CN109271559A - It modifies method, apparatus and electronic equipment to data in block chain - Google Patents
It modifies method, apparatus and electronic equipment to data in block chain Download PDFInfo
- Publication number
- CN109271559A CN109271559A CN201810956191.7A CN201810956191A CN109271559A CN 109271559 A CN109271559 A CN 109271559A CN 201810956191 A CN201810956191 A CN 201810956191A CN 109271559 A CN109271559 A CN 109271559A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- read
- revised
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The embodiment of the present application provides the method, apparatus and electronic equipment that the data in a kind of pair of block chain are modified, and is applied to block chain order field.This method comprises: reading data to be read from block chain, and the data read are decrypted, then the data after decryption are verified, when carrying out verification failure to the data after decryption, push includes the check results for ciphertext data of revised data, then will be in the revised data write-in block chain.The embodiment of the present application, which realizes, modifies to the data stored in block chain.
Description
Technical field
This application involves block chain technical fields, specifically, this application involves data in a kind of pair of block chain to repair
Change method, apparatus and electronic equipment.
Background technique
With the development of information technology, block chain technology also develops therewith, and block chain is Distributed Storage, point-to-point
The new application mode of the computer technologies such as transmission, common recognition mechanism, Encryption Algorithm, block chain is essentially a decentralization
Database.Block chain or a string use the associated data blocks of cryptography method, can be used for storing number in each data block
According to, for example, can by software i.e. service (Software-as-a-Service, SAAS) using corresponding related data store to
In the data block of block chain.
The data being written into common block chain are unchangeable, but there are certain scenes in actual operation
Cause data stored into block chain itself there are problem, needs to modify to the data being stored in block chain, for example,
Since SAAS is using itself regular not perfect or mistake, the related data for causing the SAAS being stored in block chain application to generate
It needs to modify, therefore how to modify the data stored into block chain as a problem.
Summary of the invention
The method, apparatus and electronic equipment modified this application provides data in a kind of pair of block chain, for solving
The problem of can not modifying to the data stored into block chain.
In a first aspect, the method that data are modified in a kind of pair of block chain is provided, this method comprises:
Data to be read are read from block chain, and the data read are decrypted;
Data after decryption are verified;
When carrying out verification failure to the data after decryption, push is directed to the check results of ciphertext data, described for solution
The check results of ciphertext data include: revised data;
It will be in the revised data write-in block chain.
Second aspect provides the device that the data in a kind of pair of block chain are modified, which includes:
Read module, for reading data to be read from block chain;
Deciphering module, the data for reading to the read module are decrypted;
Correction verification module, for being verified to the data after deciphering module decryption;
Pushing module, for when the correction verification module carries out verification failure to the data after decryption, push to be for decryption
The check results of data, the check results for ciphertext data include: revised data;
Writing module, the revised data for pushing the pushing module are written in block chain.
The third aspect provides a kind of electronic equipment, which includes:
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and quilt
It is configured to be executed by one or more of processors, one or more of programs are configured to: execute according to first aspect
Shown in the method modified to the data in block chain.
Fourth aspect provides a kind of computer readable storage medium, is stored thereon with computer program, which is located
Reason device realizes the method modified shown in first aspect to the data in block chain when executing.
The data that the embodiment of the present application provides in a kind of pair of block chain are modified method, apparatus and electronic equipment, with
The prior art is compared, and reads data to be read in the embodiment of the present application from block chain, and solve to the data read
It is close, then the data after decryption are verified, when carrying out verification failure to the data after decryption, push is directed to ciphertext data
Check results, the check results for ciphertext data include: revised data, then by revised data be written block
In chain.I.e. in the embodiment of the present application, when carrying out verification failure to the data read from block chain, after push is comprising amendment
Data check results, and by revised data block chain, so as to realize to the data stored in block chain into
Row modification.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, institute in being described below to the embodiment of the present application
Attached drawing to be used is needed to be briefly described.
Fig. 1 is the method flow schematic diagram that the data in a kind of pair of block chain provided by the embodiments of the present application are modified;
Fig. 2 is the apparatus structure schematic diagram that the data in a kind of pair of block chain provided by the embodiments of the present application are modified;
Fig. 3 is that another apparatus structure modified to the data in block chain provided by the embodiments of the present application is illustrated
Figure;
Fig. 4 is that the structure for the electronic equipment that the data in a kind of pair of block chain provided by the embodiments of the present application are modified is shown
It is intended to.
Specific embodiment
Embodiments herein is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and is only used for explaining the application, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in the description of the present application
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.It should be understood that when we claim member
Part is " connected " or when " coupled " to another element, it can be directly connected or coupled to other elements, or there may also be
Intermediary element.In addition, " connection " used herein or " coupling " may include being wirelessly connected or wirelessly coupling.It is used herein to arrange
Diction "and/or" includes one or more associated wholes for listing item or any cell and all combinations.
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party
Formula is described in further detail.
How the technical solution of the application and the technical solution of the application are solved with specifically embodiment below above-mentioned
Technical problem is described in detail.These specific embodiments can be combined with each other below, for the same or similar concept
Or process may repeat no more in certain embodiments.Below in conjunction with attached drawing, embodiments herein is described.
Embodiment one
The embodiment of the present application provides the method that the data in a kind of pair of block chain are modified, as shown in Figure 1, this method
Include:
Step S101, data to be read are read from block chain.
It can be ready for use in SAAS application from the data to be read read in block chain for the embodiment of the present application
Data.In the embodiment of the present application, SAAS provider is that all-network infrastructure required for informationization and soft is built by enterprise
Part, hardware operate platform, and are responsible for a series of services, the enterprises such as the implementation of all early periods, the maintenance in later period and do not need to buy soft or hard
Part, construction computer room, recruitment IT personnel, can pass through internet use information system.Enterprise according to actual needs, provides to SAAS
Quotient's renting software service, wherein the software service leased from SAAS offer is SAAS application service.
For the embodiment of the present application, after reading data to be read in block chain, by the data read store to
It is local.
Step S102, the data read are decrypted.
For the embodiment of the present application, is stored using secret key pair to local data and be decrypted.In the embodiment of the present application,
It can be from the code key for locally obtaining the code key being locally stored or acquisition user's input.
For the embodiment of the present application, if the data read are that SAAS application needs data to be used, SAAS application can
To guide user to be decrypted using being stored in local secret key pair and be stored in the local data read by interface manner, and
Reading data after the form display decryption read.
Step S103, the data after decryption are verified.
For the embodiment of the present application, if the data read are SAAS, application needs data to be used, is answered based on SAAS
Rule is verified with available data, the data after decryption are verified.
Step S104, when carrying out verification failure to the data after decryption, push is directed to the check results of ciphertext data.
It wherein, include: revised data for the check results of ciphertext data.
For the embodiment of the present application, for the check results of ciphertext data further include: verify data, the verification failure of failure
The reason of at least one of.
For the embodiment of the present application, if the data read from block chain are that SAAS applies corresponding data, when right
When data after decryption carry out verification failure, amendment button is shown on interface, and the data of current verification failure on the surface,
The reason of verification failure and revised data.In the embodiment of the present application, when detecting that user triggers the amendment button,
Data correction by verification failure is the revised data.
For example, being verified by SAAS system to the data after decryption, when verifying failure, shown by SAAS application
The reason of verifying the data, revised data and verification failure of failure.In the embodiment of the present application, it is lost by display verification
The corresponding revised data of data of the data, verification failure that lose, and the reason of verification failure, so that SAAS tenant's energy
The reason of enough failures according to verification, it is confirmed whether to be modified, the data being stored in block chain is carried out so as to improve
Modified accuracy, and then user experience can be promoted.
For the embodiment of the present application, when being verified successfully to the data after decryption, push verification successful first is mentioned
Show message.Wherein, successful first prompting message of verification is used to prompt the data check success after decryption.In the application reality
It applies in example, arbitrary node of the successful data broadcasting of verification for carrying specific identifier into block chain is verified, when testing
Block chain is written after passing through in card.
For the embodiment of the present application, when detecting that user carries out business operation using the data of verification failure, push the
Two prompting messages.Wherein, the data that the second prompting message is used to that user to be prompted not to be available correction failure currently carry out business
Operation.
Step S105, revised data are written in block chain.
The data that the embodiment of the present application provides in a kind of pair of block chain are modified method, compared with prior art, this
Read data to be read from block chain in application embodiment, and the data read be decrypted, then to decryption after
Data verified, when to the data after decryption carry out verification failure when, push be directed to ciphertext data check results, for
The check results of ciphertext data include: revised data, and then revised data are written in block chain.I.e. in the application
In embodiment, when carrying out verification failure to the data read from block chain, push includes the verification knot of revised data
Fruit, and by revised data block chain, it modifies so as to realize to the data stored in block chain.
Embodiment two
The alternatively possible implementation of the embodiment of the present application further includes two institute of embodiment on the basis of example 1
The operation shown, wherein
Step S101 includes step S1011 (being not marked in figure) and step S1012 (being not marked in figure), wherein
Step S1011, based on the reading instruction of user's triggering, data to be read are determined.
Step S1012, data to be read are read from block chain.
For the embodiment of the present application, the common recognition algorithm provided by common recognition mechanism reads data to be read from block chain;
And/or determine the super node for reading data to be read, and data to be read are read from super node.
Wherein, the common recognition mechanism include: ether mill, conduct business system (Enterprise Operation System,
EOS), file coin (FileCoin).
Wherein, step S102 includes step S1021 (being not marked in figure) and step S1022 (being not marked in figure), wherein
Step S1021, the corresponding code key of data read is obtained.
Step S1022, based on the code key got, the data read are decrypted.
It is based on the code key of oneself by user at this due to the data being stored in block chain for the embodiment of the present application
It after ground encryption, is written in block chain, therefore after reading data in block chain, it is also necessary to local using being stored in
Code key or the code key of user oneself input, just can be used after the data of reading are decrypted.
For the embodiment of the present application, by the data that are read from block chain using the secret key pair being locally stored local into
Row decryption, i.e., to the data after the code key being decrypted from the data of the reading in block chain, and decryption in tenant local
It is stored on computer, the operator so as to avoid data from being applied by SAAS obtains, and then can promote the safety of user.
Embodiment three
The embodiment of the present application provides alternatively possible implementation, further includes implementing on the basis of example 1
Method shown in example three, wherein
Step S105 includes step S1051 (being not marked in figure) and step S1052 (being not marked in figure), wherein
Step S1051, when detecting the edit operation instruction of user's triggering, the signing messages of user's input is obtained.
Specifically, it detects the edit operation instruction of user's triggering, and obtains the signing messages of user's input, comprising:
When detecting the edit operation instruction of user's triggering, third prompting message is pushed, and receive the label of user's input
Name information;And/or
When detecting the edit operation instruction of user's triggering, the signing messages of user's input is directly received;And/or
When detect user triggering edit operation instruction when, from be locally stored it is middle lookup and obtain user input signature
Information.
Wherein, third prompting message is for prompting user to input signing messages.
Step S1052, the signing messages of user's input is verified, and when verification passes through, by revised data
It is written in block chain.
For the embodiment of the present application, the signing messages of user's input is verified, comprising: using the public key obtained,
The signing messages of user's input is verified.In the embodiment of the present application, revised data are written in block chain, packet
In the revised data write-in block chain encrypted for including: obtaining the revised data encrypted, and will acquire.
For the embodiment of the present application, the signing messages of user's input is signed based on private key, when by corresponding
The signing messages that public key inputs user is decrypted, and when successful decryption, i.e., characterization verifies successfully.In the embodiment of the present application
In, when correcting successfully, the data correction of verification failure is automatically revised data by SAAS system.
For the embodiment of the present application, the revised data being written in block chain are using private key by SAAS user in local
It is obtained after being encrypted.
For the embodiment of the present application, by being verified to the signing messages that user inputs, when verification passes through, to data
It is modified, and revised data is written in block chain, i.e., user needs to sign using the code key of oneself before amendment
Name, so that SAAS application and block chain determine that the user possesses control to data, and amendment operation is user
The amendment operation for confirming and initiating.
Example IV
The alternatively possible implementation of the embodiment of the present application, on the basis of shown in the embodiment one or embodiment three
It further include operation shown in example IV, wherein
It further include step S106 (being not marked in figure) after step S105, wherein
Step S106, the corresponding data mode of data before the data and amendment before amendment is broadcasted into block chain
Each super node, so that the status indicator of the data before amendment is invalid by each super node in block chain.
Wherein, the corresponding data mode of data before amendment is invalid state.
For the embodiment of the present application, when the data by storing in block chain carry out the business operation of SAAS, according to area
The data mode of the data stored in block chain determines the valid data of state-of-the-art record, and the state-of-the-art record by determining has
It imitates data and carries out SAAS business operation.In the embodiment of the present application, status indicator is that data-link is still stored in invalid data
In, but cannot be used for SAAS business operation.
For the embodiment of the present application, status indicator is that invalid data are still saved to preservation to the history area of block chain
In block.
For the embodiment of the present application, after being modified the data after reading, by that will be stored in block chain
The status indicator of data before amendment be it is invalid, enable to using block chain data carry out corresponding operating when, read amendment
Data afterwards utilize the data stored into block chain to carry out phase without misreading the data before correcting so as to be promoted
The accuracy that should be operated, and then user experience can be promoted.
Embodiment five
The embodiment of the present application provides the device that the data in a kind of pair of block chain are modified, as shown in Fig. 2, this is to area
The device 20 that data in block chain are modified may include: read module 201, deciphering module 202, correction verification module 203, push
Module 204, writing module 205, wherein
Read module 201, for reading data to be read from block chain.
Deciphering module 202, the data for reading to read module 201 are decrypted.
Correction verification module 203 is verified for the data after decrypting to deciphering module 202.
Pushing module 204, when carrying out verification failure for the data after 203 pairs of correction verification module decryption, push is for solution
The check results of ciphertext data.
It wherein, include: revised data for the check results of ciphertext data.
Writing module 205, the revised data for pushing pushing module 204 are written in block chain.
The embodiment of the present application provides the device that the data in a kind of pair of block chain are modified, compared with prior art,
Data to be read are read in the embodiment of the present application from block chain, and the data read are decrypted, then to decryption
Data afterwards are verified, and when carrying out verification failure to the data after decryption, push is directed to the check results of ciphertext data, needle
Check results to ciphertext data include: revised data, and then revised data are written in block chain.I.e. in this Shen
Please be in embodiment, when carrying out verification failure to the data read from block chain, push includes the verification of revised data
As a result, and by revised data block chain, modify so as to realize to the data stored in block chain.
The device modified to the data in block chain of the embodiment of the present application can be performed shown in the embodiment of the present application one
The method modified to the data in block chain, realization principle is similar, and details are not described herein again.
Embodiment six
The structural schematic diagram for the device that another kind provided by the embodiments of the present application modifies to the data in block chain, such as
Shown in Fig. 3, this may include: read module 301, deciphering module 302, school to the device 30 that the data in block chain are modified
Test module 303, pushing module 304, writing module 305, wherein
Read module 301, for reading data to be read from block chain.
Wherein, the read module 301 in Fig. 3 is same or similar with the function of read module 201 in Fig. 2.
Deciphering module 302, the data for reading to read module 301 are decrypted.
Wherein, the deciphering module 302 in Fig. 3 is same or similar with the function of deciphering module 202 in Fig. 2.
Correction verification module 303 is verified for the data after decrypting to deciphering module 302.
Wherein, the correction verification module 303 in Fig. 3 is same or similar with the function of correction verification module 203 in Fig. 2.
Pushing module 304, when carrying out verification failure for the data after 303 pairs of correction verification module decryption, push is for solution
The check results of ciphertext data.
Wherein, the pushing module 304 in Fig. 3 is same or similar with the function of pushing module 204 in Fig. 2.
It wherein, include: revised data for the check results of ciphertext data.
Wherein, for the check results of ciphertext data further include: in the reason of verifying the data and verification failure of failure
At least one of.
For the embodiment of the present application, the data by the data of display verification failure, verification failure are corresponding revised
Data, and the reason of verification failure, so that the reason of SAAS tenant can be according to verification failure, is confirmed whether to be repaired
Just, so as to improve the accuracy being modified to the data being stored in block chain, and then user experience can be promoted.
Writing module 305, the revised data for pushing pushing module 304 are written in block chain.
Wherein, the writing module 305 in Fig. 3 is same or similar with the function of writing module 205 in Fig. 2.
Further, as shown in figure 3, writing module 305 includes: acquiring unit 3051, verification unit 3052, writing unit
3053, wherein
Acquiring unit 3051, for obtaining the signature of user's input when detecting the edit operation instruction of user's triggering
Information.
The signing messages of verification unit 3052, user's input for getting to acquiring unit 3051 verifies.
Writing unit 3053, for when the verification of verification unit 3052 passes through, revised data to be written in block chain.
Verification unit 3052, specifically for being verified to the signing messages of user's input using the public key obtained.
Writing unit 3053, specifically for obtaining the revised data that have encrypted, and having encrypted of will acquire is repaired
In data write-in block chain after just.
For the embodiment of the present application, by being verified to the signing messages that user inputs, when verification passes through, to data
It is modified, and revised data is written in block chain, i.e., user needs to sign using the code key of oneself before amendment
Name, so that SAAS application and block chain determine that the user possesses control to data, and amendment operation is user
The amendment operation for confirming and initiating.
Further, as shown in figure 3, the device 30 modified to the data in block chain further include: broadcast module
306, wherein
Broadcast module 306, for broadcasting the corresponding data mode of data before the data and amendment before amendment to area
Each super node in block chain, so that the status indicator of the data before amendment is nothing by each super node in block chain
Effect.
Wherein, the corresponding data mode of data before amendment is invalid state.
For the embodiment of the present application, after being modified the data after reading, by that will be stored in block chain
The status indicator of data before amendment be it is invalid, enable to using block chain data carry out corresponding operating when, read amendment
Data afterwards utilize the data stored into block chain to carry out phase without misreading the data before correcting so as to be promoted
The accuracy that should be operated, and then user experience can be promoted.
Further, as shown in figure 3, read module 301 comprises determining that unit 3011, reading unit 3012, wherein
Determination unit 3011, the reading instruction for being triggered based on user, determines data to be read.
Reading unit 3012, the data to be read determined for reading determination unit 3011 from block chain.
Specifically, deciphering module 302, specifically for obtaining the corresponding code key of data read.
Deciphering module 302 is specifically also used to that the data read are decrypted based on the code key got.
For the embodiment of the present application, by the data that are read from block chain using the secret key pair being locally stored local into
Row decryption, i.e., to the data after the code key being decrypted from the data of the reading in block chain, and decryption in tenant local
It is stored on computer, the operator so as to avoid data from being applied by SAAS obtains, and then can promote the safety of user.
Specifically, it is read from block chain specifically for the common recognition algorithm provided by common recognition mechanism read module 301
Data to be read.
Specifically, read module 301, read the super node of data to be read specifically for determining, and from super node
It is middle to read data to be read.
The embodiment of the present application provides the device that the data in a kind of pair of block chain are modified, compared with prior art,
Data to be read are read in the embodiment of the present application from block chain, and the data read are decrypted, then to decryption
Data afterwards are verified, and when carrying out verification failure to the data after decryption, push is directed to the check results of ciphertext data, needle
Check results to ciphertext data include: revised data, and then revised data are written in block chain.I.e. in this Shen
Please be in embodiment, when carrying out verification failure to the data read from block chain, push includes the verification of revised data
As a result, and by revised data block chain, modify so as to realize to the data stored in block chain.
The embodiment of the present application one can be performed to embodiment in the device modified to the data in block chain of the present embodiment
The method modified shown in four any embodiments to the data in block chain, realization principle is similar, no longer superfluous herein
It states.
Embodiment seven
The embodiment of the present application provides a kind of electronic equipment, as shown in figure 4, electronic equipment shown in Fig. 4 4000 includes: place
Manage device 4001 and memory 4003.Wherein, processor 4001 is connected with memory 4003, is such as connected by bus 4002.It is optional
Ground, electronic equipment 4000 can also include transceiver 4004.It should be noted that transceiver 4004 is not limited to one in practical application
A, the structure of the electronic equipment 4000 does not constitute the restriction to the embodiment of the present application.
Wherein, processor 4001 is applied in the embodiment of the present application, for realizing Fig. 2 or read module shown in Fig. 3,
Deciphering module, correction verification module, pushing module, the function of writing module and broadcast module shown in Fig. 3 function, transceiver
4004 include Receiver And Transmitter.
Processor 4001 can be CPU, general processor, DSP, ASIC, FPGA or other programmable logic device, crystalline substance
Body pipe logical device, hardware component or any combination thereof.It, which may be implemented or executes, combines described by present disclosure
Various illustrative logic blocks, module and circuit.Processor 4001 is also possible to realize the combination of computing function, such as wraps
It is combined containing one or more microprocessors, DSP and the combination of microprocessor etc..
Bus 4002 may include an access, and information is transmitted between said modules.Bus 4002 can be pci bus or
Eisa bus etc..Bus 4002 can be divided into address bus, data/address bus, control bus etc..Only to be used in Fig. 4 convenient for indicating
One thick line indicates, it is not intended that an only bus or a type of bus.
Memory 4003 can be ROM or can store the other kinds of static storage device of static information and instruction, RAM
Or the other kinds of dynamic memory of information and instruction can be stored, it is also possible to EEPROM, CD-ROM or other CDs
Storage, optical disc storage (including compression optical disc, laser disc, optical disc, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium
Or other magnetic storage apparatus or can be used in carry or store have instruction or data structure form desired program generation
Code and can by any other medium of computer access, but not limited to this.
Memory 4003 is used to store the application code for executing application scheme, and is held by processor 4001 to control
Row.Processor 4001 is for executing the application code stored in memory 4003, to realize Fig. 2 or embodiment illustrated in fig. 3
The movement of the device modified to the data in block chain provided.
The embodiment of the present application provides a kind of electronic equipment, compared with prior art, from block chain in the embodiment of the present application
It is middle to read data to be read, and the data read are decrypted, then the data after decryption are verified, when to solution
When data after close carry out verification failure, push is directed to the check results of ciphertext data, for the check results packet of ciphertext data
Include: then revised data revised data are written in block chain.I.e. in the embodiment of the present application, when to from block
When the data read in chain carry out verification failure, push includes the check results of revised data, and by revised data
In block chain, modify so as to realize to the data stored in block chain.
The embodiment of the present application provides a kind of electronic equipment suitable for above method any embodiment.Details are not described herein.
The embodiment of the present application provides a kind of computer readable storage medium, is stored on the computer readable storage medium
Computer program realizes method shown in embodiment one to example IV any embodiment when the program is executed by processor.
The embodiment of the present application provides a kind of computer readable storage medium, compared with prior art, the embodiment of the present application
In data to be read are read from block chain, and the data read are decrypted, then the data after decryption are carried out
Verification, when carrying out verification failure to the data after decryption, push is directed to the check results of ciphertext data, for ciphertext data
Check results include: revised data, and then revised data are written in block chain.I.e. in the embodiment of the present application,
When carrying out verification failure to the data read from block chain, push includes the check results of revised data, and will repair
In data block chain after just, modify so as to realize to the data stored in block chain.
The embodiment of the present application provides a kind of computer readable storage medium and is suitable for above method any embodiment.Herein
It repeats no more.
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other
At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (10)
1. the method that the data in a kind of pair of block chain are modified characterized by comprising
Data to be read are read from block chain, and the data read are decrypted;
Data after decryption are verified;
When carrying out verification failure to the data after decryption, push is directed to the check results of ciphertext data, described for decryption number
According to check results include: revised data;
It will be in the revised data write-in block chain.
2. the method according to claim 1, wherein the check results for ciphertext data further include following
At least one of:
Verify the data of failure;The reason of verification failure;
It will be in the revised data write-in block chain, comprising:
When detecting the edit operation instruction of user's triggering, the signing messages of user's input is obtained;
The signing messages of user's input is verified, and when verification passes through, block chain is written into the revised data
In.
3. according to the method described in claim 2, it is characterized in that, being verified to the signing messages of user's input, comprising:
Using the public key obtained, the signing messages of user's input is verified;
Revised data are written in block chain, comprising:
In the revised data write-in block chain encrypted that obtains the revised data encrypted, and will acquire.
4. according to the described in any item methods of claim 2-3, which is characterized in that modified data are written in block chain, it
Afterwards further include:
The corresponding data mode of data before data and the amendment before amendment is broadcasted each super into block chain
Node so that each super node in block chain by the status indicator of the data before amendment be it is invalid, before the amendment
The corresponding data mode of data is invalid state.
5. the method according to claim 1, wherein reading data to be read from block chain, comprising:
Reading instruction based on user's triggering, determines data to be read;
The data to be read are read from block chain;
The data read are decrypted, comprising:
The corresponding code key of the data read described in acquisition;
Based on the code key got, the data read are decrypted.
6. the method according to claim 1, wherein reading data to be read from block chain, comprising:
The common recognition algorithm provided by common recognition mechanism, reads the data to be read from block chain.
7. the method according to claim 1, wherein reading data to be read from block chain, comprising:
It determines the super node for reading the data to be read, and reads the data to be read from the super node.
8. the device that the data in a kind of pair of block chain are modified characterized by comprising
Read module, for reading data to be read from block chain;
Deciphering module, the data for reading to the read module are decrypted;
Correction verification module, for being verified to the data after deciphering module decryption;
Pushing module, for when the correction verification module carries out verification failure to the data after decryption, push to be directed to ciphertext data
Check results, the check results for ciphertext data include: revised data;
Writing module, the revised data for pushing the pushing module are written in block chain.
9. a kind of electronic equipment characterized by comprising
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and are configured
To be executed by one or more of processors, one or more of programs are configured to: executing -7 according to claim 1
The method modified described in one to the data in block chain.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The method that the data in described in any item pairs of block chains of claim 1-7 are modified is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810956191.7A CN109271559A (en) | 2018-08-21 | 2018-08-21 | It modifies method, apparatus and electronic equipment to data in block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810956191.7A CN109271559A (en) | 2018-08-21 | 2018-08-21 | It modifies method, apparatus and electronic equipment to data in block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109271559A true CN109271559A (en) | 2019-01-25 |
Family
ID=65154162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810956191.7A Pending CN109271559A (en) | 2018-08-21 | 2018-08-21 | It modifies method, apparatus and electronic equipment to data in block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109271559A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112100637A (en) * | 2020-09-29 | 2020-12-18 | 深圳壹账通智能科技有限公司 | Encryption method, device, equipment and medium based on correction quantity |
CN113783839A (en) * | 2021-08-06 | 2021-12-10 | 润联软件系统(深圳)有限公司 | Block chain data updating method and device, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391291A (en) * | 2017-03-24 | 2017-11-24 | 北京瑞卓喜投科技发展有限公司 | Modification block chain is the block chain corrigenda method and system for having block volume data |
CN107463597A (en) * | 2017-03-24 | 2017-12-12 | 北京瑞卓喜投科技发展有限公司 | For the passive verification method and system of the block chain for changing block volume data |
US20180039667A1 (en) * | 2016-08-05 | 2018-02-08 | Chicago Mercantile Exchange Inc. | Systems and methods for blockchain rule synchronization |
CN108133008A (en) * | 2017-12-22 | 2018-06-08 | 平安养老保险股份有限公司 | The processing method of business datum, device, equipment and storage medium in database |
CN108389129A (en) * | 2018-02-27 | 2018-08-10 | 阿里巴巴集团控股有限公司 | Transaction based on block chain executes method and device, electronic equipment |
-
2018
- 2018-08-21 CN CN201810956191.7A patent/CN109271559A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180039667A1 (en) * | 2016-08-05 | 2018-02-08 | Chicago Mercantile Exchange Inc. | Systems and methods for blockchain rule synchronization |
CN107391291A (en) * | 2017-03-24 | 2017-11-24 | 北京瑞卓喜投科技发展有限公司 | Modification block chain is the block chain corrigenda method and system for having block volume data |
CN107463597A (en) * | 2017-03-24 | 2017-12-12 | 北京瑞卓喜投科技发展有限公司 | For the passive verification method and system of the block chain for changing block volume data |
CN108133008A (en) * | 2017-12-22 | 2018-06-08 | 平安养老保险股份有限公司 | The processing method of business datum, device, equipment and storage medium in database |
CN108389129A (en) * | 2018-02-27 | 2018-08-10 | 阿里巴巴集团控股有限公司 | Transaction based on block chain executes method and device, electronic equipment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112100637A (en) * | 2020-09-29 | 2020-12-18 | 深圳壹账通智能科技有限公司 | Encryption method, device, equipment and medium based on correction quantity |
CN113783839A (en) * | 2021-08-06 | 2021-12-10 | 润联软件系统(深圳)有限公司 | Block chain data updating method and device, computer equipment and storage medium |
CN113783839B (en) * | 2021-08-06 | 2023-04-07 | 华润数字科技有限公司 | Block chain data updating method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9311487B2 (en) | Tampering monitoring system, management device, protection control module, and detection module | |
JP5731071B2 (en) | Two-dimensional code authentication device, two-dimensional code generation device, two-dimensional code authentication method, and program | |
CN101231622B (en) | Data storage method and equipment base on flash memory, as well as data fetch method and apparatu | |
CN103684782B (en) | The Activiation method of token device in a kind of token authentication system | |
CN104751337A (en) | Product anti-fake method, device and system | |
KR101942030B1 (en) | Electronic device for performing code-based encryption supporting integrity verification of a message and operating method thereof | |
CN106302544A (en) | A kind of safe verification method and system | |
CN109754226B (en) | Data management method, device and storage medium | |
CN102419809A (en) | Safe, efficient and universal method for proving original value of electronic document | |
CN110929291A (en) | Method and device for accessing text file and computer readable storage medium | |
US11409907B2 (en) | Methods and systems for cryptographically secured decentralized testing | |
KR101913644B1 (en) | Code-based encryption apparatus and method capable of message authentication | |
CN104756120A (en) | Storing and accessing data | |
CN109271559A (en) | It modifies method, apparatus and electronic equipment to data in block chain | |
CN103348625A (en) | Authenticator, authenticatee and authentication method | |
CN108764912A (en) | A kind of method of payment and device based on short message verification code | |
CN106372497A (en) | Application programming interface (API) protection method and device | |
CN110505185A (en) | Auth method, equipment and system | |
JP2010505169A5 (en) | ||
CN109981671A (en) | Data processing method and encryption equipment based on encryption equipment | |
US10223249B2 (en) | Test methodology for detection of unwanted cryptographic key destruction | |
CN112291067A (en) | Business operation record and operation verification method and device | |
CN109951416B (en) | Credible verification method and terminal | |
CN111143904A (en) | Data decryption method and device and computer readable storage medium | |
CN111355683A (en) | Method, device and storage medium for ensuring http data transmission safety |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |