CN106446705A - Cyclic writing method and system of data on the basis of block chain - Google Patents
Cyclic writing method and system of data on the basis of block chain Download PDFInfo
- Publication number
- CN106446705A CN106446705A CN201610741281.5A CN201610741281A CN106446705A CN 106446705 A CN106446705 A CN 106446705A CN 201610741281 A CN201610741281 A CN 201610741281A CN 106446705 A CN106446705 A CN 106446705A
- Authority
- CN
- China
- Prior art keywords
- block chain
- data
- hash
- data block
- new
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0644—Management of space entities, e.g. partitions, extents, pools
Abstract
The invention discloses a cyclic writing method and system of data on the basis of a block chain. Before new data is written into the block chain, whether data stored in a block chain database meets a preset trigger condition or not is judged, the new data is written to cover and destroy original data under a situation that a preset condition is met, and usefulness data can be destroyed while the volume of the block chain is effectively controlled. The data is stored into the block chain database to guarantee that data is not tampered and can be safely stored, in addition, a cyclic writing way is adopted to effectively control the volume of the block chain database, the data which meets the preset trigger condition is not displayed in a block chain system and is covered and destroyed by the new data, privacy and privacy are good, the storage of a hash value corresponding to a data block also can guarantee to verify whether the downloaded data is correct or not, and the cyclic writing method and system is safe, convenient and high in practicality.
Description
Technical field
The present invention relates to field of computer technology is and in particular to a kind of datacycle wiring method based on block chain and be
System.
Background technology
Existing block catenary system is chain type block chain, and all data of write are all permanently kept in database, often
One people having network access authority, unconditional can access, downloads these permanent data.This permanent
There are following two problems in chain type block catenary system:1st, As time goes on the data of required storage gets more and more, block counts
According to storehouse can increasing it has not been convenient to preserve, but not all data is required to persistence, some data only need to
Retain in the corresponding time limit, the data exceeding the time limit can be deleted;2nd, the privacy of some classified papers of storage or individual
Information also has certain conserving time limit to require, and after reaching a specified time, needs to be destroyed according to actual conditions;3rd, existing area
Block catenary system is transparent open system, and its data is supplied to everyone open access, and its privacy and control authority do not obtain
Control to effective.
In addition, when the block chain database of data storage cannot write data again, there is no the block chain database backing up
Data can be led to cannot to write in time.
Content of the invention
The technical problem to be solved is to provide a kind of datacycle wiring method based on block chain and system,
The volume that block chain database can be made is effectively controlled, and the data meeting default trigger condition will no longer be shown in block
In catenary system, destroyed by new data cover, privacy and confidentiality are preferable, simultaneously as employing a plurality of mutually redundant area
Block chain data storage, it is ensured that will not lose efficacy because of certain block chain, leads to the data of required storage cannot store in time
Situation occurs, and data preserves continuity and security is preferable.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:
According to one aspect of the present invention, there is provided a kind of datacycle wiring method based on block chain, methods described
Including:
S101, before writing new data block in data block chain, judge whether to meet default recurrent wrIting and touch
Clockwork spring part;
If S102 meets described recurrent wrIting condition, the new data block of write is covered former in data block chain
Some data blocks, new data block of otherwise writing direct, original data block is not covered.
Beneficial effects of the present invention:A kind of datacycle wiring method based on block chain that the present invention provides, Neng Gou
Before writing new data in block chain, judge whether stored data in block chain database meets default triggering bar
Part, and meet pre-conditioned in the case of, write new data to cover destruction legacy data, obtain in the volume making block chain
To useless data can also be destroyed while effective control.The present invention is by data storage to block chain database it is ensured that counting
According to being tampered, store safety, and be effectively controlled using the volume that the method for recurrent wrIting makes block chain database,
The data meeting default trigger condition will no longer be shown in block catenary system, is destroyed by new data cover, privacy and
Confidentiality is preferable, safe ready, and practicality is stronger.
Further, described in described S101, recurrent wrIting trigger condition specifically includes time triggered condition, main data area
The memory capacity trigger condition of block chain or trigger conditions.
Beneficial effect using above-mentioned further scheme:According to actual conditions, trigger condition is set, various to be applied to
Actual conditions.
Further, also include:When writing new data block in described data block chain, also new data block is given birth to
In the hash value write hash block chain becoming;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers
Cover the hash value that original data block generates, the hash value that the data block otherwise writing direct new generates, not to original data
The hash value that block generates is covered.
Beneficial effect using above-mentioned further scheme:Each data block can generate a hash value, and is stored,
It is easy in download or backup, whether the data of checking download or backup is intercepted to be distorted the authenticity it is ensured that data, because
Relatively more for data, checking is cumbersome, and only checking hash value is more convenient.
Further, also include after described S102:
Data in described data block chain is downloaded, and verifies each data block generation in the data of download
Whether hash value is identical with the hash value of corresponding data block in described hash block chain, if identical, verifies the data of download
It is not intercepted and distorts, if it is different, being then downloaded identical until verifying again.
Beneficial effect using above-mentioned further scheme:Ensure that the authenticity of the data downloading, it is to avoid by mistake
Data mislead.
Further, also include:
Described data block chain is provided with two, and two described data block chains backup each other;
Described hash block chain is provided with two, and two described hash block chains backup each other.
Beneficial effect using above-mentioned further scheme:Data is carried out with backup ensure, when some block chain lost efficacy,
Guarantee can write data in another block chain.
Further, also include:
The block chain algorithm that two mutually redundant described data block chains are correspondingly arranged respectively is different with communication port;
The block chain algorithm that two mutually redundant described hash block chains are correspondingly arranged respectively is different with communication port.
Beneficial effect using above-mentioned further scheme:Ensure logical in the block chain algorithm of some block chain or communication
When road goes wrong, another block chain using different blocks chain algorithm or communication port being capable of normal work.
Further, also include:
When data block chain lost efficacy wherein, the data backup in the data block not lost efficacy chain is new to one
Block chain, and using this new block chain as new data block chain;
Calculate each data block corresponding hash value in described new data block chain, whether then verify described hash value
Identical with the hash value in described hash block chain, if it is different, then re-starting backup until identical.
Beneficial effect using above-mentioned further scheme:When there being a data block chain to go wrong, backup one is new
Block chain become new data block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid
It is intercepted in backup procedure and distort.
Further, also include:
When a hash block chain lost efficacy wherein, the hash value in the hash not lost efficacy block chain is backed up to one newly
Block chain, and using this new block chain as new hash block chain;
Verify hash value in described new hash block chain whether with the hash block chain not lost efficacy in hash value phase
With if it is different, then re-starting backup until identical.
Beneficial effect using above-mentioned further scheme:When there being a hash block chain to go wrong, backup one is new
Block chain become new hash block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid
It is intercepted in backup procedure and distort.
According to another aspect of the present invention, provide a kind of datacycle writing system based on block chain, including:
Judging unit, for, before writing new data block in data block chain, judging whether to meet default following
Ring writes trigger condition;
Data write unit is if for meeting described recurrent wrIting condition, new by write in data block chain
Data block covers original data block, new data block of otherwise writing direct, and original data block is not covered.
Beneficial effect of the present invention:A kind of datacycle writing system based on block chain that the present invention provides, can be in area
Before writing new data in block chain, judge whether stored data in block chain database meets default triggering bar
Part, and meet pre-conditioned in the case of, write new data to cover destruction legacy data, obtain in the volume making block chain
To useless data can also be destroyed while effective control.The present invention is by data storage to block chain database it is ensured that counting
According to being tampered, store safety, and be effectively controlled using the volume that the method for recurrent wrIting makes block chain database,
The data meeting default trigger condition will no longer be shown in block catenary system, is destroyed by new data cover, privacy and
Confidentiality is preferable, safe ready, and practicality is stronger.
Further, also include:Hash writing unit, for writing new data block in described data block chain
When, in the hash value write hash block chain also new data block being generated;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers
Cover the hash value that original data block generates, the hash value that the data block otherwise writing direct new generates, not to original data
The hash value that block generates is covered.
Beneficial effect using above-mentioned further scheme:Each data block can generate a hash value, and is stored,
It is easy in download or backup, whether the data of checking download or backup is intercepted to be distorted the authenticity it is ensured that data, because
Relatively more for data, checking is cumbersome, and only checking hash value is more convenient.
Further, also include:
Download authentication unit, for being downloaded to the data in described data block chain, and verify in the data of download
Each data block generate hash value whether identical with the hash value of corresponding data block in described hash block chain, if phase
Same, then verify that the data of download is not intercepted and distort, if it is different, being then downloaded identical until verifying again.
Beneficial effect using above-mentioned further scheme:Ensure that the authenticity of the data downloading, it is to avoid by mistake
Data mislead.
Further, also include:
Data backup unit, when losing efficacy for wherein data block chain, by the data block not lost efficacy chain
Data backup to a new block chain, and using this new block chain as new data block chain;
Calculate authentication unit, for calculating each data block corresponding hash value in described new data block chain, then
Verify whether described hash value is identical with the hash value in described hash block chain, if it is different, then going to described data backup list
Unit is until checking is identical.
Beneficial effect using above-mentioned further scheme:When there being a data block chain to go wrong, backup one is new
Block chain become new data block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid
It is intercepted in backup procedure and distort.
Further, also include:
Hash backup units, when losing efficacy for wherein hash block chain, by the hash not lost efficacy block chain
Hash value backs up to a new block chain, and using this new block chain as new hash block chain;
Authentication unit, for verify the hash value in described new hash block chain whether with the hash block chain not lost efficacy
In hash value identical, if it is different, then go to hash backup units until checking identical.
Beneficial effect using above-mentioned further scheme:When there being a hash block chain to go wrong, backup one is new
Block chain become new hash block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid
It is intercepted in backup procedure and distort.
Brief description
Fig. 1 is a kind of datacycle wiring method flow chart based on block chain of the embodiment of the present invention one;
Fig. 2 is a kind of datacycle writing system schematic diagram based on block chain of the embodiment of the present invention two.
Specific embodiment
Below in conjunction with accompanying drawing, the principle of the present invention and feature are described, example is served only for explaining the present invention, and
Non- for limiting the scope of the present invention.
Embodiment one, a kind of datacycle wiring method based on block chain.With reference to Fig. 1, the present embodiment is provided
Method is described in detail.
Referring to Fig. 1, S101, before writing new data block in data block chain, judge whether to meet default following
Ring writes trigger condition.
Specifically, before writing new data in block chain data, judge that in block chain database, original data is
No meet default trigger condition, wherein said trigger condition specifically includes time triggered condition, depositing in block chain database
Storage capacity trigger condition or concrete trigger conditions.
If S102 meets described recurrent wrIting condition, the new data block of write is covered former in data block chain
Some data blocks, new data block of otherwise writing direct, original data block is not covered.
Specifically, if original data meets default trigger condition in block chain database, such as meet time triggered
Condition or capacity trigger condition or concrete trigger conditions, then when writing new data, using the side of recurrent wrIting
Method overrides the data having been written into, and destroys original data with new data cover, when covering the original data of destruction,
It is usually data remote of first cover time;If being unsatisfactory for default trigger condition, directly write in block chain database
Enter new data, original data will not be covered.
For example, existing law-enforcing recorder or other adopt the audio/video information that card equipment gathered and be generally not stored in
In block chain, so there is the later stage possibility distorted maliciously is edited by people, and it is stored in content in block chain database then
There is not the possibility being tampered.Before writing new data in the block chain database in described law-enforcing recorder, first
In law-enforcing recorder to be judged, whether the record time of the data of block chain storage exceedes the Preset Time time limit, or law enforcement record
Whether the data capacity of the storage in instrument exceedes default memory capacity.If the described record time exceedes the described Preset Time time limit,
Or described data capacity exceedes described default memory capacity, then, when writing new data, can cover sequentially in time
Stored data, time data remote can first be capped;If the described record time is not above the described Preset Time time limit,
And described data capacity is not above described default memory capacity, then new data of writing direct, original number need not be covered
According to.Specifically, for example using memory capacity as Rule of judgment, if the memory capacity of law-enforcing recorder is 16G it is assumed that every section of sound
Video is 10M, can continuously enroll 1600 sections of little screens, after 16G storage has been expired, just starts to cover from the earliest time.
For example, for credit information service, before writing new data in the block chain database to credit information service, judge area
In block chain database, whether the credit record of the user of record record of bad behavior, and record of bad behavior specifically refers to user to be occurred being in arrears with
Refund, be late for delivery, back out of the contract, repudiation of the contract, fail to carry out the situation of contract.
Specifically, if record of bad behavior does not occur, cover the new credit of write user in default circulation time interior circulation
Record, specifically, block chain database only records nearest setting time, the personal credit record of such as nearest 3 years, and marks
Know for excellent, block chain database constantly circulates the personal credit record covering 3 years.
If record of bad behavior occurs, bad credit record is persistently retained, specifically, when user starts to give back debt,
Block chain database by the lasting reservation 5 years of this section of bad credit record, after 5 years after start the cycle over covering, write user
Bad credit record is override by new credit record.Reference can also set triggering and the cycling condition of oneself as desired.
For example, for some confidential datas, only need to be shown within the specific time according to related request, arrival sets
It is necessary to destroy after the fixed time, but the interior security reliability wanting guarantee information during detention.Using block chain data
Library storage confidential data, ensure that confidential data is not tampered with.
Specifically, if the confidential data of storage does not reach described time restriction in block chain database, proceed to protect
Stay, if reaching described time restriction, new other information of writing direct will carry out to described confidential data covering destroys.
In addition, the confidential data being stored in block chain database is then stored into block chain database after can encrypting
In, it is provided only to related personnel and check.
General materials can also be saved in block chain data, and equally conserving time limit is set, during for exceeding preservation
The general materials of limit, can be circulated covering according to predetermined trigger condition.
Furthermore it is possible to the content recurrent wrIting as requested in block chain database, such as periodic cyclic write.For example
The authority of some high-grade security systems is it should periodic cleaning and re-write authorization message.Using circulating overlayable
Block chain database, can solve the problems, such as credible and safe.
The scheme that the present embodiment provides also includes, when writing new data block in described data block chain, also will be new
Data block generate hash value write hash block chain in.Specifically, if meeting described recurrent wrIting condition, in hash area
Write the new data block hash value generating the hash value covering original data block generation in block chain, otherwise write direct new
Data block generate hash value, not to original data block generation hash value cover.Specifically, using pre-defined algorithm
Data block is carried out be calculated this data block corresponding hash value.
When being downloaded to the data in described data block chain, in order to ensure the authenticity of the data downloading,
Can verify what each data block in the data downloaded generated after the data in described data block chain is downloaded
Whether hash value is identical with the hash value of corresponding data block in described hash block chain, if identical, verifies the data of download
It is not intercepted and distorts, if it is different, being then downloaded identical until verifying again.
Furthermore it is possible to described data block chain is provided with two, two described data block chains backup each other;Described
Hash block chain is provided with two, and two described hash block chains backup each other.Two mutually redundant described data block chains
The block chain algorithm being correspondingly arranged respectively is different with communication port.Two mutually redundant described hash block chains correspond to respectively and set
The block chain algorithm put is different with communication port.
When data block chain lost efficacy wherein, the data backup in the data block not lost efficacy chain is new to one
Block chain, and using this new block chain as new data block chain;Calculate each data block in described new data block chain
Corresponding hash value, then verifies whether described hash value is identical with the hash value in described hash block chain, if it is different, then weighing
Newly carry out backup until identical.Described new data block chain and the data block chain not lost efficacy backup each other.Block chain lost efficacy
Specifically refer to block chain nobody and safeguard it is impossible to write data to the inside again, or block chain corresponding block chain algorithm is by people
Destroy.
When a hash block chain lost efficacy wherein, the hash value in the hash not lost efficacy block chain is backed up to one newly
Block chain, and using this new block chain as new hash block chain;Verify the hash value in described new hash block chain
Whether identical with the hash value in the hash block chain not lost efficacy, if it is different, then re-starting backup until identical.Described new
Hash block chain and the hash block chain not lost efficacy backup each other.
Embodiment two, a kind of datacycle writing system based on block chain.With reference to Fig. 2, the present embodiment is provided
System is described in detail.
Referring to Fig. 2, the system that the present embodiment provides includes judging unit, data write unit, Hash writing unit, download
Authentication unit, data backup unit, calculating authentication unit, Hash backup units and authentication unit.
Judging unit, for, before writing new data block in data block chain, judging whether to meet default following
Ring writes trigger condition.
Data write unit is if for meeting described recurrent wrIting condition, new by write in data block chain
Data block covers original data block, new data block of otherwise writing direct, and original data block is not covered.
Hash writing unit, for when writing new data block in described data block chain, also by new data block
In the hash value write hash block chain generating.
Specifically, Hash writing unit, if for meeting described recurrent wrIting condition, writes new in hash block chain
The hash value that generates of data block and cover the hash value that original data block generates, the data block generation otherwise writing direct new
Hash value, not to original data block generate hash value cover.
Download authentication unit, for being downloaded to the data in described data block chain, and verify in the data of download
Each data block generate hash value whether identical with the hash value of corresponding data block in described hash block chain, if phase
Same, then verify that the data of download is not intercepted and distort, if it is different, being then downloaded identical until verifying again.
Data backup unit, when losing efficacy for wherein data block chain, by the data block not lost efficacy chain
Data backup to a new block chain, and using this new block chain as new data block chain.
Calculate authentication unit, for calculating each data block corresponding hash value in described new data block chain, then
Verify whether described hash value is identical with the hash value in described hash block chain, if it is different, then going to described data backup list
Unit is until checking is identical.
Hash backup units, when losing efficacy for wherein hash block chain, by the hash not lost efficacy block chain
Hash value backs up to a new block chain, and using this new block chain as new hash block chain.
Authentication unit, for verify the hash value in described new hash block chain whether with the hash block chain not lost efficacy
In hash value identical, if it is different, then go to hash backup units until checking identical.
A kind of datacycle wiring method based on block chain and system that the present invention provides, can write in block chain
Before new data, judge whether stored data in block chain database meets default trigger condition, and meeting
In the case of pre-conditioned, write new data to cover destruction legacy data, be effectively controlled in the volume making block chain
While can also destroy useless data.The data being stored in the present invention in block chain database will not be tampered, storage
Safety, and so that the volume of block chain database is effectively controlled, the data meeting default trigger condition will no longer be shown
In block catenary system, destroyed by new data cover, whether just privacy and confidentiality preferably moreover it is possible to verify the data downloaded
Really, in addition, and being provided with backup block chain it is ensured that when a block chain lost efficacy and can not write data, also backing up block chain
Carry out the write of data, safe ready, practicality is stronger.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.
Claims (13)
1. a kind of datacycle wiring method based on block chain is it is characterised in that methods described includes:
S101, before writing new data block in data block chain, judge whether to meet default recurrent wrIting triggering bar
Part;
If S102 meets described recurrent wrIting condition, the new data block of write is covered original in data block chain
Data block, new data block of otherwise writing direct, original data block is not covered.
2. as claimed in claim 1 a kind of datacycle wiring method based on block chain it is characterised in that in described S101
Described recurrent wrIting trigger condition specifically includes time triggered condition, the memory capacity trigger condition of data block chain or event
Trigger condition.
3. as claimed in claim 2 a kind of datacycle wiring method based on block chain it is characterised in that also including:
When writing new data block in described data block chain, also the hash value that new data block generates is write hash area
In block chain;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers former
The hash value that some data blocks generate, the hash value that the data block otherwise writing direct new generates, original data block is not given birth to
The hash value becoming is covered.
4. as claimed in claim 3 a kind of datacycle wiring method based on block chain it is characterised in that described S102 it
Also include afterwards:
Data in described data block chain is downloaded, and verifies the hash that each data block in the data of download generates
Whether value identical with the hash value of corresponding data block in described hash block chain, if identical, verify the data of download not by
Interception is distorted, if it is different, being then downloaded identical until verifying again.
5. as claimed in claim 4 a kind of datacycle wiring method based on block chain it is characterised in that also including:
Described data block chain is provided with two, and two described data block chains backup each other;
Described hash block chain is provided with two, and two described hash block chains backup each other.
6. as claimed in claim 5 a kind of datacycle wiring method based on block chain it is characterised in that also including:
The block chain algorithm that two mutually redundant described data block chains are correspondingly arranged respectively is different with communication port;
The block chain algorithm that two mutually redundant described hash block chains are correspondingly arranged respectively is different with communication port.
7. as claimed in claim 6 a kind of datacycle wiring method based on block chain it is characterised in that also including:
When a data block chain lost efficacy wherein, by the data backup in the data block not lost efficacy chain to a new block
Chain, and using this new block chain as new data block chain;
Calculate each data block corresponding hash value in described new data block chain, then verify described hash value whether with institute
The hash value stated in hash block chain is identical, if it is different, then re-starting backup until identical.
8. as claimed in claim 7 a kind of datacycle wiring method based on block chain it is characterised in that also including:
When a hash block chain lost efficacy wherein, the hash value in the hash not lost efficacy block chain is backed up to a new area
Block chain, and using this new block chain as new hash block chain;
Verify whether the hash value in described new hash block chain is identical with the hash value in the hash block chain not lost efficacy, if
Difference, then re-start backup until identical.
9. a kind of datacycle writing system based on block chain is it is characterised in that described system includes:
Judging unit, for before writing new data block in data block chain, judging whether that meeting default circulation writes
Enter trigger condition;
Data write unit, if for meeting described recurrent wrIting condition, by the new data of write in data block chain
Block covers original data block, new data block of otherwise writing direct, and original data block is not covered.
10. as claimed in claim 9 a kind of datacycle writing system based on block chain it is characterised in that also including:
Hash writing unit, for when writing new data block in described data block chain, also generating new data block
Hash value write hash block chain in;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers former
The hash value that some data blocks generate, the hash value that the data block otherwise writing direct new generates, original data block is not given birth to
The hash value becoming is covered.
11. as claimed in claim 10 a kind of datacycle writing system based on block chain it is characterised in that also including:
Download authentication unit, for being downloaded to the data in described data block chain, and verify each in the data of download
Whether the hash value that individual data block generates is identical with the hash value of corresponding data block in described hash block chain, if identical,
The data that checking is downloaded is not intercepted and distorts, if it is different, being then downloaded identical until verifying again.
12. as claimed in claim 11 a kind of datacycle writing system based on block chain it is characterised in that also including:
Data backup unit, when losing efficacy for wherein data block chain, by the data in the data block not lost efficacy chain
Back up to a new block chain, and using this new block chain as new data block chain;
Calculate authentication unit, for calculating each data block corresponding hash value in described new data block chain, then verify
Whether described hash value is identical with the hash value in described hash block chain, if it is different, it is straight then to go to described data backup unit
Identical to verifying.
13. as claimed in claim 12 a kind of datacycle writing system based on block chain it is characterised in that also including:
Hash backup units, when losing efficacy for wherein hash block chain, by the hash in the hash not lost efficacy block chain
Value backs up to a new block chain, and using this new block chain as new hash block chain;
Authentication unit, for verify the hash value in described new hash block chain whether with the hash block chain not lost efficacy in
Hash value is identical, if it is different, then going to hash backup units until checking is identical.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610741281.5A CN106446705A (en) | 2016-08-26 | 2016-08-26 | Cyclic writing method and system of data on the basis of block chain |
PCT/CN2017/098232 WO2018036440A1 (en) | 2016-08-26 | 2017-08-21 | Data cyclic writing method and system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610741281.5A CN106446705A (en) | 2016-08-26 | 2016-08-26 | Cyclic writing method and system of data on the basis of block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106446705A true CN106446705A (en) | 2017-02-22 |
Family
ID=58181711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610741281.5A Pending CN106446705A (en) | 2016-08-26 | 2016-08-26 | Cyclic writing method and system of data on the basis of block chain |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106446705A (en) |
WO (1) | WO2018036440A1 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124444A (en) * | 2017-03-28 | 2017-09-01 | 上海瑞麒维网络科技有限公司 | A kind of method and apparatus of block chain data syn-chronization |
CN107193490A (en) * | 2017-05-16 | 2017-09-22 | 北京中星仝创科技有限公司 | A kind of distributed data-storage system and method based on block chain |
WO2018036440A1 (en) * | 2016-08-26 | 2018-03-01 | 杨鹏 | Data cyclic writing method and system based on block chain |
CN107749848A (en) * | 2017-10-23 | 2018-03-02 | 中国联合网络通信集团有限公司 | Processing method, device and the Internet of things system of Internet of Things data |
CN108009445A (en) * | 2017-11-30 | 2018-05-08 | 成都蓝海贝信息技术有限公司 | A kind of trust data management system of half centralization |
CN108520410A (en) * | 2018-02-09 | 2018-09-11 | 北京欧链科技有限公司 | Feedback method for treating in block chain and device |
CN108519985A (en) * | 2018-02-09 | 2018-09-11 | 北京欧链科技有限公司 | Two-way block chain structure, data processing method and device |
CN109361952A (en) * | 2018-12-14 | 2019-02-19 | 司马大大(北京)智能系统有限公司 | Video management method, apparatus, system and electronic equipment |
CN109391643A (en) * | 2017-08-03 | 2019-02-26 | 中国移动通信有限公司研究院 | Block chain light-weight technologg method, block chain node and storage medium |
CN109447530A (en) * | 2018-12-25 | 2019-03-08 | 北京食安链科技有限公司 | A kind of foodsafety automatically analyzes and Warning System and method |
CN109492049A (en) * | 2018-09-21 | 2019-03-19 | 上海点融信息科技有限责任公司 | Data processing, block generation and synchronous method for block chain network |
CN111385511A (en) * | 2018-12-28 | 2020-07-07 | 杭州海康威视数字技术股份有限公司 | Video data processing method and device and video recording equipment |
CN111538785A (en) * | 2020-04-23 | 2020-08-14 | 北京海益同展信息科技有限公司 | Data writing method, device and system of block chain and electronic equipment |
CN111950843A (en) * | 2020-06-19 | 2020-11-17 | 湖南拓比科技有限公司 | Ecological environment development method and system based on block chain |
CN112486944A (en) * | 2019-09-12 | 2021-03-12 | 戴科冕 | Data verification method based on block chain |
US11074245B2 (en) | 2017-05-25 | 2021-07-27 | Advanced New Technologies Co., Ltd. | Method and device for writing service data in block chain system |
CN112486944B (en) * | 2019-09-12 | 2024-04-26 | 戴科冕 | Block chain-based data verification method |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112596682A (en) * | 2020-12-28 | 2021-04-02 | 郝东东 | Storage device and storage method for block chain |
CN113961149B (en) * | 2021-10-29 | 2024-01-26 | 国网江苏省电力有限公司营销服务中心 | Polymorphic data storage system and method for electric power information system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894161A (en) * | 2010-07-22 | 2010-11-24 | 北京天融信科技有限公司 | Recurring event access method and device for real-time monitoring |
CN102169420A (en) * | 2011-04-18 | 2011-08-31 | 杭州海康威视系统技术有限公司 | Method and device for circularly reading and writing in buffer zone |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN105871855A (en) * | 2016-04-11 | 2016-08-17 | 杨鹏 | Method and system for generating, storing and identifying identification code of electronic equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101794294A (en) * | 2010-01-08 | 2010-08-04 | 李钢 | Method for realizing circular file in media file |
US9547038B2 (en) * | 2015-01-09 | 2017-01-17 | Samsung Electronics Co., Ltd. | Low-overhead debug architecture using a speculative, concurrent and distributed data capture and propagation scheme |
CN106446705A (en) * | 2016-08-26 | 2017-02-22 | 杨鹏 | Cyclic writing method and system of data on the basis of block chain |
-
2016
- 2016-08-26 CN CN201610741281.5A patent/CN106446705A/en active Pending
-
2017
- 2017-08-21 WO PCT/CN2017/098232 patent/WO2018036440A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101894161A (en) * | 2010-07-22 | 2010-11-24 | 北京天融信科技有限公司 | Recurring event access method and device for real-time monitoring |
CN102169420A (en) * | 2011-04-18 | 2011-08-31 | 杭州海康威视系统技术有限公司 | Method and device for circularly reading and writing in buffer zone |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN105871855A (en) * | 2016-04-11 | 2016-08-17 | 杨鹏 | Method and system for generating, storing and identifying identification code of electronic equipment |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018036440A1 (en) * | 2016-08-26 | 2018-03-01 | 杨鹏 | Data cyclic writing method and system based on block chain |
CN107124444A (en) * | 2017-03-28 | 2017-09-01 | 上海瑞麒维网络科技有限公司 | A kind of method and apparatus of block chain data syn-chronization |
CN107193490A (en) * | 2017-05-16 | 2017-09-22 | 北京中星仝创科技有限公司 | A kind of distributed data-storage system and method based on block chain |
CN107193490B (en) * | 2017-05-16 | 2020-04-17 | 北京中星仝创科技有限公司 | Distributed data storage system and method based on block chain |
US11074245B2 (en) | 2017-05-25 | 2021-07-27 | Advanced New Technologies Co., Ltd. | Method and device for writing service data in block chain system |
CN109391643A (en) * | 2017-08-03 | 2019-02-26 | 中国移动通信有限公司研究院 | Block chain light-weight technologg method, block chain node and storage medium |
CN109391643B (en) * | 2017-08-03 | 2020-08-07 | 中国移动通信有限公司研究院 | Block chain lightweight processing method, block chain node and storage medium |
CN107749848B (en) * | 2017-10-23 | 2020-04-07 | 中国联合网络通信集团有限公司 | Internet of things data processing method and device and Internet of things system |
CN107749848A (en) * | 2017-10-23 | 2018-03-02 | 中国联合网络通信集团有限公司 | Processing method, device and the Internet of things system of Internet of Things data |
CN108009445A (en) * | 2017-11-30 | 2018-05-08 | 成都蓝海贝信息技术有限公司 | A kind of trust data management system of half centralization |
CN108009445B (en) * | 2017-11-30 | 2021-05-11 | 成都蓝海贝信息技术有限公司 | Semi-centralized trusted data management system |
CN108519985A (en) * | 2018-02-09 | 2018-09-11 | 北京欧链科技有限公司 | Two-way block chain structure, data processing method and device |
CN108519985B (en) * | 2018-02-09 | 2020-09-11 | 北京欧链科技有限公司 | Bidirectional block chain, data processing method and device |
CN108520410B (en) * | 2018-02-09 | 2020-09-11 | 北京欧链科技有限公司 | Feedback processing method and device in block chain |
CN108520410A (en) * | 2018-02-09 | 2018-09-11 | 北京欧链科技有限公司 | Feedback method for treating in block chain and device |
CN109492049A (en) * | 2018-09-21 | 2019-03-19 | 上海点融信息科技有限责任公司 | Data processing, block generation and synchronous method for block chain network |
CN109361952A (en) * | 2018-12-14 | 2019-02-19 | 司马大大(北京)智能系统有限公司 | Video management method, apparatus, system and electronic equipment |
CN109447530A (en) * | 2018-12-25 | 2019-03-08 | 北京食安链科技有限公司 | A kind of foodsafety automatically analyzes and Warning System and method |
CN109447530B (en) * | 2018-12-25 | 2020-11-13 | 北京食安链科技有限公司 | Automatic analysis and risk early warning system and method for food safety |
CN111385511A (en) * | 2018-12-28 | 2020-07-07 | 杭州海康威视数字技术股份有限公司 | Video data processing method and device and video recording equipment |
CN112486944A (en) * | 2019-09-12 | 2021-03-12 | 戴科冕 | Data verification method based on block chain |
CN112486944B (en) * | 2019-09-12 | 2024-04-26 | 戴科冕 | Block chain-based data verification method |
CN111538785A (en) * | 2020-04-23 | 2020-08-14 | 北京海益同展信息科技有限公司 | Data writing method, device and system of block chain and electronic equipment |
CN111950843A (en) * | 2020-06-19 | 2020-11-17 | 湖南拓比科技有限公司 | Ecological environment development method and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
WO2018036440A1 (en) | 2018-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106446705A (en) | Cyclic writing method and system of data on the basis of block chain | |
CN100464315C (en) | Mobile memory divulgence protection method and system | |
US6507911B1 (en) | System and method for securely deleting plaintext data | |
CN111723383B (en) | Data storage and verification method and device | |
CN103310169B (en) | A kind of method protecting SD card data and protection system | |
RU2351978C2 (en) | Method for provision of data records set integrity | |
CN110709843B (en) | Encryption lux software compromise detection | |
JP2005517225A5 (en) | ||
CN108881175A (en) | A kind of Juggling-proof electric medical record system based on block chain | |
CN112104627A (en) | Block chain-based data transmission method and device, electronic equipment and storage medium | |
CN102693399A (en) | System and method for on-line separation and recovery of electronic documents | |
CN106845261A (en) | A kind of method and device of destruction SSD hard disc datas | |
EP3376426B1 (en) | Information management terminal device | |
CN110914826B (en) | System and method for distributed data mapping | |
CN108256351B (en) | File processing method and device, storage medium and terminal | |
CN101655893B (en) | Manufacture method of intelligent blog lock, Blog access control method and system thereof | |
CN101382919A (en) | Storage data isolating method based on identity | |
CN104992123A (en) | Database transparency encryption method | |
JP4616562B2 (en) | Information management system | |
CN106936819B (en) | Cloud storage subsystem and safe storage system | |
CN105354462B (en) | A kind of guard method of mobile memory and mobile memory | |
CN210691364U (en) | Encrypted USB flash disk | |
CN110443070A (en) | More host shared memory systems and data completeness protection method | |
US20050086528A1 (en) | Method for hiding information on a computer | |
CN107506626A (en) | A kind of shared equipment divides account system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |