comprises an SM2 or SM4 algorithm.
For example, the first client may generate a node certificate through the SM2 algorithm, and the certificate may include a pair of public and private keys, where the public key may be denoted as PKh, the private key may be denoted as Sk1, and the PKh may be used as a key of the first client. A clerk at the first client may log into the first client. The first client may obtain monetary Data and user information related to the first user in litigation cases, the monetary Data and user information being noted as Data. The first client may encrypt Data according to PKh to obtain Data'. The first client may use Sk1 as the digital signature for Data' and Sk1 as the post request. The first client may send Data' and post requests to either server node of the first server via hypertext transfer protocol (hypertext transfer protocol, HTTP). The server node of the first server may generate a public key PK1 according to the SM2 algorithm, PK1 for verifying Sk1 sent by the first client. After verification, the server node decrypts Data' in the Data sandbox to obtain Data of the first user of the first client, wherein the Data is user information and first Data of the first user of the first client.
Step 102, the first server sends a data request to the second server according to the user information of the first user and the first data.
Alternatively, the data request may include any data identification that may be generated by the first server based on the user information of the first user and the first data. The data request may be for the first server to request second data from the second server. The first device may determine the data identity based on the user information and the value or data type of the first data, and use the data identity as the data request.
Step 103, the second server obtains the second data according to the data request.
Alternatively, the second server may comprise a plurality of server nodes. The server node may be configured to obtain node data, which may be used by the first server to determine update information. After the second server obtains the data request, the second server may obtain, according to the data request, data related to the first user from a plurality of server nodes corresponding to the second server as second data, and the second server may send the second data to the first server. That is, the second data may be data transmitted by the same user (i.e., the first user) at a plurality of server nodes of the second server, and the data includes accurate data or real data corresponding to the first data of the user, so that the update information determined based on the second data may improve the accuracy of the update information.
Alternatively, the second data may correspond to data of the same user as the first data. The second data may comprise a database from any server node. The database of the second server comprises user information corresponding to any user and data of the user. The second server may determine a plurality of data of the first user, i.e., determine the second data, among the plurality of server nodes according to the user information of the first user.
Optionally, the second server may audit the data request, obtain the data identifier in the data request after the audit is passed, and determine the user information of the first user according to the data identifier.
Step 104, the second server sends the second data to the first server.
Alternatively, the second server may send the second data to the first server via a data sandbox. The data sandbox of the second server may be used to store the second data.
Alternatively, the second server may encrypt the second data according to the key of the second server, and send the encrypted second data to the first server.
Correspondingly, the first server receives the second data.
In step 105, the first server determines updated information for litigation cases associated with the first user based on the second data.
Alternatively, the update information may include intersection data or a data update model. The update information may be determined by the first server from second data of the second server. Based on the data sandboxed mechanism, the update information may be intersection data or a data update model determined from the encrypted second data.
Alternatively, the first server may determine update information according to the data of the first server and the second data, where the update information is intersection data. The data of the first server comprises third data, which may be data of the first user in a server node of the first server. The plurality of server nodes of the second server may include a first server node and a second server node, and the second data may include first node data from the first server node and second node data from the second server node. The first server can determine intersection data according to the first node data and the second node data, and can further determine intersection data according to the first node data, the second node data and the third data, so that the first server can obtain more accurate updating information. The first server may encrypt the third data and then obtain intersection data with the encrypted second data.
Optionally, the first server may further determine update information according to the data of the first server and the second server, where the update information is a data update model. The data of the first server includes fourth data, which may be data of the first user in a server node of the first server. The plurality of server nodes of the second server may include a third server node and a fourth server node, and the second data may include third node data from the third server node and fourth node data from the fourth server node. The first server can determine intersection data according to the third node data and the fourth node data, and can further determine a data update model according to the third node data, the fourth node data and the fourth data, so that the first server can obtain more accurate update information.
