CN107948130B - File processing method, server and system - Google Patents

File processing method, server and system Download PDF

Info

Publication number
CN107948130B
CN107948130B CN201710966998.4A CN201710966998A CN107948130B CN 107948130 B CN107948130 B CN 107948130B CN 201710966998 A CN201710966998 A CN 201710966998A CN 107948130 B CN107948130 B CN 107948130B
Authority
CN
China
Prior art keywords
data
stored
verified
file
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710966998.4A
Other languages
Chinese (zh)
Other versions
CN107948130A (en
Inventor
刘胜
殷舒
徐加明
廖校均
赵树伟
祝晓潭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Union Mobile Pay Co Ltd
Original Assignee
Union Mobile Pay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Union Mobile Pay Co Ltd filed Critical Union Mobile Pay Co Ltd
Priority to CN201710966998.4A priority Critical patent/CN107948130B/en
Publication of CN107948130A publication Critical patent/CN107948130A/en
Application granted granted Critical
Publication of CN107948130B publication Critical patent/CN107948130B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a file processing method, a server and a system, wherein the method comprises the following steps: the supervision server receives the verification request, determines data identifications of M data to be verified, and confirms the reliability of the file to be verified according to the reliability of the data to be verified; the supervision server determines the credibility of the data to be verified by the following modes: determining n target data storage servers, which are determined according to a preset rule; the preset rule comprises that any data storage server can not be simultaneously used as a target data storage server of M data to be stored, a verification instruction is sent to the target data storage server, the consistency of n response messages is received and verified, and the credibility of the data to be verified is determined. Any data storage server can not obtain a complete file, the safety of the file is guaranteed, the n target data storage servers jointly store the file, the reliability is improved, and the credibility and the reliability are improved through verification of the comparison of the storage results.

Description

File processing method, server and system
Technical Field
The invention relates to the field of data storage, in particular to a file processing method, a server and a system.
Background
Due to the explosive development of internet finance, problems are obvious, and the running frequency of a network credit institution appears. All electronic contracts and transaction records may be deleted before a particular network lending institution runs. At this time, the user wants to maintain the right and reduce the loss through lawsuits, but the user does not have any legal evidence document at hand. Thus, the relevant regulatory authorities wish to uniformly manage and maintain all "electronic contracts" at third-party authorities.
Fig. 1 is a schematic diagram of a conventional data storage system, in which an internet financial institution (mutual-fund institution) is a data provider, a supervisory institution is a data storage party, and an investor is a data downloader, and in fig. 1, the mutual-fund institution 2, the mutual-fund institutions 3, … …, and the mutual-fund institution n upload data to the supervisory institution, and the data are uniformly stored by the supervisory institution, so that the investor can download the data uploaded by the mutual-fund institution from the supervisory institution when necessary.
However, due to the large national network credit traffic, the number of electronic contracts per day is enormous. It is estimated preliminarily that billions of electronic contracts are added every day throughout the country, with an average of 300KB per electronic contract. To ensure data reliability, at least 3 copies of each electronic contract are also typically saved. Newly adding data capacity every day: 100,000,000 × 300KB × 3 ═ 90 TB. Newly adding data capacity every year: 100,000,000 × 300KB × 3 × 365 32850TB 33 PB. Moreover, these electronic contracts also need to be stored for about 5 years, as required by regulatory requirements.
Assuming that the cost of software and hardware required by each PB capacity is 150 ten thousand, the cost of software and hardware for newly adding storage in one year is about 5000 ten thousand per year. In addition, costs such as cabinet renting, network bandwidth, personnel maintenance, etc. are required. Mass data storage is a relatively large burden for any single organization. Due to various problems in the prior art, a supervising authority is forced to need a storage authority which stores files in the storage authority and is not trusted, and for the supervising authority, the storage authority is another third-party entity and cannot be completely trusted, so that the reliability and the credibility of the files stored in the storage authority providing storage services cannot be guaranteed. By reliability of a file is meant that the file is available at any time in the future, and by trustworthiness of a file is meant that the file obtained at any time in the future is an untampered file.
Therefore, a technical solution that can store a file (e.g., an electronic contract) in an untrusted organization and ensure the reliability and credibility of the stored file is lacking in the prior art.
Disclosure of Invention
The invention provides a file processing method, a server and a system, which are used for providing a technical scheme for improving the reliability and credibility of a file stored in an untrusted mechanism.
The embodiment of the invention provides a file processing method, which comprises the following steps:
the supervision server receives a verification request; the verification request comprises a file identifier of a file to be verified;
the supervision server determines data identifications of M data to be verified corresponding to the file identifications according to the file identifications of the files to be verified; the file to be verified comprises the M data to be verified; m is an integer greater than 1;
the supervision server confirms the credibility of the file to be verified according to the credibility of the M data to be verified;
for any data to be verified, the supervision server determines the credibility of the data to be verified in the following mode:
the supervision server determines n target data storage servers storing the data to be verified according to the data identification of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the supervision server stores the data to be verified; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the supervision server sends a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified; the verification instruction is used for indicating the n target data storage servers to respectively determine corresponding storage data according to the data identification and return a response message;
the supervision server receives response messages returned by the n target data storage servers and verifies the consistency of the n response messages; the response message comprises information of stored data corresponding to the data identification stored in the target data storage server;
and the supervision server determines the credibility of the data to be verified according to the consistency of the n response messages.
Optionally, the verification instruction further includes the random number; the response message comprises a calculation value obtained by calculation according to the storage data corresponding to the data identification and the random number stored by the data storage server;
the supervision server verifies the consistency of the n response messages, including:
the supervision server verifies the consistency of the computed values comprised by the n response messages.
Optionally, determining the reliability of the data to be verified according to the consistency of the n response messages includes:
judging the proportion of the consistent response messages in the n response messages;
and when the proportion exceeds a preset threshold value, confirming that the data to be verified stored in the target storage server corresponding to the consistent response message in the n response messages passes the verification.
Optionally, the method further includes:
the supervision server acquires a storage request of a file to be stored; the file to be stored comprises M data to be stored, wherein M is an integer greater than 1; the storage request comprises a data identifier of the data to be stored and a file identifier of the file to be stored;
for each data to be stored, the supervision server determines n target data storage servers according to the preset rule;
the supervision server sends data storage instructions to the n target data storage servers; the data storage instruction is used for instructing the n target data storage servers to store the data to be stored;
and the supervision server stores the data identifier of the data to be stored, the target data storage server and the file identifier of the file to be stored in an associated manner.
Optionally, the storage request of the data to be stored includes a current storage address of the data to be stored; the data store instruction includes the current store address;
and the data storage instruction is used for instructing the n target data storage servers to download and store the data to be stored from the current storage address.
The embodiment of the invention provides a file processing method, which comprises the following steps:
the data storage server receives a verification instruction sent by the supervision server; the verification instruction comprises a data identifier of data to be verified; the data to be verified is any one of M data to be verified in the file to be verified; the data storage server is any one of n target data storage servers determined by the supervision server according to a preset rule when the supervision server receives a storage request of the data to be verified, wherein n is greater than or equal to 3; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the data storage server acquires the stored data corresponding to the data identification in the stored data according to the data identification in the verification instruction;
the data storage server returns a response message to the supervision server according to the stored data; the response message contains information of the stored data; the response message is used for the supervision server to determine the credibility of the data to be verified according to the consistency of the n response messages, and to confirm the credibility of the file to be verified according to the credibility of the M data to be verified.
Optionally, the verification instruction further includes a random number;
the data storage server returns a response message to the supervision server according to the stored data, and the response message comprises the following steps:
the data storage server calculates and obtains a calculation value of the stored data according to the stored data and the random number;
and the data storage server generates the response message according to the calculated value of the stored data.
An embodiment of the present invention provides a monitoring server, including:
a transceiving unit for receiving a verification request; the verification request comprises a file identifier of a file to be verified;
the processing unit is used for determining data identifications of M data to be verified corresponding to the file identifications according to the file identifications of the files to be verified; the file to be verified comprises the M data to be verified; m is an integer greater than 1;
the processing unit is further configured to confirm the credibility of the file to be verified according to the credibility of the M data to be verified;
for any data to be verified, the processing unit determines the credibility of the data to be verified in the following mode:
the processing unit determines n target data storage servers storing the data to be verified according to the data identification of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the supervision server stores the data to be verified; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the processing unit controls the transceiver unit to send a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified; the verification instruction is used for indicating the n target data storage servers to respectively determine corresponding storage data according to the data identification and return a response message;
the processing unit controls the transceiver unit to receive response messages returned by the n target data storage servers and verifies the consistency of the n response messages; the response message comprises information of stored data corresponding to the data identification stored in the target data storage server;
and the processing unit determines the credibility of the data to be verified according to the consistency of the n response messages.
Optionally, the verification instruction further includes the random number; the response message comprises a calculation value obtained by calculation according to the storage data corresponding to the data identification and the random number stored by the data storage server;
the processing unit is specifically configured to:
and verifying the consistency of the calculated values included in the n response messages.
Optionally, the processing unit is specifically configured to:
judging the proportion of the consistent response messages in the n response messages;
and when the proportion exceeds a preset threshold value, confirming that the data to be verified stored in the target storage server corresponding to the consistent response message in the n response messages passes the verification.
Optionally, the transceiver unit is further configured to obtain a storage request of a file to be stored; the file to be stored comprises M data to be stored, wherein M is an integer greater than 1; the storage request comprises a data identifier of the data to be stored and a file identifier of the file to be stored;
the processing unit is further configured to:
for each data to be stored, determining n target data storage servers according to the preset rule;
controlling the transceiver unit to send data storage instructions to the n target data storage servers; the data storage instruction is used for instructing the n target data storage servers to store the data to be stored;
and associating and storing the data identifier of the data to be stored, the target data storage server and the file identifier of the file to be stored.
Optionally, the storage request of the data to be stored includes a current storage address of the data to be stored; the data store instruction includes the current store address;
and the data storage instruction is used for instructing the n target data storage servers to download and store the data to be stored from the current storage address.
An embodiment of the present invention provides a data storage server, including:
the receiving and sending unit is used for receiving the verification instruction sent by the supervision server; the verification instruction comprises a data identifier of data to be verified; the data to be verified is any one of M data to be verified in the file to be verified; the data storage server is any one of n target data storage servers determined by the supervision server according to a preset rule when the supervision server receives a storage request of the data to be verified, wherein n is greater than or equal to 3; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the processing unit is used for acquiring the stored data corresponding to the data identification in the stored data according to the data identification in the verification instruction;
the processing unit is further used for controlling the transceiver unit to return a response message to the supervision server according to the stored data; the response message contains information of the stored data; the response message is used for the supervision server to determine the credibility of the data to be verified according to the consistency of the n response messages, and to confirm the credibility of the file to be verified according to the credibility of the M data to be verified.
Optionally, the verification instruction further includes a random number;
the processing unit is specifically configured to:
calculating according to the stored data and the random number to obtain a calculated value of the stored data;
and generating the response message according to the calculated value of the stored data.
An embodiment of the present invention provides a computer-readable storage medium, where computer-executable instructions are stored, and the computer-executable instructions are configured to enable a computer to execute any one of the file processing methods executed by the monitoring server.
An embodiment of the present invention provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the file processing method executed by the supervision server according to the obtained program.
An embodiment of the present invention provides a computer-readable storage medium, where computer-executable instructions are stored, and the computer-executable instructions are configured to enable a computer to execute a file processing method executed by any one of the data storage servers.
An embodiment of the present invention provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the file processing method executed by the data storage server according to the obtained program.
An embodiment of the present invention provides a file processing system, including the monitoring server described in any one of the above, and the data storage server described above.
In summary, embodiments of the present invention provide a file processing method, a server, and a system, where the method includes: the supervision server receives a verification request; the verification request comprises a file identifier of a file to be verified; the supervision server determines data identifications of M data to be verified corresponding to the file identifications according to the file identifications of the files to be verified; the file to be verified comprises M data to be verified; m is an integer greater than 1; the supervision server confirms the credibility of the file to be verified according to the credibility of the M data to be verified; aiming at any data to be verified, the supervision server determines the reliability of the data to be verified in the following mode: the supervision server determines n target data storage servers storing the data to be verified according to the data identification of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the monitoring server stores the data to be verified; the preset rule comprises that any data storage server can not be used as M target data storage servers of data to be stored at the same time; the supervision server sends a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified; the target data storage server receives the verification instruction and acquires the stored data corresponding to the data identifier in the stored data according to the data identifier; the data storage server returns a response message to the supervision server according to the stored data; the response message contains information of the stored data; the supervision server receives response messages returned by the n target data storage servers and verifies the consistency of the n response messages; and the supervision server determines the reliability of the data to be verified according to the consistency of the n response messages. Any data storage server can not be used as M target data storage servers of data to be stored at the same time, so that any data storage server can not obtain a complete file, and the safety of the file is ensured. In addition, the data to be verified are simultaneously stored in the n target data storage servers and are jointly stored by the n target data storage servers, so that the reliability of the data is improved, and the reliability of the stored files is further improved. Meanwhile, although the target data storage servers are not trusted, the credibility of the data to be verified in different target storage servers, namely the credibility of the data to be verified, can be verified through comparison of the storage results of the n target data storage servers, and further more trusted data can be obtained from the n target data storage servers, so that the credibility of the data can be improved to a certain extent, and the credibility of the M data is improved, namely the credibility of the file is improved. Therefore, the embodiment of the invention can improve the credibility and reliability of the file in the untrusted storage mechanism as a whole.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic diagram of a prior art data storage system;
FIG. 2 is a diagram illustrating a file processing system according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a file processing method according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of a verification method for data to be verified according to an embodiment of the present invention;
fig. 5 is a schematic flow chart of a data storage method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a monitoring server according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a data storage server according to an embodiment of the present invention;
FIG. 8 is a block diagram of a computing device according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a computing device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 2 is a schematic diagram of a file processing system architecture according to an embodiment of the present invention, and as shown in fig. 2, the file processing system according to the embodiment of the present invention includes at least one monitoring server, and N data storage servers, where N is greater than or equal to 3, of the data storage server 1, the data storage servers 2 and … …, and the data storage server N, where N is greater than or equal to 3, where the monitoring server can implement scheduling on the N data storage servers in the system. In the specific implementation process, please refer to fig. 1 and fig. 2 in combination, the monitoring server may be a server of a monitoring authority, the data storage server may be a server of a storage authority, and in fig. 2, the N data storage servers may be respectively affiliated to the N storage authorities.
Based on the system architecture, the embodiment of the invention provides a file processing method to improve the reliability and credibility of files stored in an untrusted data storage server. Fig. 3 is a schematic flow chart of a file processing method according to an embodiment of the present invention, as shown in fig. 3, including the following steps:
s301: the supervision server receives a verification request; the verification request comprises a file identification of the file to be verified.
S302: the supervision server determines data identifications of M data to be verified corresponding to the file identifications according to the file identifications of the files to be verified; the file to be verified comprises M data to be verified; m is an integer greater than 1.
S303: and the supervision server confirms the credibility of the file to be verified according to the credibility of the M data to be verified.
In S301, the verification request may be sent to the monitoring server by the verification requester, or may be initiated by the monitoring server when a certain trigger condition is met, where the trigger condition may be a periodic or quantitative condition, and the embodiment of the present invention is not limited. The file Identifier of the file to be verified included in the verification request may be in various forms such as a file name of the file, a Unique Universal Identifier (UUID), a hash value of the file content, and the like, and the specific form may be determined by negotiation between the verification requester and the monitoring authority.
In S302, in the file processing system provided in the embodiment of the present invention, any file to be stored is decomposed into M file fragments, that is, M data to be stored, where M is greater than or equal to 1, and the file processing system stores the M data to be stored respectively, thereby completing storage of the file. The monitoring server stores a corresponding relationship between the file identifier of the file to be stored and the data identifiers of the M pieces of data to be stored of the file, and the corresponding relationship may be stored by the monitoring server when the file processing system stores the file to be stored. Optionally, when finding that the correspondence between the file identifier of the file to be verified and the data identifiers of the M pieces of data to be verified is not stored, the monitoring server returns a message that the file to be verified is not stored to the verification requester.
In S303, since the file to be verified is divided into M data to be verified and stored in the file processing system, when the file to be verified is verified, the M data to be verified need to be verified first to obtain the credibility of the M data to be verified, and then the credibility of the file to be verified can be obtained. In the file processing method provided in the embodiment of the present invention, for any data to be verified, the reliability of the data to be verified is determined by the method shown in fig. 4, and fig. 4 is a schematic flow chart of the verification method for the data to be verified provided in the embodiment of the present invention, and as shown in fig. 4, the method includes the following steps:
s401: the supervision server determines n target data storage servers storing the data to be verified according to the data identification of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the monitoring server stores the data to be verified; the preset rule comprises that any data storage server cannot be simultaneously used as M target data storage servers of data to be stored.
S402: the supervision server sends a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified.
S403: and the target data storage server receives the verification instruction and acquires the stored data corresponding to the data identifier in the stored data according to the data identifier.
S404: the data storage server returns a response message to the supervision server according to the stored data; the response message contains information of the stored data.
S405: and the supervision server receives the response messages returned by the n target data storage servers and verifies the consistency of the n response messages.
S406: and the supervision server determines the reliability of the data to be verified according to the consistency of the n response messages.
In S401, the monitoring server stores the corresponding relationship between the file identifier and the data identifier and also stores the corresponding relationship between the data identifier and the n target data storage servers, where the corresponding relationship may be stored by the monitoring server when the file processing system stores the data to be stored of the file to be stored. In the embodiment of the present invention, any fragmented data of any file stored in the file processing system is stored in N target data storage servers, where N is greater than or equal to 3, where the target data storage servers are selected by the monitoring server from the N data storage servers shown in fig. 2 according to a preset rule, where the preset rule includes that any data storage server cannot be simultaneously used as a target data storage server for M data to be stored, that is, for any data storage server, it is impossible to obtain a complete file to be stored, thereby ensuring file privacy. In addition, the preset rule may further add other factors according to the actual application scenario, for example, the first n data storage servers with the most network resources may be preferentially selected as the target data storage servers, and for example, the data storage servers of the first n storage institutions with the highest reputation may be preferentially selected as the target data storage servers, and so on.
In S403, after receiving the verification instruction, for any target data storage server in the n target data storage servers, traversing its own storage record to obtain the storage data corresponding to the data identifier, where the correspondence between the data identifier and the storage data may be stored by the target data storage server while storing the data.
In S404, the response message may directly include the stored data corresponding to the data identifier stored in the target data storage server, but the consumption of the network resources of the target data storage server and the monitoring server by the response message obtained in this way is very large, and optionally, the response message is generated according to the operation result after the stored data is operated according to a preset algorithm, for example, the response message may be generated according to the hash value of the stored data after the stored data is subjected to hash operation.
In order to provide the verification effect, optionally, in S403, the verification instruction sent by the monitoring server to the n target data storage servers further includes a random number randomly generated by the monitoring server, and after the target data obtains the stored data corresponding to the data identifier, the target data obtains a calculation value of the stored data by calculation according to the stored data and the random number; the target data storage server generates a response message according to the calculated value of the stored data. For the target data storage authority, the random number is unpredictable in advance, and the supervisory server may generate multiple types of random numbers, such as numeric types of random numbers like timestamps, monotonically increasing integers, UUIDs, etc., and string types of random values, such as time strings, combinations of multiple random numbers, hash values of combinations of multiple random numbers, etc. The target data storage mechanism may obtain the calculated value by performing an operation according to a preset operation rule, where the operation rule may have various forms, for example, after the stored data and the random number are subjected to the splicing operation, hash calculation is performed on the splicing result, and the generated hash value is used as the calculated value, and for example, after the stored data and the random number are subjected to the exclusive or operation, hash calculation is performed on the operation result, and the generated hash value is used as the calculated value, and the like. It should be understood that no matter what form the operation rule is, the n target data storage servers should use the unified operation rule to operate on the storage data corresponding to the same data identifier.
In S405, since the administrative server has sent the verification instruction to the n target data storage servers, n response messages are received. Optionally, in S402, the monitoring server may also directly send a verification instruction to the N data storage servers in the system in a broadcast manner, and filter out response messages returned by the N target data storage servers according to a form of response messages returned by the N data storage servers, at this time, S401 does not need to be executed. The consistency of the response message refers to the consistency of the information of the stored data included in the response message, such as when the response message includes the calculated value of the stored data, the supervision server verifies that the consistency of the calculated values included in the n response messages is.
In S406, the n target data storage servers respectively return the information, such as the calculated value, of the stored data corresponding to the data identifier, which is stored respectively, to the monitoring server through the response message. Taking the calculated value as an example, since the data storage server is not trusted in the file processing system, the calculated values in the n response messages may not be the same. Optionally, the proportion of the consistent response messages in the n response messages is judged; and when the proportion exceeds a preset threshold value, confirming that the data to be verified stored in the target storage server corresponding to the consistent response message in the n response messages passes the verification. For example, n equals 3, the calculated values in the 3 response messages are Rx1, Rx2, and Rx3, respectively. And confirming the credibility of the data to be verified according to the comparison results of Rx1, Rx2 and Rx 3. Assuming that the preset threshold is 0.5, when Rx1 Rx2 Rx3, the data to be authenticated in each target data storage server is confirmed to be reliable and authentic, and when two of them are identical and the other is not (e.g., Rx1 Rx3 and Rx1 is not equal to Rx2), the data to be authenticated in the target data storage server returning a response message including Rx1 and Rx3 is confirmed to be reliable and authentic, and the data to be authenticated in the target data storage server returning a response message including Rx2 is unreliable and untrusted.
Any data storage server can not be used as M target data storage servers of data to be stored at the same time, so that any data storage server can not obtain a complete file, and the safety of the file is ensured. In addition, the data to be verified are simultaneously stored in the n target data storage servers and are jointly stored by the n target data storage servers, so that the reliability of the data is improved, and the reliability of the stored files is further improved. Meanwhile, although the target data storage servers are not trusted, the credibility of the data to be verified in different target storage servers, namely the credibility of the data to be verified, can be verified through comparison of the storage results of the n target data storage servers, and further more trusted data can be obtained from the n target data storage servers, so that the credibility of the data can be improved to a certain extent, and the credibility of the M data is improved, namely the credibility of the file is improved. Therefore, the embodiment of the invention can improve the credibility and reliability of the file in the untrusted storage mechanism as a whole.
In the foregoing embodiment, the data stored in each data storage server in the file processing system provided by the embodiment of the present invention is stored in the following manner. Fig. 5 is a schematic flow chart of a data storage method according to an embodiment of the present invention, as shown in fig. 5, including the following steps:
s501: the method comprises the steps that a supervision server obtains a storage request of a file to be stored; the file to be stored comprises M data to be stored, wherein M is an integer greater than 1; the storage request comprises a data identifier of the data to be stored and a file identifier of the file to be stored.
S502: and aiming at each data to be stored, the supervision server determines n target data storage servers according to a preset rule.
S503: the supervision server sends a data storage instruction to the n target data storage servers; the data storage instruction is used for instructing the n target data storage servers to store the data to be stored.
S504: and the supervision server stores the data identifier of the data to be stored, the target data storage server and the file identifier of the file to be stored in an associated manner.
In S501, the storage requester may first divide the file to be stored into M pieces of data to be stored, and then sequentially send the data identifier of the data to be stored to the monitoring server through the storage request, where each storage request further includes a file identifier of the file to be stored to which the data to be stored belongs. If the storage requester directly sends the data to be stored to the monitoring server through the storage request, the network resources of the monitoring server are seriously wasted, and network congestion is caused. Optionally, the storage requester stores the data to be stored in the third party in advance, obtains a current storage address of the data to be stored in the third party, and any server may obtain the data to be stored from the third party through the current storage address. The storage request of the data to be stored only needs to comprise the current storage address of the data to be stored, and does not need to comprise the complete data content of the data to be stored, so that the occupation of network resources of the monitoring server is saved. Optionally, the storage requester may further set a storage time of the data to be stored in the third party, and the data to be stored can be obtained from the third party only by accessing the current storage address within the storage time. Optionally, the hash value of the data to be stored may be added to the current storage address, so that an outsider who does not know the specific content of the data to be stored cannot predict the rule of the address, and further cannot obtain the data to be stored by traversing the third-party stored data. A feasible format of the current storage address can be in the form of http:// host: port/fragment/< hash value >, and the hash value can only be known when the specific content of the data to be stored is known, so that the current storage address of the data to be stored can be pushed out, and the data privacy is protected to a certain degree.
In S504, optionally, when the storage request of the data to be stored includes the current storage address of the data to be stored, the storage instruction sent by the administrative server to the target data storage server in S503 also includes the current storage address. The data storage server acquires data to be stored according to the storage instruction, and the method comprises the following steps: and the data storage server accesses the current storage address to download the data to be stored. By means of sending the current storage address, the monitoring server does not need to acquire specific content of data to be stored in the whole data storage process, and network resources of the monitoring server are saved to a certain extent.
In summary, an embodiment of the present invention provides a file processing method, including: the supervision server receives a verification request; the verification request comprises a file identifier of a file to be verified; the supervision server determines data identifications of M data to be verified corresponding to the file identifications according to the file identifications of the files to be verified; the file to be verified comprises M data to be verified; m is an integer greater than 1; the supervision server confirms the credibility of the file to be verified according to the credibility of the M data to be verified; aiming at any data to be verified, the supervision server determines the reliability of the data to be verified in the following mode: the supervision server determines n target data storage servers storing the data to be verified according to the data identification of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the monitoring server stores the data to be verified; the preset rule comprises that any data storage server can not be used as M target data storage servers of data to be stored at the same time; the supervision server sends a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified; the target data storage server receives the verification instruction and acquires the stored data corresponding to the data identifier in the stored data according to the data identifier; the data storage server returns a response message to the supervision server according to the stored data; the response message contains information of the stored data; the supervision server receives response messages returned by the n target data storage servers and verifies the consistency of the n response messages; and the supervision server determines the reliability of the data to be verified according to the consistency of the n response messages. Any data storage server can not be used as M target data storage servers of data to be stored at the same time, so that any data storage server can not obtain a complete file, and the safety of the file is ensured. In addition, the data to be verified are simultaneously stored in the n target data storage servers and are jointly stored by the n target data storage servers, so that the reliability of the data is improved, and the reliability of the stored files is further improved. Meanwhile, although the target data storage servers are not trusted, the credibility of the data to be verified in different target storage servers, namely the credibility of the data to be verified, can be verified through comparison of the storage results of the n target data storage servers, and further more trusted data can be obtained from the n target data storage servers, so that the credibility of the data can be improved to a certain extent, and the credibility of the M data is improved, namely the credibility of the file is improved. Therefore, the embodiment of the invention can improve the credibility and reliability of the file in the untrusted storage mechanism as a whole.
Based on the same technical concept, the embodiment of the invention also provides a monitoring server, and the monitoring server can execute the file processing method provided by any one of the embodiments. Fig. 6 is a schematic structural diagram of an administration server according to an embodiment of the present invention, and as shown in fig. 6, an administration server 600 includes a transceiver 601 and a processing unit 602, where:
a transceiving unit 601, configured to receive a verification request; the verification request comprises a file identifier of a file to be verified;
the processing unit 602 is configured to determine, according to a file identifier of a file to be verified, data identifiers of M pieces of data to be verified corresponding to the file identifier; the file to be verified comprises M data to be verified; m is an integer greater than 1;
the processing unit 602 is further configured to determine the reliability of the file to be verified according to the reliability of the M data to be verified;
for any data to be verified, the processing unit 602 determines the reliability of the data to be verified by the following method:
the processing unit 602 determines n target data storage servers storing the data to be verified according to the data identifier of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the monitoring server stores the data to be verified; the preset rule comprises that any data storage server can not be used as M target data storage servers of data to be stored at the same time;
the processing unit 602 controls the transceiving unit 601 to send a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified; the verification instruction is used for indicating the n target data storage servers to respectively determine corresponding storage data according to the data identification and return a response message;
the processing unit 602 controls the transceiver 601 to receive the response messages returned by the n target data storage servers and verifies the consistency of the n response messages; the response message comprises information of stored data corresponding to the data identification stored in the target data storage server;
the processing unit 602 determines the reliability of the data to be verified according to the consistency of the n response messages.
Optionally, the verification instruction further includes a random number; the response message comprises a calculated value obtained by calculation according to the stored data corresponding to the data identification and the random number stored by the data storage server;
the processing unit 602 is specifically configured to:
the consistency of the calculated values comprised by the n response messages is verified.
Optionally, the processing unit 602 is specifically configured to:
judging the proportion of the consistent response messages in the n response messages;
and when the proportion exceeds a preset threshold value, confirming that the data to be verified stored in the target storage server corresponding to the consistent response message in the n response messages passes the verification.
Optionally, the transceiver 601 is further configured to obtain a storage request of a file to be stored; the file to be stored comprises M data to be stored, wherein M is an integer greater than 1; the storage request comprises a data identifier of the data to be stored and a file identifier of the file to be stored;
a processing unit 602, further configured to:
determining n target data storage servers according to a preset rule aiming at each data to be stored;
the control transceiving unit 601 sends a data storage instruction to the n target data storage servers; the data storage instruction is used for indicating the n target data storage servers to store data to be stored;
and associating and storing the data identifier of the data to be stored, the target data storage server and the file identifier of the file to be stored.
Optionally, the storage request of the data to be stored includes a current storage address of the data to be stored; the data store instruction includes a current store address;
and the data storage instruction is used for instructing the n target data storage servers to download and store the data to be stored from the current storage address.
Based on the same technical concept, the embodiment of the invention also provides a data storage server, and the data storage server can execute the file processing method provided by any one of the embodiments. Fig. 7 is a schematic structural diagram of a data storage server according to an embodiment of the present invention, and as shown in fig. 7, a data storage server 700 includes a transceiver unit 701 and a processing unit 702, where:
a transceiver unit 701, configured to receive a verification instruction sent by the monitoring server; the verification instruction comprises a data identifier of the data to be verified; the data to be verified is any one of M data to be verified in the file to be verified; the data storage server is any one of n target data storage servers determined by the supervision server according to a preset rule when the supervision server receives a storage request of data to be verified, wherein n is more than or equal to 3; the preset rule comprises that any data storage server can not be used as M target data storage servers of data to be stored at the same time;
a processing unit 702, configured to obtain, according to the data identifier in the verification instruction, stored data corresponding to the data identifier in the stored data;
the processing unit 702 is further configured to control the transceiver unit 701 to return a response message to the monitoring server according to the stored data; the response message contains information of the stored data; the response message is used for the supervision server to determine the reliability of the data to be verified according to the consistency of the n response messages, and to determine the reliability of the file to be verified according to the reliability of the M data to be verified.
Optionally, the verification instruction further includes a random number;
the processing unit 702 is specifically configured to:
calculating according to the stored data and the random number to obtain a calculated value of the stored data;
a response message is generated based on the computed value of the stored data.
Based on the same technical concept, an embodiment of the present invention further provides a file processing system, including the monitoring server provided in any of the above embodiments, and the data storage server provided in any of the above embodiments.
Based on the same technical concept, the embodiment of the present invention further provides a computing device, which may be specifically a desktop computer, a portable computer, a smart phone, a tablet computer, a Personal Digital Assistant (PDA), and the like. As shown in fig. 8, a schematic structural diagram of a computing device according to an embodiment of the present invention is provided, where the computing device may include a Central Processing Unit (CPU) 801, a memory 802, an input device 803, an output device 804, and the like, the input device 803 may include a keyboard, a mouse, a touch screen, and the like, and the output device 804 may include a Display device, such as a Liquid Crystal Display (LCD), a Cathode Ray Tube (CRT), and the like.
Memory 802 may include Read Only Memory (ROM) and Random Access Memory (RAM), and provides the processor with program instructions and data stored in the memory. In this embodiment of the present invention, the memory may be configured to store a program of a file processing method executed by the monitoring server provided in this embodiment of the present invention, and the processor executes the file processing method executed by any one of the monitoring servers according to the obtained program instruction by calling the program instruction stored in the memory.
Based on the same technical concept, the embodiment of the present invention further provides a computer-readable storage medium for storing computer program instructions for the computing device, which includes instructions for executing the file processing method executed by the monitoring server according to any one of the above descriptions.
The computer storage media may be any available media or data storage device that can be accessed by a computer, including, but not limited to, magnetic memory (e.g., floppy disks, hard disks, magnetic tape, magneto-optical disks (MOs), etc.), optical memory (e.g., CDs, DVDs, BDs, HVDs, etc.), and semiconductor memory (e.g., ROMs, EPROMs, EEPROMs, non-volatile memory (NAND FLASH), Solid State Disks (SSDs)), etc.
Based on the same technical concept, the embodiment of the present invention further provides a computing device, which may be specifically a desktop computer, a portable computer, a smart phone, a tablet computer, a Personal Digital Assistant (PDA), and the like. As shown in fig. 9, a schematic structural diagram of a computing device according to an embodiment of the present invention is provided, where the computing device may include a central Processing Unit 901 (CPU), a memory 902, an input device 903, an output device 904, and the like, the input device 903 may include a keyboard, a mouse, a touch screen, and the like, and the output device 904 may include a Display device such as a Liquid Crystal Display (LCD), a Cathode Ray Tube (CRT), and the like.
Memory 902 may include Read Only Memory (ROM) and Random Access Memory (RAM), and provides the processor with program instructions and data stored in the memory. In this embodiment of the present invention, the memory may be configured to store a program of a file processing method executed by the data storage server provided in this embodiment of the present invention, and the processor executes the file processing method executed by any one of the data storage servers according to the obtained program instruction by calling the program instruction stored in the memory.
Based on the same technical concept, the embodiment of the present invention further provides a computer-readable storage medium for storing computer program instructions for the computing device, which includes a program for executing the file processing method executed by the data storage server according to any one of the above.
The computer storage media may be any available media or data storage device that can be accessed by a computer, including, but not limited to, magnetic memory (e.g., floppy disks, hard disks, magnetic tape, magneto-optical disks (MOs), etc.), optical memory (e.g., CDs, DVDs, BDs, HVDs, etc.), and semiconductor memory (e.g., ROMs, EPROMs, EEPROMs, non-volatile memory (NAND FLASH), Solid State Disks (SSDs)), etc.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (15)

1. A file processing method, comprising:
the supervision server receives a verification request; the verification request comprises a file identifier of a file to be verified;
the supervision server determines data identifications of M data to be verified corresponding to the file identifications according to the file identifications of the files to be verified; the file to be verified comprises the M data to be verified; m is an integer greater than 1;
the supervision server confirms the credibility of the file to be verified according to the credibility of the M data to be verified;
for any data to be verified, the supervision server determines the credibility of the data to be verified in the following mode:
the supervision server determines n target data storage servers storing the data to be verified according to the data identification of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the supervision server stores the data to be verified; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the supervision server sends a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified; the verification instruction is used for indicating the n target data storage servers to respectively determine corresponding storage data according to the data identification and return a response message;
the supervision server receives response messages returned by the n target data storage servers and verifies the consistency of the n response messages; the response message comprises information of stored data corresponding to the data identification stored in the target data storage server;
the supervision server determines the credibility of the data to be verified according to the consistency of the n response messages;
the validation instruction further includes a random number; the response message comprises a calculation value obtained by calculation according to the storage data corresponding to the data identification and the random number stored by the data storage server;
the supervision server verifies the consistency of the n response messages, including:
the supervision server verifies the consistency of the computed values comprised by the n response messages.
2. The method of claim 1, wherein determining the trustworthiness of the data to be verified based on the consistency of the n response messages comprises:
judging the proportion of the consistent response messages in the n response messages;
and when the proportion exceeds a preset threshold value, confirming that the data to be verified stored in the target storage server corresponding to the consistent response message in the n response messages passes the verification.
3. The method of any of claims 1 to 2, further comprising:
the supervision server acquires a storage request of a file to be stored; the file to be stored comprises M data to be stored, wherein M is an integer greater than 1; the storage request comprises a data identifier of the data to be stored and a file identifier of the file to be stored;
for each data to be stored, the supervision server determines n target data storage servers according to the preset rule;
the supervision server sends data storage instructions to the n target data storage servers; the data storage instruction is used for instructing the n target data storage servers to store the data to be stored;
and the supervision server stores the data identifier of the data to be stored, the target data storage server and the file identifier of the file to be stored in an associated manner.
4. The method of claim 3, wherein the storage request for the data to be stored includes a current storage address of the data to be stored; the data store instruction includes the current store address;
and the data storage instruction is used for instructing the n target data storage servers to download and store the data to be stored from the current storage address.
5. A file processing method, comprising:
the data storage server receives a verification instruction sent by the supervision server; the verification instruction comprises a data identifier of data to be verified; the data to be verified is any one of M data to be verified in the file to be verified; the data storage server is any one of n target data storage servers determined by the supervision server according to a preset rule when the supervision server receives a storage request of the data to be verified, wherein n is greater than or equal to 3; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the data storage server acquires the stored data corresponding to the data identification in the stored data according to the data identification in the verification instruction;
the data storage server returns a response message to the supervision server according to the stored data; the response message contains information of the stored data; the response message is used for the supervision server to determine the credibility of the data to be verified according to the consistency of the n response messages and to confirm the credibility of the file to be verified according to the credibility of the M data to be verified;
the validation instruction further includes a random number;
the data storage server returns a response message to the supervision server according to the stored data, and the response message comprises the following steps:
the data storage server calculates and obtains a calculation value of the stored data according to the stored data and the random number;
and the data storage server generates the response message according to the calculated value of the stored data.
6. An administration server, comprising:
a transceiving unit for receiving a verification request; the verification request comprises a file identifier of a file to be verified;
the processing unit is used for determining data identifications of M data to be verified corresponding to the file identifications according to the file identifications of the files to be verified; the file to be verified comprises the M data to be verified; m is an integer greater than 1;
the processing unit is further configured to confirm the credibility of the file to be verified according to the credibility of the M data to be verified;
for any data to be verified, the processing unit determines the credibility of the data to be verified in the following mode:
the processing unit determines n target data storage servers storing the data to be verified according to the data identification of the data to be verified; n is greater than or equal to 3; the n target data storage servers are determined according to preset rules when the supervision server stores the data to be verified; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the processing unit controls the transceiver unit to send a verification instruction to the n target data storage servers; the verification instruction comprises a data identifier of the data to be verified; the verification instruction is used for indicating the n target data storage servers to respectively determine corresponding storage data according to the data identification and return a response message;
the processing unit controls the transceiver unit to receive response messages returned by the n target data storage servers and verifies the consistency of the n response messages; the response message comprises information of stored data corresponding to the data identification stored in the target data storage server;
the processing unit determines the credibility of the data to be verified according to the consistency of the n response messages;
the validation instruction further includes a random number; the response message comprises a calculation value obtained by calculation according to the storage data corresponding to the data identification and the random number stored by the data storage server;
the processing unit is specifically configured to:
and verifying the consistency of the calculated values included in the n response messages.
7. The administration server of claim 6, wherein the processing unit is specifically configured to:
judging the proportion of the consistent response messages in the n response messages;
and when the proportion exceeds a preset threshold value, confirming that the data to be verified stored in the target storage server corresponding to the consistent response message in the n response messages passes the verification.
8. The supervision server according to any of claims 6 to 7, characterized by:
the receiving and sending unit is also used for acquiring a storage request of a file to be stored; the file to be stored comprises M data to be stored, wherein M is an integer greater than 1; the storage request comprises a data identifier of the data to be stored and a file identifier of the file to be stored;
the processing unit is further configured to:
for each data to be stored, determining n target data storage servers according to the preset rule;
controlling the transceiver unit to send data storage instructions to the n target data storage servers; the data storage instruction is used for instructing the n target data storage servers to store the data to be stored;
and associating and storing the data identifier of the data to be stored, the target data storage server and the file identifier of the file to be stored.
9. The administration server of claim 8, wherein the storage request for the data to be stored comprises a current storage address of the data to be stored; the data store instruction includes the current store address;
and the data storage instruction is used for instructing the n target data storage servers to download and store the data to be stored from the current storage address.
10. A data storage server, comprising:
the receiving and sending unit is used for receiving the verification instruction sent by the supervision server; the verification instruction comprises a data identifier of data to be verified; the data to be verified is any one of M data to be verified in the file to be verified; the data storage server is any one of n target data storage servers determined by the supervision server according to a preset rule when the supervision server receives a storage request of the data to be verified, wherein n is greater than or equal to 3; the preset rule comprises that any data storage server cannot be simultaneously used as the target data storage servers of the M data to be stored;
the processing unit is used for acquiring the stored data corresponding to the data identification in the stored data according to the data identification in the verification instruction;
the processing unit is further used for controlling the transceiver unit to return a response message to the supervision server according to the stored data; the response message contains information of the stored data; the response message is used for the supervision server to determine the credibility of the data to be verified according to the consistency of the n response messages and to confirm the credibility of the file to be verified according to the credibility of the M data to be verified;
the validation instruction further includes a random number;
the processing unit is specifically configured to:
calculating according to the stored data and the random number to obtain a calculated value of the stored data;
and generating the response message according to the calculated value of the stored data.
11. A computer-readable storage medium storing computer-executable instructions for causing a computer to perform the file processing method according to any one of claims 1 to 4.
12. A computing device, comprising:
a memory for storing program instructions;
a processor for calling the program instructions stored in the memory and executing the file processing method according to any one of claims 1 to 4 in accordance with the obtained program.
13. A computer-readable storage medium storing computer-executable instructions for causing a computer to perform the file processing method of claim 5.
14. A computing device, comprising:
a memory for storing program instructions;
a processor for calling the program instructions stored in the memory and executing the file processing method according to claim 5 in accordance with the obtained program.
15. A document processing system comprising an administration server as claimed in any one of claims 6 to 9, and a data storage server as claimed in claim 10.
CN201710966998.4A 2017-10-17 2017-10-17 File processing method, server and system Active CN107948130B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710966998.4A CN107948130B (en) 2017-10-17 2017-10-17 File processing method, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710966998.4A CN107948130B (en) 2017-10-17 2017-10-17 File processing method, server and system

Publications (2)

Publication Number Publication Date
CN107948130A CN107948130A (en) 2018-04-20
CN107948130B true CN107948130B (en) 2021-02-23

Family

ID=61936182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710966998.4A Active CN107948130B (en) 2017-10-17 2017-10-17 File processing method, server and system

Country Status (1)

Country Link
CN (1) CN107948130B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111045985B (en) * 2019-11-25 2023-10-24 北京百度网讯科技有限公司 File storage processing method, server, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901275A (en) * 2010-08-23 2010-12-01 华中科技大学 Distributed storage system and method thereof
CN104766025A (en) * 2015-03-23 2015-07-08 中国人民解放军信息工程大学 Mimicry tamper-proof method of distributed file system
CN106230851A (en) * 2016-08-29 2016-12-14 中金云金融(北京)大数据科技股份有限公司 Data security method based on block chain and system
CN107219997A (en) * 2016-03-21 2017-09-29 阿里巴巴集团控股有限公司 A kind of method and device for being used to verify data consistency

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8595781B2 (en) * 2009-05-29 2013-11-26 Cognitive Media Networks, Inc. Methods for identifying video segments and displaying contextual targeted content on a connected television

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901275A (en) * 2010-08-23 2010-12-01 华中科技大学 Distributed storage system and method thereof
CN104766025A (en) * 2015-03-23 2015-07-08 中国人民解放军信息工程大学 Mimicry tamper-proof method of distributed file system
CN107219997A (en) * 2016-03-21 2017-09-29 阿里巴巴集团控股有限公司 A kind of method and device for being used to verify data consistency
CN106230851A (en) * 2016-08-29 2016-12-14 中金云金融(北京)大数据科技股份有限公司 Data security method based on block chain and system

Also Published As

Publication number Publication date
CN107948130A (en) 2018-04-20

Similar Documents

Publication Publication Date Title
US10839395B2 (en) Techniques for expediting processing of blockchain transactions
US11899629B2 (en) Decentralized database associating public keys and communications addresses
CN110383279B (en) System and method for detecting replay attacks
US11218325B2 (en) Asset management method and apparatus, and electronic device
US10579424B2 (en) Prioritization in a permissioned blockchain
CN111344706B (en) Method and system for managing transactions on blockchain
CN110431577B (en) System and method for detecting replay attacks
US20210326867A1 (en) Fork-Tolerant Consensus Protocol
US9491182B2 (en) Methods and systems for secure internet access and services
US20240073213A1 (en) System and method for handling user requests for web services
CN108769230B (en) Transaction data storage method, device, server and storage medium
US20200382510A1 (en) Dynamic management of consent and permissioning between executed applications and programmatic interfaces
US11489662B2 (en) Special relationships in a blockchain
US11874804B2 (en) Load balancing based blockchain transaction submission
CN110084600B (en) Processing and verifying method, device, equipment and medium for resolution transaction request
CN109447791B (en) Block chain-based fund transaction method and device
CN110400217B (en) Rule change processing method and device for intelligent contract
CN107948130B (en) File processing method, server and system
RU2718480C2 (en) Method and system for authorizing website in web browser
US11445015B2 (en) Information processing apparatus and method for processing information
CN113225348B (en) Request anti-replay verification method and device
CN114157482A (en) Service access control method, device, control equipment and storage medium
CN114328731A (en) Information processing method, device, electronic equipment and storage medium
US12015602B2 (en) Information security system and method for secure data transmission among user profiles using a blockchain network
CN115664677A (en) Request retransmission preventing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant