CN106446705A - Cyclic writing method and system of data on the basis of block chain - Google Patents

Cyclic writing method and system of data on the basis of block chain Download PDF

Info

Publication number
CN106446705A
CN106446705A CN201610741281.5A CN201610741281A CN106446705A CN 106446705 A CN106446705 A CN 106446705A CN 201610741281 A CN201610741281 A CN 201610741281A CN 106446705 A CN106446705 A CN 106446705A
Authority
CN
China
Prior art keywords
block chain
data
hash
data block
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610741281.5A
Other languages
Chinese (zh)
Inventor
杨鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610741281.5A priority Critical patent/CN106446705A/en
Publication of CN106446705A publication Critical patent/CN106446705A/en
Priority to PCT/CN2017/098232 priority patent/WO2018036440A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools

Abstract

The invention discloses a cyclic writing method and system of data on the basis of a block chain. Before new data is written into the block chain, whether data stored in a block chain database meets a preset trigger condition or not is judged, the new data is written to cover and destroy original data under a situation that a preset condition is met, and usefulness data can be destroyed while the volume of the block chain is effectively controlled. The data is stored into the block chain database to guarantee that data is not tampered and can be safely stored, in addition, a cyclic writing way is adopted to effectively control the volume of the block chain database, the data which meets the preset trigger condition is not displayed in a block chain system and is covered and destroyed by the new data, privacy and privacy are good, the storage of a hash value corresponding to a data block also can guarantee to verify whether the downloaded data is correct or not, and the cyclic writing method and system is safe, convenient and high in practicality.

Description

A kind of datacycle wiring method based on block chain and system
Technical field
The present invention relates to field of computer technology is and in particular to a kind of datacycle wiring method based on block chain and be System.
Background technology
Existing block catenary system is chain type block chain, and all data of write are all permanently kept in database, often One people having network access authority, unconditional can access, downloads these permanent data.This permanent There are following two problems in chain type block catenary system:1st, As time goes on the data of required storage gets more and more, block counts According to storehouse can increasing it has not been convenient to preserve, but not all data is required to persistence, some data only need to Retain in the corresponding time limit, the data exceeding the time limit can be deleted;2nd, the privacy of some classified papers of storage or individual Information also has certain conserving time limit to require, and after reaching a specified time, needs to be destroyed according to actual conditions;3rd, existing area Block catenary system is transparent open system, and its data is supplied to everyone open access, and its privacy and control authority do not obtain Control to effective.
In addition, when the block chain database of data storage cannot write data again, there is no the block chain database backing up Data can be led to cannot to write in time.
Content of the invention
The technical problem to be solved is to provide a kind of datacycle wiring method based on block chain and system, The volume that block chain database can be made is effectively controlled, and the data meeting default trigger condition will no longer be shown in block In catenary system, destroyed by new data cover, privacy and confidentiality are preferable, simultaneously as employing a plurality of mutually redundant area Block chain data storage, it is ensured that will not lose efficacy because of certain block chain, leads to the data of required storage cannot store in time Situation occurs, and data preserves continuity and security is preferable.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:
According to one aspect of the present invention, there is provided a kind of datacycle wiring method based on block chain, methods described Including:
S101, before writing new data block in data block chain, judge whether to meet default recurrent wrIting and touch Clockwork spring part;
If S102 meets described recurrent wrIting condition, the new data block of write is covered former in data block chain Some data blocks, new data block of otherwise writing direct, original data block is not covered.
Beneficial effects of the present invention:A kind of datacycle wiring method based on block chain that the present invention provides, Neng Gou Before writing new data in block chain, judge whether stored data in block chain database meets default triggering bar Part, and meet pre-conditioned in the case of, write new data to cover destruction legacy data, obtain in the volume making block chain To useless data can also be destroyed while effective control.The present invention is by data storage to block chain database it is ensured that counting According to being tampered, store safety, and be effectively controlled using the volume that the method for recurrent wrIting makes block chain database, The data meeting default trigger condition will no longer be shown in block catenary system, is destroyed by new data cover, privacy and Confidentiality is preferable, safe ready, and practicality is stronger.
Further, described in described S101, recurrent wrIting trigger condition specifically includes time triggered condition, main data area The memory capacity trigger condition of block chain or trigger conditions.
Beneficial effect using above-mentioned further scheme:According to actual conditions, trigger condition is set, various to be applied to Actual conditions.
Further, also include:When writing new data block in described data block chain, also new data block is given birth to In the hash value write hash block chain becoming;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers Cover the hash value that original data block generates, the hash value that the data block otherwise writing direct new generates, not to original data The hash value that block generates is covered.
Beneficial effect using above-mentioned further scheme:Each data block can generate a hash value, and is stored, It is easy in download or backup, whether the data of checking download or backup is intercepted to be distorted the authenticity it is ensured that data, because Relatively more for data, checking is cumbersome, and only checking hash value is more convenient.
Further, also include after described S102:
Data in described data block chain is downloaded, and verifies each data block generation in the data of download Whether hash value is identical with the hash value of corresponding data block in described hash block chain, if identical, verifies the data of download It is not intercepted and distorts, if it is different, being then downloaded identical until verifying again.
Beneficial effect using above-mentioned further scheme:Ensure that the authenticity of the data downloading, it is to avoid by mistake Data mislead.
Further, also include:
Described data block chain is provided with two, and two described data block chains backup each other;
Described hash block chain is provided with two, and two described hash block chains backup each other.
Beneficial effect using above-mentioned further scheme:Data is carried out with backup ensure, when some block chain lost efficacy, Guarantee can write data in another block chain.
Further, also include:
The block chain algorithm that two mutually redundant described data block chains are correspondingly arranged respectively is different with communication port;
The block chain algorithm that two mutually redundant described hash block chains are correspondingly arranged respectively is different with communication port.
Beneficial effect using above-mentioned further scheme:Ensure logical in the block chain algorithm of some block chain or communication When road goes wrong, another block chain using different blocks chain algorithm or communication port being capable of normal work.
Further, also include:
When data block chain lost efficacy wherein, the data backup in the data block not lost efficacy chain is new to one Block chain, and using this new block chain as new data block chain;
Calculate each data block corresponding hash value in described new data block chain, whether then verify described hash value Identical with the hash value in described hash block chain, if it is different, then re-starting backup until identical.
Beneficial effect using above-mentioned further scheme:When there being a data block chain to go wrong, backup one is new Block chain become new data block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid It is intercepted in backup procedure and distort.
Further, also include:
When a hash block chain lost efficacy wherein, the hash value in the hash not lost efficacy block chain is backed up to one newly Block chain, and using this new block chain as new hash block chain;
Verify hash value in described new hash block chain whether with the hash block chain not lost efficacy in hash value phase With if it is different, then re-starting backup until identical.
Beneficial effect using above-mentioned further scheme:When there being a hash block chain to go wrong, backup one is new Block chain become new hash block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid It is intercepted in backup procedure and distort.
According to another aspect of the present invention, provide a kind of datacycle writing system based on block chain, including:
Judging unit, for, before writing new data block in data block chain, judging whether to meet default following Ring writes trigger condition;
Data write unit is if for meeting described recurrent wrIting condition, new by write in data block chain Data block covers original data block, new data block of otherwise writing direct, and original data block is not covered.
Beneficial effect of the present invention:A kind of datacycle writing system based on block chain that the present invention provides, can be in area Before writing new data in block chain, judge whether stored data in block chain database meets default triggering bar Part, and meet pre-conditioned in the case of, write new data to cover destruction legacy data, obtain in the volume making block chain To useless data can also be destroyed while effective control.The present invention is by data storage to block chain database it is ensured that counting According to being tampered, store safety, and be effectively controlled using the volume that the method for recurrent wrIting makes block chain database, The data meeting default trigger condition will no longer be shown in block catenary system, is destroyed by new data cover, privacy and Confidentiality is preferable, safe ready, and practicality is stronger.
Further, also include:Hash writing unit, for writing new data block in described data block chain When, in the hash value write hash block chain also new data block being generated;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers Cover the hash value that original data block generates, the hash value that the data block otherwise writing direct new generates, not to original data The hash value that block generates is covered.
Beneficial effect using above-mentioned further scheme:Each data block can generate a hash value, and is stored, It is easy in download or backup, whether the data of checking download or backup is intercepted to be distorted the authenticity it is ensured that data, because Relatively more for data, checking is cumbersome, and only checking hash value is more convenient.
Further, also include:
Download authentication unit, for being downloaded to the data in described data block chain, and verify in the data of download Each data block generate hash value whether identical with the hash value of corresponding data block in described hash block chain, if phase Same, then verify that the data of download is not intercepted and distort, if it is different, being then downloaded identical until verifying again.
Beneficial effect using above-mentioned further scheme:Ensure that the authenticity of the data downloading, it is to avoid by mistake Data mislead.
Further, also include:
Data backup unit, when losing efficacy for wherein data block chain, by the data block not lost efficacy chain Data backup to a new block chain, and using this new block chain as new data block chain;
Calculate authentication unit, for calculating each data block corresponding hash value in described new data block chain, then Verify whether described hash value is identical with the hash value in described hash block chain, if it is different, then going to described data backup list Unit is until checking is identical.
Beneficial effect using above-mentioned further scheme:When there being a data block chain to go wrong, backup one is new Block chain become new data block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid It is intercepted in backup procedure and distort.
Further, also include:
Hash backup units, when losing efficacy for wherein hash block chain, by the hash not lost efficacy block chain Hash value backs up to a new block chain, and using this new block chain as new hash block chain;
Authentication unit, for verify the hash value in described new hash block chain whether with the hash block chain not lost efficacy In hash value identical, if it is different, then go to hash backup units until checking identical.
Beneficial effect using above-mentioned further scheme:When there being a hash block chain to go wrong, backup one is new Block chain become new hash block chain, and after a backup adopt hash value verify Backup Data whether correct, it is to avoid It is intercepted in backup procedure and distort.
Brief description
Fig. 1 is a kind of datacycle wiring method flow chart based on block chain of the embodiment of the present invention one;
Fig. 2 is a kind of datacycle writing system schematic diagram based on block chain of the embodiment of the present invention two.
Specific embodiment
Below in conjunction with accompanying drawing, the principle of the present invention and feature are described, example is served only for explaining the present invention, and Non- for limiting the scope of the present invention.
Embodiment one, a kind of datacycle wiring method based on block chain.With reference to Fig. 1, the present embodiment is provided Method is described in detail.
Referring to Fig. 1, S101, before writing new data block in data block chain, judge whether to meet default following Ring writes trigger condition.
Specifically, before writing new data in block chain data, judge that in block chain database, original data is No meet default trigger condition, wherein said trigger condition specifically includes time triggered condition, depositing in block chain database Storage capacity trigger condition or concrete trigger conditions.
If S102 meets described recurrent wrIting condition, the new data block of write is covered former in data block chain Some data blocks, new data block of otherwise writing direct, original data block is not covered.
Specifically, if original data meets default trigger condition in block chain database, such as meet time triggered Condition or capacity trigger condition or concrete trigger conditions, then when writing new data, using the side of recurrent wrIting Method overrides the data having been written into, and destroys original data with new data cover, when covering the original data of destruction, It is usually data remote of first cover time;If being unsatisfactory for default trigger condition, directly write in block chain database Enter new data, original data will not be covered.
For example, existing law-enforcing recorder or other adopt the audio/video information that card equipment gathered and be generally not stored in In block chain, so there is the later stage possibility distorted maliciously is edited by people, and it is stored in content in block chain database then There is not the possibility being tampered.Before writing new data in the block chain database in described law-enforcing recorder, first In law-enforcing recorder to be judged, whether the record time of the data of block chain storage exceedes the Preset Time time limit, or law enforcement record Whether the data capacity of the storage in instrument exceedes default memory capacity.If the described record time exceedes the described Preset Time time limit, Or described data capacity exceedes described default memory capacity, then, when writing new data, can cover sequentially in time Stored data, time data remote can first be capped;If the described record time is not above the described Preset Time time limit, And described data capacity is not above described default memory capacity, then new data of writing direct, original number need not be covered According to.Specifically, for example using memory capacity as Rule of judgment, if the memory capacity of law-enforcing recorder is 16G it is assumed that every section of sound Video is 10M, can continuously enroll 1600 sections of little screens, after 16G storage has been expired, just starts to cover from the earliest time.
For example, for credit information service, before writing new data in the block chain database to credit information service, judge area In block chain database, whether the credit record of the user of record record of bad behavior, and record of bad behavior specifically refers to user to be occurred being in arrears with Refund, be late for delivery, back out of the contract, repudiation of the contract, fail to carry out the situation of contract.
Specifically, if record of bad behavior does not occur, cover the new credit of write user in default circulation time interior circulation Record, specifically, block chain database only records nearest setting time, the personal credit record of such as nearest 3 years, and marks Know for excellent, block chain database constantly circulates the personal credit record covering 3 years.
If record of bad behavior occurs, bad credit record is persistently retained, specifically, when user starts to give back debt, Block chain database by the lasting reservation 5 years of this section of bad credit record, after 5 years after start the cycle over covering, write user Bad credit record is override by new credit record.Reference can also set triggering and the cycling condition of oneself as desired.
For example, for some confidential datas, only need to be shown within the specific time according to related request, arrival sets It is necessary to destroy after the fixed time, but the interior security reliability wanting guarantee information during detention.Using block chain data Library storage confidential data, ensure that confidential data is not tampered with.
Specifically, if the confidential data of storage does not reach described time restriction in block chain database, proceed to protect Stay, if reaching described time restriction, new other information of writing direct will carry out to described confidential data covering destroys.
In addition, the confidential data being stored in block chain database is then stored into block chain database after can encrypting In, it is provided only to related personnel and check.
General materials can also be saved in block chain data, and equally conserving time limit is set, during for exceeding preservation The general materials of limit, can be circulated covering according to predetermined trigger condition.
Furthermore it is possible to the content recurrent wrIting as requested in block chain database, such as periodic cyclic write.For example The authority of some high-grade security systems is it should periodic cleaning and re-write authorization message.Using circulating overlayable Block chain database, can solve the problems, such as credible and safe.
The scheme that the present embodiment provides also includes, when writing new data block in described data block chain, also will be new Data block generate hash value write hash block chain in.Specifically, if meeting described recurrent wrIting condition, in hash area Write the new data block hash value generating the hash value covering original data block generation in block chain, otherwise write direct new Data block generate hash value, not to original data block generation hash value cover.Specifically, using pre-defined algorithm Data block is carried out be calculated this data block corresponding hash value.
When being downloaded to the data in described data block chain, in order to ensure the authenticity of the data downloading, Can verify what each data block in the data downloaded generated after the data in described data block chain is downloaded Whether hash value is identical with the hash value of corresponding data block in described hash block chain, if identical, verifies the data of download It is not intercepted and distorts, if it is different, being then downloaded identical until verifying again.
Furthermore it is possible to described data block chain is provided with two, two described data block chains backup each other;Described Hash block chain is provided with two, and two described hash block chains backup each other.Two mutually redundant described data block chains The block chain algorithm being correspondingly arranged respectively is different with communication port.Two mutually redundant described hash block chains correspond to respectively and set The block chain algorithm put is different with communication port.
When data block chain lost efficacy wherein, the data backup in the data block not lost efficacy chain is new to one Block chain, and using this new block chain as new data block chain;Calculate each data block in described new data block chain Corresponding hash value, then verifies whether described hash value is identical with the hash value in described hash block chain, if it is different, then weighing Newly carry out backup until identical.Described new data block chain and the data block chain not lost efficacy backup each other.Block chain lost efficacy Specifically refer to block chain nobody and safeguard it is impossible to write data to the inside again, or block chain corresponding block chain algorithm is by people Destroy.
When a hash block chain lost efficacy wherein, the hash value in the hash not lost efficacy block chain is backed up to one newly Block chain, and using this new block chain as new hash block chain;Verify the hash value in described new hash block chain Whether identical with the hash value in the hash block chain not lost efficacy, if it is different, then re-starting backup until identical.Described new Hash block chain and the hash block chain not lost efficacy backup each other.
Embodiment two, a kind of datacycle writing system based on block chain.With reference to Fig. 2, the present embodiment is provided System is described in detail.
Referring to Fig. 2, the system that the present embodiment provides includes judging unit, data write unit, Hash writing unit, download Authentication unit, data backup unit, calculating authentication unit, Hash backup units and authentication unit.
Judging unit, for, before writing new data block in data block chain, judging whether to meet default following Ring writes trigger condition.
Data write unit is if for meeting described recurrent wrIting condition, new by write in data block chain Data block covers original data block, new data block of otherwise writing direct, and original data block is not covered.
Hash writing unit, for when writing new data block in described data block chain, also by new data block In the hash value write hash block chain generating.
Specifically, Hash writing unit, if for meeting described recurrent wrIting condition, writes new in hash block chain The hash value that generates of data block and cover the hash value that original data block generates, the data block generation otherwise writing direct new Hash value, not to original data block generate hash value cover.
Download authentication unit, for being downloaded to the data in described data block chain, and verify in the data of download Each data block generate hash value whether identical with the hash value of corresponding data block in described hash block chain, if phase Same, then verify that the data of download is not intercepted and distort, if it is different, being then downloaded identical until verifying again.
Data backup unit, when losing efficacy for wherein data block chain, by the data block not lost efficacy chain Data backup to a new block chain, and using this new block chain as new data block chain.
Calculate authentication unit, for calculating each data block corresponding hash value in described new data block chain, then Verify whether described hash value is identical with the hash value in described hash block chain, if it is different, then going to described data backup list Unit is until checking is identical.
Hash backup units, when losing efficacy for wherein hash block chain, by the hash not lost efficacy block chain Hash value backs up to a new block chain, and using this new block chain as new hash block chain.
Authentication unit, for verify the hash value in described new hash block chain whether with the hash block chain not lost efficacy In hash value identical, if it is different, then go to hash backup units until checking identical.
A kind of datacycle wiring method based on block chain and system that the present invention provides, can write in block chain Before new data, judge whether stored data in block chain database meets default trigger condition, and meeting In the case of pre-conditioned, write new data to cover destruction legacy data, be effectively controlled in the volume making block chain While can also destroy useless data.The data being stored in the present invention in block chain database will not be tampered, storage Safety, and so that the volume of block chain database is effectively controlled, the data meeting default trigger condition will no longer be shown In block catenary system, destroyed by new data cover, whether just privacy and confidentiality preferably moreover it is possible to verify the data downloaded Really, in addition, and being provided with backup block chain it is ensured that when a block chain lost efficacy and can not write data, also backing up block chain Carry out the write of data, safe ready, practicality is stronger.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.

Claims (13)

1. a kind of datacycle wiring method based on block chain is it is characterised in that methods described includes:
S101, before writing new data block in data block chain, judge whether to meet default recurrent wrIting triggering bar Part;
If S102 meets described recurrent wrIting condition, the new data block of write is covered original in data block chain Data block, new data block of otherwise writing direct, original data block is not covered.
2. as claimed in claim 1 a kind of datacycle wiring method based on block chain it is characterised in that in described S101 Described recurrent wrIting trigger condition specifically includes time triggered condition, the memory capacity trigger condition of data block chain or event Trigger condition.
3. as claimed in claim 2 a kind of datacycle wiring method based on block chain it is characterised in that also including:
When writing new data block in described data block chain, also the hash value that new data block generates is write hash area In block chain;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers former The hash value that some data blocks generate, the hash value that the data block otherwise writing direct new generates, original data block is not given birth to The hash value becoming is covered.
4. as claimed in claim 3 a kind of datacycle wiring method based on block chain it is characterised in that described S102 it Also include afterwards:
Data in described data block chain is downloaded, and verifies the hash that each data block in the data of download generates Whether value identical with the hash value of corresponding data block in described hash block chain, if identical, verify the data of download not by Interception is distorted, if it is different, being then downloaded identical until verifying again.
5. as claimed in claim 4 a kind of datacycle wiring method based on block chain it is characterised in that also including:
Described data block chain is provided with two, and two described data block chains backup each other;
Described hash block chain is provided with two, and two described hash block chains backup each other.
6. as claimed in claim 5 a kind of datacycle wiring method based on block chain it is characterised in that also including:
The block chain algorithm that two mutually redundant described data block chains are correspondingly arranged respectively is different with communication port;
The block chain algorithm that two mutually redundant described hash block chains are correspondingly arranged respectively is different with communication port.
7. as claimed in claim 6 a kind of datacycle wiring method based on block chain it is characterised in that also including:
When a data block chain lost efficacy wherein, by the data backup in the data block not lost efficacy chain to a new block Chain, and using this new block chain as new data block chain;
Calculate each data block corresponding hash value in described new data block chain, then verify described hash value whether with institute The hash value stated in hash block chain is identical, if it is different, then re-starting backup until identical.
8. as claimed in claim 7 a kind of datacycle wiring method based on block chain it is characterised in that also including:
When a hash block chain lost efficacy wherein, the hash value in the hash not lost efficacy block chain is backed up to a new area Block chain, and using this new block chain as new hash block chain;
Verify whether the hash value in described new hash block chain is identical with the hash value in the hash block chain not lost efficacy, if Difference, then re-start backup until identical.
9. a kind of datacycle writing system based on block chain is it is characterised in that described system includes:
Judging unit, for before writing new data block in data block chain, judging whether that meeting default circulation writes Enter trigger condition;
Data write unit, if for meeting described recurrent wrIting condition, by the new data of write in data block chain Block covers original data block, new data block of otherwise writing direct, and original data block is not covered.
10. as claimed in claim 9 a kind of datacycle writing system based on block chain it is characterised in that also including:
Hash writing unit, for when writing new data block in described data block chain, also generating new data block Hash value write hash block chain in;
If meeting described recurrent wrIting condition, hash block chain writing the new hash value of data block generation and covers former The hash value that some data blocks generate, the hash value that the data block otherwise writing direct new generates, original data block is not given birth to The hash value becoming is covered.
11. as claimed in claim 10 a kind of datacycle writing system based on block chain it is characterised in that also including:
Download authentication unit, for being downloaded to the data in described data block chain, and verify each in the data of download Whether the hash value that individual data block generates is identical with the hash value of corresponding data block in described hash block chain, if identical, The data that checking is downloaded is not intercepted and distorts, if it is different, being then downloaded identical until verifying again.
12. as claimed in claim 11 a kind of datacycle writing system based on block chain it is characterised in that also including:
Data backup unit, when losing efficacy for wherein data block chain, by the data in the data block not lost efficacy chain Back up to a new block chain, and using this new block chain as new data block chain;
Calculate authentication unit, for calculating each data block corresponding hash value in described new data block chain, then verify Whether described hash value is identical with the hash value in described hash block chain, if it is different, it is straight then to go to described data backup unit Identical to verifying.
13. as claimed in claim 12 a kind of datacycle writing system based on block chain it is characterised in that also including:
Hash backup units, when losing efficacy for wherein hash block chain, by the hash in the hash not lost efficacy block chain Value backs up to a new block chain, and using this new block chain as new hash block chain;
Authentication unit, for verify the hash value in described new hash block chain whether with the hash block chain not lost efficacy in Hash value is identical, if it is different, then going to hash backup units until checking is identical.
CN201610741281.5A 2016-08-26 2016-08-26 Cyclic writing method and system of data on the basis of block chain Pending CN106446705A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610741281.5A CN106446705A (en) 2016-08-26 2016-08-26 Cyclic writing method and system of data on the basis of block chain
PCT/CN2017/098232 WO2018036440A1 (en) 2016-08-26 2017-08-21 Data cyclic writing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610741281.5A CN106446705A (en) 2016-08-26 2016-08-26 Cyclic writing method and system of data on the basis of block chain

Publications (1)

Publication Number Publication Date
CN106446705A true CN106446705A (en) 2017-02-22

Family

ID=58181711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610741281.5A Pending CN106446705A (en) 2016-08-26 2016-08-26 Cyclic writing method and system of data on the basis of block chain

Country Status (2)

Country Link
CN (1) CN106446705A (en)
WO (1) WO2018036440A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124444A (en) * 2017-03-28 2017-09-01 上海瑞麒维网络科技有限公司 A kind of method and apparatus of block chain data syn-chronization
CN107193490A (en) * 2017-05-16 2017-09-22 北京中星仝创科技有限公司 A kind of distributed data-storage system and method based on block chain
WO2018036440A1 (en) * 2016-08-26 2018-03-01 杨鹏 Data cyclic writing method and system based on block chain
CN107749848A (en) * 2017-10-23 2018-03-02 中国联合网络通信集团有限公司 Processing method, device and the Internet of things system of Internet of Things data
CN108009445A (en) * 2017-11-30 2018-05-08 成都蓝海贝信息技术有限公司 A kind of trust data management system of half centralization
CN108520410A (en) * 2018-02-09 2018-09-11 北京欧链科技有限公司 Feedback method for treating in block chain and device
CN108519985A (en) * 2018-02-09 2018-09-11 北京欧链科技有限公司 Two-way block chain structure, data processing method and device
CN109361952A (en) * 2018-12-14 2019-02-19 司马大大(北京)智能系统有限公司 Video management method, apparatus, system and electronic equipment
CN109391643A (en) * 2017-08-03 2019-02-26 中国移动通信有限公司研究院 Block chain light-weight technologg method, block chain node and storage medium
CN109447530A (en) * 2018-12-25 2019-03-08 北京食安链科技有限公司 A kind of foodsafety automatically analyzes and Warning System and method
CN109492049A (en) * 2018-09-21 2019-03-19 上海点融信息科技有限责任公司 Data processing, block generation and synchronous method for block chain network
CN111385511A (en) * 2018-12-28 2020-07-07 杭州海康威视数字技术股份有限公司 Video data processing method and device and video recording equipment
CN111538785A (en) * 2020-04-23 2020-08-14 北京海益同展信息科技有限公司 Data writing method, device and system of block chain and electronic equipment
CN111950843A (en) * 2020-06-19 2020-11-17 湖南拓比科技有限公司 Ecological environment development method and system based on block chain
CN112486944A (en) * 2019-09-12 2021-03-12 戴科冕 Data verification method based on block chain
US11074245B2 (en) 2017-05-25 2021-07-27 Advanced New Technologies Co., Ltd. Method and device for writing service data in block chain system
CN112486944B (en) * 2019-09-12 2024-04-26 戴科冕 Block chain-based data verification method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112596682A (en) * 2020-12-28 2021-04-02 郝东东 Storage device and storage method for block chain
CN113961149B (en) * 2021-10-29 2024-01-26 国网江苏省电力有限公司营销服务中心 Polymorphic data storage system and method for electric power information system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894161A (en) * 2010-07-22 2010-11-24 北京天融信科技有限公司 Recurring event access method and device for real-time monitoring
CN102169420A (en) * 2011-04-18 2011-08-31 杭州海康威视系统技术有限公司 Method and device for circularly reading and writing in buffer zone
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN105871855A (en) * 2016-04-11 2016-08-17 杨鹏 Method and system for generating, storing and identifying identification code of electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101794294A (en) * 2010-01-08 2010-08-04 李钢 Method for realizing circular file in media file
US9547038B2 (en) * 2015-01-09 2017-01-17 Samsung Electronics Co., Ltd. Low-overhead debug architecture using a speculative, concurrent and distributed data capture and propagation scheme
CN106446705A (en) * 2016-08-26 2017-02-22 杨鹏 Cyclic writing method and system of data on the basis of block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894161A (en) * 2010-07-22 2010-11-24 北京天融信科技有限公司 Recurring event access method and device for real-time monitoring
CN102169420A (en) * 2011-04-18 2011-08-31 杭州海康威视系统技术有限公司 Method and device for circularly reading and writing in buffer zone
CN105761143A (en) * 2016-02-01 2016-07-13 上海凭安网络科技有限公司 Multi-party co-construction credit record method based on block chains
CN105871855A (en) * 2016-04-11 2016-08-17 杨鹏 Method and system for generating, storing and identifying identification code of electronic equipment

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018036440A1 (en) * 2016-08-26 2018-03-01 杨鹏 Data cyclic writing method and system based on block chain
CN107124444A (en) * 2017-03-28 2017-09-01 上海瑞麒维网络科技有限公司 A kind of method and apparatus of block chain data syn-chronization
CN107193490A (en) * 2017-05-16 2017-09-22 北京中星仝创科技有限公司 A kind of distributed data-storage system and method based on block chain
CN107193490B (en) * 2017-05-16 2020-04-17 北京中星仝创科技有限公司 Distributed data storage system and method based on block chain
US11074245B2 (en) 2017-05-25 2021-07-27 Advanced New Technologies Co., Ltd. Method and device for writing service data in block chain system
CN109391643A (en) * 2017-08-03 2019-02-26 中国移动通信有限公司研究院 Block chain light-weight technologg method, block chain node and storage medium
CN109391643B (en) * 2017-08-03 2020-08-07 中国移动通信有限公司研究院 Block chain lightweight processing method, block chain node and storage medium
CN107749848B (en) * 2017-10-23 2020-04-07 中国联合网络通信集团有限公司 Internet of things data processing method and device and Internet of things system
CN107749848A (en) * 2017-10-23 2018-03-02 中国联合网络通信集团有限公司 Processing method, device and the Internet of things system of Internet of Things data
CN108009445A (en) * 2017-11-30 2018-05-08 成都蓝海贝信息技术有限公司 A kind of trust data management system of half centralization
CN108009445B (en) * 2017-11-30 2021-05-11 成都蓝海贝信息技术有限公司 Semi-centralized trusted data management system
CN108519985A (en) * 2018-02-09 2018-09-11 北京欧链科技有限公司 Two-way block chain structure, data processing method and device
CN108519985B (en) * 2018-02-09 2020-09-11 北京欧链科技有限公司 Bidirectional block chain, data processing method and device
CN108520410B (en) * 2018-02-09 2020-09-11 北京欧链科技有限公司 Feedback processing method and device in block chain
CN108520410A (en) * 2018-02-09 2018-09-11 北京欧链科技有限公司 Feedback method for treating in block chain and device
CN109492049A (en) * 2018-09-21 2019-03-19 上海点融信息科技有限责任公司 Data processing, block generation and synchronous method for block chain network
CN109361952A (en) * 2018-12-14 2019-02-19 司马大大(北京)智能系统有限公司 Video management method, apparatus, system and electronic equipment
CN109447530A (en) * 2018-12-25 2019-03-08 北京食安链科技有限公司 A kind of foodsafety automatically analyzes and Warning System and method
CN109447530B (en) * 2018-12-25 2020-11-13 北京食安链科技有限公司 Automatic analysis and risk early warning system and method for food safety
CN111385511A (en) * 2018-12-28 2020-07-07 杭州海康威视数字技术股份有限公司 Video data processing method and device and video recording equipment
CN112486944A (en) * 2019-09-12 2021-03-12 戴科冕 Data verification method based on block chain
CN112486944B (en) * 2019-09-12 2024-04-26 戴科冕 Block chain-based data verification method
CN111538785A (en) * 2020-04-23 2020-08-14 北京海益同展信息科技有限公司 Data writing method, device and system of block chain and electronic equipment
CN111950843A (en) * 2020-06-19 2020-11-17 湖南拓比科技有限公司 Ecological environment development method and system based on block chain

Also Published As

Publication number Publication date
WO2018036440A1 (en) 2018-03-01

Similar Documents

Publication Publication Date Title
CN106446705A (en) Cyclic writing method and system of data on the basis of block chain
CN100464315C (en) Mobile memory divulgence protection method and system
US6507911B1 (en) System and method for securely deleting plaintext data
CN111723383B (en) Data storage and verification method and device
CN103310169B (en) A kind of method protecting SD card data and protection system
RU2351978C2 (en) Method for provision of data records set integrity
CN110709843B (en) Encryption lux software compromise detection
JP2005517225A5 (en)
CN108881175A (en) A kind of Juggling-proof electric medical record system based on block chain
CN112104627A (en) Block chain-based data transmission method and device, electronic equipment and storage medium
CN102693399A (en) System and method for on-line separation and recovery of electronic documents
CN106845261A (en) A kind of method and device of destruction SSD hard disc datas
EP3376426B1 (en) Information management terminal device
CN110914826B (en) System and method for distributed data mapping
CN108256351B (en) File processing method and device, storage medium and terminal
CN101655893B (en) Manufacture method of intelligent blog lock, Blog access control method and system thereof
CN101382919A (en) Storage data isolating method based on identity
CN104992123A (en) Database transparency encryption method
JP4616562B2 (en) Information management system
CN106936819B (en) Cloud storage subsystem and safe storage system
CN105354462B (en) A kind of guard method of mobile memory and mobile memory
CN210691364U (en) Encrypted USB flash disk
CN110443070A (en) More host shared memory systems and data completeness protection method
US20050086528A1 (en) Method for hiding information on a computer
CN107506626A (en) A kind of shared equipment divides account system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222