It should be noted that the first server may select only the intersection data of the second data as the update information, or only the data update model obtained from the second data as the update information, or may provide the first client with the update information including the intersection data and the data update model, with both the intersection data and the data update model as the update information.
Optionally, the first server may determine the training data and the labeling information corresponding to the training data according to the configured model file, and the training process of the data update model may be determined by a server manager of the configuration file. The input data of the trained data updating model can be false data or error data of the first user, the output data can be updated data of the first user, and the updated data has accuracy. It is understood that the model files generated based on the requirements of the claimant and the model training process corresponding to the model files are not limited in the application.
Optionally, the first server may also determine, according to the configured model file, labeling information corresponding to the training data according to the third node data, the fourth node data, and the fourth data as training data, to obtain a trained data update model. It should be noted that the above training process may be performed by the first server according to the requirement of the server manager, and the specific training process is not limited in this application.
For example, the first server may obtain an expert model file sent by a case handling person, determine a data update calculation model according to the expert model file, input the data update model according to the first data, and output the data update model as update information for the first data.
Optionally, the first server may overlay the first data in the data sandbox according to the update information, so that the first server provides the update information to the first client, so that the first client may update the first data according to the update information.
Optionally, the process of step 105 is described below with the first server being a server node of the provincial server for inspection and the second server being a server node of the provincial server for court, and the update information being intersection data.
Optionally, the server node of the provincial server of the inspection department can establish a node cooperation application with the server node of the provincial server of the court through a distributed-deployment privacy computing platform. The inspection provincial server may determine a task description that may be used by the court provincial server to obtain the second data of the first user, and the task description may include a data identification and a key algorithm required to perform encryption. The inspection provincial server can send a data request to the court provincial server, so that the court provincial server can acquire second data of a base court server node corresponding to the court provincial server, and the inspection provincial server can perform intersection according to the second data of the base court server node and third data of the inspection provincial server, and determine intersection data as update information. The intersection process performed by the court provincial server at the server node of the court provincial server may specifically include: determining an identifier according to the data type of the first user, wherein a plurality of second data obtained according to the data type of the first user can be used as a data set; the first server can acquire model result acquisition configuration sent by the manager, acquire the configuration according to the model result as labeling data of model output data, take the second data as input data, train the model to obtain a data update model, and then input the first data into the data update model and output update information.
Alternatively, the process of step 105 will be described with reference to fig. 3 by taking the first server as the server node of the provincial server of the inspection court and the second server as the server node of the provincial server of the court. As shown in fig. 3, the process of determining update information by the first server is as follows:
(1) After the first data is obtained by the inspection yard privacy computing node (i.e., the first server), a project cooperation starting request is sent to the court privacy computing node (i.e., the second server). The project collaboration start request includes a post request.
(2) The court privacy computing node obtains the project cooperation starting request and sends a confirmation request response or a rejection request response to the inspection court privacy computing node. And if the court privacy computing node rejects the request of the court privacy computing node, the court privacy computing node and the court privacy computing node end the collaborative project.
(3) If the court privacy computing node confirms the request of the inspection court privacy computing node, the inspection court privacy computing node generates a unique task UID, and the clerk configures the inspection court privacy computing node to edit the task operation.
(4) The inspection yard privacy computing node sends a task request, namely a data request, to the court privacy computing node. The inspection yard privacy computing node also transmits an identification of the data type of the first data and a task UID to the court privacy computing node. The court privacy computing node receives the workflow and the same task UID. The task UID is a data request.
(5) The court privacy computing node reviews the task request. And ending the collaborative project if the task request does not pass the audit.
(6) And if the task request passes the audit, the court privacy computing node sends task UID response information to the inspection court privacy computing node. And the inspection institute privacy computing node acquires task UID response information sent by the court privacy computing node. The court privacy computing node sends the encrypted electronic file data, namely the second data, to the inspection court privacy computing node.
(7) The court privacy computing node and the inspection court privacy computing node can start tasks according to the task UID response information. The inspection department privacy computing node can conduct security intersection calculation in the data sandbox according to the encrypted electronic volume data of the court privacy computing node and the encrypted electronic volume data of the inspection department privacy computing node, and the encrypted electronic volume data of the inspection department privacy computing node is third data.
(8) After the operation is completed, the inspection department privacy computing node and the court privacy computing node synchronize the task UID, and the task is confirmed to be ended.
(9) After the task is finished, the privacy computing node of the inspection department can obtain encrypted updated information Result' in the data sandbox. The inspection yard private computing node may decrypt the Data Result' in the Data sandbox to obtain a Result, replacing the first Data with the Result.
Alternatively, as shown in fig. 4, the first server may be any one of the provincial nodes of the inspection yard, and the second server may be another provincial node of the inspection yard, where any one of the provincial nodes of the inspection yard may be the inspection yard M, and another one of the provincial nodes of the inspection yard may be the inspection yard Nj (j > 0), any one of the inspection yard M is the first server, and another one of the provincial nodes of the inspection yard Nj is the server node of the second server. Any one of the provincial nodes of the inspection department and the other provincial node of the inspection department determine the updated information by referring to the example of the server nodes of the provincial server of the inspection department and the provincial server of the inspection department, namely, only the provincial server of the inspection department is changed into the provincial server of the inspection department, specifically, any one of the provincial node of the inspection department and the other provincial node of the inspection department determine the updated information comprising the following procedures:
(1) The privacy computing node of the inspection yard A initiates an item collaboration starting request to the privacy computing node of the inspection yard B, and the privacy computing node of the inspection yard B can receive the item collaboration starting request and send confirmation or rejection to the A. Project cooperation starting request is node cooperation application. The privacy computing node of the inspection yard a, namely the first server, and the privacy computing node of the inspection yard B can be a third server node or a fourth server node, and the privacy computing node of the inspection yard a and the privacy computing node of the inspection yard B are replaced by A, B respectively.
(2) If B rejects A's project cooperation start request, B can return project cooperation end response to A. The clerk can update the project collaborative start request and task description at a, causing a to reinitiate the request. The task description may include a model result acquisition configuration. B may wait with a to initiate or return a collaboration end response with the partner server.
(3) If A confirms that B passes the project cooperation starting request, A generates a unique task UID, and A and B synchronize the unique UID. And B, after the project cooperation starting request is passed, sending second data to A, wherein the A can obtain the second data sent by B, namely third node data and fourth node data. The second data and the first data belong to data corresponding to the same user.
(4) And A and B determine a data update model according to the same task UID and the third node data, the fourth node data and the fourth data. The A and the B can train according to the third node data, the fourth node data and the fourth data to obtain a data updating model.
(5) And A and B synchronize the task UID, and confirm the end of the task. A may get a data update model. And A and B synchronize the task UID, and confirm the end of the task.
In step 106, the first server provides the update information to the first client, and the update information is used for updating the first data by the first client.
Alternatively, the first server may send an end request to the second server after obtaining the update information. The first server may provide the update information to the first client. Accordingly, the first client may update the first data of the first client according to the update information in a sandboxed program of the first client.
Optionally, the update information provided by the first server to the first client is a data update model, so when the first client obtains the data to be updated input by the first user again, the first server does not need to initiate a data request again, the data update model can be directly used for updating the first data input by the first user again, and the efficiency of updating the first data can be improved.
Based on the same technical concept, the application exemplarily provides a data updating device. The apparatus may be used to perform the actions described in the method embodiments above. In this embodiment, the structure of the device may be as shown in fig. 5.
As shown in fig. 5, an exemplary data updating apparatus according to the present application may include an acquisition module 501 and a processing module 502.
When the function of the first server in the present application is implemented, the obtaining module 501 is configured to obtain user information and first data of a first user from a first client, where the first data is data of litigation cases related to the first user; the processing module 502 is configured to send a data request to a second server according to user information of the first user and the first data, where the data request is used to request the second server to obtain second data, the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type; the processing module 502 is further configured to receive the second data from the second server; the processing module 502 is further configured to determine update information of litigation cases related to the first user according to the second data; the processing module 502 is further configured to provide the update information to the first client, where the update information is used for the first client to update the first data.
Optionally, the processing module 502 is specifically configured to: receiving the encrypted second data from the second server; decrypting the encrypted second data to obtain the second data from the second server.
Optionally, the second server includes a first server node and a second server node, the second data includes first node data from the first server node and second node data from the second server node, and the processing module 502 is specifically configured to: and determining intersection data of the first node data and the second node data, wherein the update information comprises the intersection data.
Optionally, the processing module 502 is further configured to: acquiring third data from a second client, wherein the third data is data of litigation cases related to the first user, and the third data has the same data type as the first data; the processing module is specifically configured to: intersection data of the third data, the first node data, and the second node data is determined.
Optionally, the second server includes a third server node and a fourth server node, the second data includes third node data from the third server node and fourth node data from the fourth server node, and the processing module 502 is specifically configured to: and obtaining a data updating model obtained through training according to the third node data and the fourth node data, wherein the updating information comprises the data updating model.
Optionally, the processing module 502 is further configured to: acquiring fourth data from the second client, wherein the fourth data is data of litigation cases related to the first user, and the fourth data has the same data type as the first data; the processing module is specifically configured to: and obtaining a data updating model obtained through training according to the fourth data, the third node data and the fourth node data.
Optionally, the first server and the second server belong to the same level of servers.
When the function of the second server in the present application is implemented, the obtaining module 501 is configured to obtain a data request sent by the first server according to first data, where the data request is sent by the first server according to user information of a first user from the first client and the first data, and the first data is data of litigation cases related to the first user; the processing module 502 is configured to obtain second data according to the data request, where the second data is data of a litigation case related to the first user, and the first data and the second data have the same data type; the processing module 502 is further configured to send the second data to the first server, where the second data is used for the first server to determine update information of litigation cases related to the first user.
In one possible design, the processing module 502 is specifically configured to: and sending the encrypted second data to the first server.
The embodiment of the application also provides electronic equipment based on the same inventive concept as the embodiment of the method. The electronic device may be configured to perform the actions described in the method embodiments above. In this embodiment, the structure of the electronic device may include a memory 601 and one or more processors 602 as shown in FIG. 6.
A memory 601 for storing a computer program for execution by the processor 602. The memory 601 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, programs required for running an instant messaging function, and the like; the storage data area can store various instant messaging information, operation instruction sets and the like.
The memory 601 may be a volatile memory (RAM) such as a random-access memory (RAM); the memory 601 may also be a non-volatile memory (non-volatile memory), such as a read-only memory, a flash memory (flash memory), a Hard Disk Drive (HDD) or a Solid State Drive (SSD), or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited thereto. The memory 601 may be a combination of the above memories.
The processor 602 may include one or more central processing units (central processing unit, CPU) or digital processing units, etc. The processor 602 is configured to implement the above method when calling the computer program stored in the memory 601.
The specific connection medium between the memory 601 and the processor 602 is not limited in the embodiments of the present application. As an example, the embodiment of the present application is shown in fig. 6, where the memory 601 and the processor 602 are connected by a bus 603, where the bus 603 is shown in fig. 6 with a thick line, and the connection between other components is merely illustrative, and not limited to the foregoing. The bus 603 may be classified into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 6, but not only one bus or one type of bus.
Optionally, the processor 602 may be used to perform the actions described above as being performed by any one or more of the acquisition module 501 and the processing module 502.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device performs the method in the above-described embodiment.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application.

Claims (22)

1. A method of updating data, comprising:
the method comprises the steps that a first server obtains user information and first data of a first user from a first client, wherein the first data are data of litigation cases related to the first user;
The first server sends a data request to a second server according to the user information of the first user and the first data, wherein the data request is used for requesting the second server to acquire second data, the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type;
the first server receives the second data from the second server;
the first server determines update information of litigation cases related to the first user according to the second data;
the first server provides the update information to the first client, the update information being used by the first client to update the first data.
2. The method of claim 1, wherein the first server receiving the second data from the second server comprises:
the first server receiving the encrypted second data from the second server;
the first server decrypts the encrypted second data to obtain the second data from the second server.
3. The method of claim 1, wherein the second server includes a first server node and a second server node, the second data including first node data from the first server node and second node data from the second server node, the first server determining updated information for litigation cases related to the first user based on the second data, comprising:
the first server determines intersection data of the first node data and the second node data, the update information including the intersection data.
4. A method as claimed in claim 3, wherein the method further comprises:
the first server acquires third data from a second client, wherein the third data is data of litigation cases related to the first user, and the third data has the same data type as the first data;
the first server determining intersection data of the first node data and the second node data, comprising:
the first server determines intersection data of the third data, the first node data, and the second node data.
5. The method of claim 1, wherein the second server includes a third server node and a fourth server node, the second data includes third node data from the third server node and fourth node data from the fourth server node, the first server determining updated information for litigation cases related to the first user based on the second data, comprising:
the first server obtains a data update model trained according to the third node data and the fourth node data, and the update information comprises the data update model.
6. The method of claim 5, wherein the method further comprises:
the first server acquires fourth data from the second client, wherein the fourth data is data of litigation cases related to the first user, and the fourth data has the same data type as the first data;
the first server obtains a data update model obtained through training according to the third node data and the fourth node data, and the data update model comprises the following steps:
and the first server obtains a data updating model obtained through training according to the fourth data, the third node data and the fourth node data.
7. The method of claim 1, wherein the first server and the second server belong to the same level of servers.
8. A method of updating data, comprising:
the method comprises the steps that a second server obtains a data request sent by a first server according to first data, wherein the data request is sent by the first server according to user information of a first user from a first client and the first data, and the first data is data of litigation cases related to the first user;
the second server obtains second data according to the data request, wherein the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type;
the second server sends the second data to the first server, the second data being used by the first server to determine updated information for litigation cases related to the first user.
9. The method of claim 8, wherein the second server comprises a first server node and a second server node, the second data comprising first node data from the first server node and second node data from the second server node, the first node data and the second node data for the first server to determine the update information, the update information comprising intersection data.
10. The method of claim 8, wherein the second server includes a third server node and a fourth server node, the second data includes third node data from the third server node and fourth node data from the fourth server node, the third node data and the fourth node data are used by the first server to determine the update information, the update information includes a data update model.
11. The method of claim 8, wherein the second server sending the second data to the first server comprises:
the second server transmits the encrypted second data to the first server.
12. A data updating apparatus, comprising:
the acquisition module is used for acquiring user information and first data of a first user from a first client, wherein the first data is data of litigation cases related to the first user;
the processing module is used for sending a data request to a second server according to the user information of the first user and the first data, wherein the data request is used for requesting the second server to acquire second data, the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type;
The processing module is further configured to receive the second data from the second server;
the processing module is further used for determining update information of litigation cases related to the first user according to the second data;
the processing module is further configured to provide the update information to the first client, where the update information is used for the first client to update the first data.
13. The apparatus of claim 12, wherein the processing module is specifically configured to:
receiving the encrypted second data from the second server;
decrypting the encrypted second data to obtain the second data from the second server.
14. The apparatus of claim 12, wherein the second server comprises a first server node and a second server node, the second data comprising first node data from the first server node and second node data from the second server node, the processing module being specifically configured to:
and determining intersection data of the first node data and the second node data, wherein the update information comprises the intersection data.
15. The apparatus of claim 14, wherein the processing module is further to:
acquiring third data from a second client, wherein the third data is data of litigation cases related to the first user, and the third data has the same data type as the first data;
the processing module is specifically configured to:
intersection data of the third data, the first node data, and the second node data is determined.
16. The apparatus of claim 12, wherein the second server comprises a third server node and a fourth server node, the second data comprising third node data from the third server node and fourth node data from the fourth server node, the processing module being specifically configured to:
and obtaining a data updating model obtained through training according to the third node data and the fourth node data, wherein the updating information comprises the data updating model.
17. The apparatus of claim 16, wherein the processing module is further to:
acquiring fourth data from the second client, wherein the fourth data is data of litigation cases related to the first user, and the fourth data has the same data type as the first data;
The processing module is specifically configured to:
and obtaining a data updating model obtained through training according to the fourth data, the third node data and the fourth node data.
18. The apparatus of claim 12, wherein a first server and the second server belong to the same level of servers.
19. A data updating apparatus, comprising:
the acquisition module is used for acquiring a data request sent by a first server according to first data, wherein the data request is sent by the first server according to user information of a first user from a first client and the first data, and the first data is data of litigation cases related to the first user;
the processing module is used for acquiring second data according to the data request, wherein the second data is data of litigation cases related to the first user, and the first data and the second data have the same data type;
the processing module is further configured to send the second data to the first server, where the second data is used for the first server to determine update information of litigation cases related to the first user.
20. The apparatus of claim 19, wherein the processing module is specifically configured to:
and sending the encrypted second data to the first server.
21. An electronic device comprising a processor and a memory, wherein the memory stores program code that, when executed by the processor, causes the processor to perform the steps of the method of any of claims 1-11.
22. A computer readable storage medium, characterized in that it stores a program code for causing an electronic device to perform the steps of the method according to any one of claims 1-11, when said program code is run on the electronic device.
CN202311755022.4A 2023-12-19 2023-12-19 Data updating method and device Pending CN117851428A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311755022.4A CN117851428A (en) 2023-12-19 2023-12-19 Data updating method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311755022.4A CN117851428A (en) 2023-12-19 2023-12-19 Data updating method and device

Publications (1)

Publication Number Publication Date
CN117851428A true CN117851428A (en) 2024-04-09

Family

ID=90529642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311755022.4A Pending CN117851428A (en) 2023-12-19 2023-12-19 Data updating method and device

Country Status (1)

Country Link
CN (1) CN117851428A (en)

Similar Documents

Publication Publication Date Title
US20220092586A1 (en) Off network identity tracking in anonymous cryptocurrency exchange networks
CA3058013C (en) Managing sensitive data elements in a blockchain network
CN113711536B (en) Extracting data from a blockchain network
WO2019228555A2 (en) System and method for blockchain-based notification
CN110383791B (en) Map application crowdsourcing based on blockchain
CN110599095B (en) Block chain network-based hazardous waste treatment method and node of block chain network
US9325711B2 (en) Apparatus and data processing systems for accessing an object
EP4216077A1 (en) Blockchain network-based method and apparatus for data processing, and computer device
CN111066047A (en) Implementing a blockchain based workflow
CN111291394B (en) False information management method, false information management device and storage medium
CN113328997B (en) Alliance chain crossing system and method
AU2019380381A1 (en) Smart logistics management using blockchain
US11184395B1 (en) Cross-network identity provisioning
KR20220160021A (en) Low Trust Privilege Access Management
DE112021003971T5 (en) SUSTAINABLE TOKENS FOR A PRIVACY PROTECTED PROTOCOL SUPPLY CHAIN
US20100262837A1 (en) Systems And Methods For Personal Digital Data Ownership And Vaulting
US20220036323A1 (en) Electronic wallet allowing virtual currency expiration date
CN111833190A (en) Annuity data processing method, device, medium and electronic equipment
Gu et al. Autonomous resource request transaction framework based on blockchain in social network
Yoon et al. Blockchain-based object name service with tokenized authority
US11550796B2 (en) Coexistence mediator for facilitating blockchain transactions
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
US20220179843A1 (en) Blockchain endorsement agreement
CN117851428A (en) Data updating method and device
Bakhtina et al. On the shift to decentralised identity management in distributed data exchange systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination