CN109670321A - Date storage method, data query method and device - Google Patents

Date storage method, data query method and device Download PDF

Info

Publication number
CN109670321A
CN109670321A CN201811452495.6A CN201811452495A CN109670321A CN 109670321 A CN109670321 A CN 109670321A CN 201811452495 A CN201811452495 A CN 201811452495A CN 109670321 A CN109670321 A CN 109670321A
Authority
CN
China
Prior art keywords
data
block chain
chain node
block
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811452495.6A
Other languages
Chinese (zh)
Inventor
金玲玲
饶东升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lingtu Huishi Technology Co Ltd
Original Assignee
Shenzhen Lingtu Huishi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lingtu Huishi Technology Co Ltd filed Critical Shenzhen Lingtu Huishi Technology Co Ltd
Priority to CN201811452495.6A priority Critical patent/CN109670321A/en
Publication of CN109670321A publication Critical patent/CN109670321A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses date storage method, data query method and device, in the scheme of embodiments herein, user is uploaded or is inquired data by block chain node.On the one hand, it is stored in due to the data distribution formula of each block chain nodes sharing in the block chain of each block chain node maintenance, the data of deposit block chain are difficult to be tampered;On the other hand, block chain node encrypts data in storing data, other block chain nodes are wanted to obtain data, needs to verify the permission of itself by intelligent contract;Another aspect, block chain node is recorded the data with same identification information by same block in storing data, and the data of different identification information are recorded by different blocks, facilitates the management and inquiry of follow-up data.

Description

Date storage method, data query method and device
Technical field
This application involves information technology fields, in particular to date storage method, data query method and device.
Background technique
In the information age, as the value of data highlights further, more and more users want to share mutual data.Example Such as, consumer wishes to obtain the quality testing data of commodity, and businessman wishes to obtain the hobby data of consumer.Currently, generally by On the one hand data sharing platform receives and stores the data of user's upload, on the other hand provides a user data and look into as intermediary Service is ask, in this way, the data sharing between being achieved that user.Based on the prior art, safer and efficient number is needed According to storage method and data query method.
Summary of the invention
In view of problem above, the embodiment of the present invention provides date storage method, data query method and device, to solve Existing date storage method not can guarantee data safety and the low problem of efficiency data query.
The date storage method of embodiment according to the invention is applied to the first block chain node, comprising: will at least one number According to deposit memory pool, the data carry first identifier information;When meeting preset condition, collects and store in the memory pool Carry the data of the first identifier information;The data being collected into are encrypted to obtain encryption data;Added according to described Ciphertext data generates block and the block is sent to the second block chain node, so that each block chain node is total to the block After knowledge is verified, block chain end is added in the block.
The data query method of embodiment according to the invention is applied to the second block chain node, comprising: receives data and looks into Request is ask, the data inquiry request carries first identifier information;According to the data inquiry request, the first identifier is determined The encryption data recorded in the corresponding block of information and the block, the encryption data are the first block chain node according to taking What the data with the first identifier information were encrypted;By intelligent contract, judge that the second block chain node is It is no that there is the permission for decrypting the encryption data;If so, the encryption data is sent to described first by intelligent contract Block chain node so that the encryption data is decrypted in the first block chain node, and the data that decryption obtains is returned Back to the second block chain node;If it is not, refusing to send the encryption data to the first block chain node.
The data storage device of embodiment according to the invention is applied to the first block chain node, comprising: memory module, For an at least data to be stored in memory pool, the data carry first identifier information;Collection module, for when the default item of satisfaction When part, the data of the carrying first identifier information stored in the memory pool are collected;Encrypting module, for the collection To data encrypted to obtain encryption data;Generation module, for generating block according to the encryption data and by the area Block is sent to the second block chain node so that each block chain node to the block common recognition be verified after, by the block Block chain end is added.
The data query device of embodiment according to the invention is applied to the second block chain node, comprising: receiving module, Inquiry request for receiving data, the data inquiry request carry first identifier information;Determining module, for according to the number According to inquiry request, the encryption data recorded in the corresponding block of the first identifier information and the block is determined, it is described to add Ciphertext data is that the first block chain node is encrypted according to the data for carrying the first identifier information;Judgement processing mould Block, for judging whether the second block chain node has the permission for decrypting the encryption data by intelligent contract, if It is the encryption data to be then sent to by the first block chain node by intelligent contract, so that the first block chain link The encryption data is decrypted in point, and the data that decryption obtains are returned to the second block chain node, if it is not, refusal The encryption data is sent to the first block chain node.
The calculating equipment of embodiment according to the invention, including processor;And memory, it is stored thereon with executable finger It enables;Wherein, the processor is configured to execute the executable instruction to implement method above-mentioned.
The computer readable storage medium of embodiment according to the invention is stored thereon with computer program, the calculating Machine program includes executable instruction, when the executable instruction is executed by processor, implements method above-mentioned.
It can be seen from the above that in the scheme of the embodiment of the present invention, user uploaded by block chain node or Person inquires data.On the one hand, since the data distribution formula of each block chain nodes sharing is stored in the area of each block chain node maintenance In block chain, therefore the data for being stored in block chain are difficult to be tampered, and safety is higher;On the other hand, block chain node is in storage number According to when data are encrypted, other block chain nodes want obtain data, need to verify the permission of itself by intelligent contract, Data can just be checked by having the node with permission only;Another aspect, block chain node will have same mark in storing data The data of information are known by identical one or more block records, and the data of different identification information are remembered by different blocks Record, facilitates the management of follow-up data, when inquiring data, without traversing whole block chain, need to only find corresponding area Block, to improve the efficiency of inquiry.
Detailed description of the invention
Fig. 1 is date storage method one embodiment flow chart in the embodiment of the present application;
Fig. 2 is data query method one embodiment flow chart in the embodiment of the present application;
Fig. 3 is the architecture diagram of data storage and inquiry system in the embodiment of the present application;
Fig. 4 is data storage device one embodiment schematic diagram in the embodiment of the present application;
Fig. 5 is data query device one embodiment schematic diagram in the embodiment of the present application;
Fig. 6 is one embodiment structural schematic diagram that equipment is calculated in the embodiment of the present application.
Specific embodiment
Theme described herein is discussed referring now to example embodiment.It should be understood that discussing these embodiments only It is in order to enable those skilled in the art can better understand that being not to claim to realize theme described herein Protection scope, applicability or the exemplary limitation illustrated in book.It can be in the protection scope for not departing from present disclosure In the case of, the function and arrangement of the element discussed are changed.Each example can according to need, omit, substitute or Add various processes or component.For example, described method can be executed according to described order in a different order, with And each step can be added, omits or combine.In addition, feature described in relatively some examples is in other examples It can be combined.
As used in this article, term " includes " and its modification indicate open term, are meant that " including but not limited to ". Term "based" indicates " being based at least partially on ".Term " one embodiment " and " embodiment " expression " at least one implementation Example ".Term " another embodiment " expression " at least one other embodiment ".Term " first ", " second " etc. may refer to not Same or identical object, may refer to one or more objects.Here may include other definition, either specific to go back It is implicit.Unless clearly indicating in context, otherwise the definition of a term is consistent throughout the specification.
As stated in the background art, on the one hand existing data sharing platform can receive and store the number that each user uploads According on the other hand again to each user offer data query service.But this mode has two: first, due to each use The shared data in family transfer to the data sharing platform of centralization to store, if someone's malice distorts the data stored on platform, that The data that each user inquires from platform are exactly incredible;Second, data sharing platform usually simultaneously receive it is multiple The data inquiry request that user sends, and data sharing platform is limited to the processing capacity of data inquiry request, this has been resulted in User need wait in line, inquiry data take a long time, the efficiency for inquiring data is lower.
For this purpose, in this specification embodiment, first, forming block chain network, each block chain link by block chain node The shared data of point can be stored in the block chain that each block chain node is safeguarded respectively after each block chain node knows together verifying In, in this way, which the data for being stored in block chain are difficult to be tampered or lose.Second, block chain node is first right in storing data Data are encrypted, other block chain nodes are wanted to obtain data, are needed to verify the permission of itself by intelligent contract, are had tool only The node having permission can just check data.Third, if some block chain node is wanted to inquire other block chain nodes sharings Data, which can be (each by identification information-enquiry in the data of the block chain storage of oneself maintenance The data of the block chain storage of block chain node maintenance are synchronous), the efficiency for inquiring data is promoted.Four, block chain Node will be written in identical one or more blocks, by different marks in storing data with the data of same identification information The data for knowing information are written in different blocks, facilitate the management of follow-up data, whole without traversing when inquiring data Block chain only need to find corresponding block, to further improve the efficiency of inquiry.
In order to keep the technical solution of the application clearer, below in conjunction with concrete scene to provided by the embodiments of the present application Date storage method and data query method are introduced.
Fig. 1 is date storage method flow chart provided by the embodiments of the present application, and this method 100 is applied to the first block chain link Point, method 100 the following steps are included:
S102: an at least data are stored in memory pool, the data carry first identifier information;
Process shown in FIG. 1 is the process that the data of itself are stored in block chain by the first block chain node.
In the embodiment of the present application, block chain node can be server or terminal, specifically can be the number for sharing itself According to user server (below, the server that block chain node is also possible to the user of request inquiry data), or be The server of other users shared data.For example, the detection service mechanism for providing detection service wants will test report altogether It enjoys to other users, then the server of detection service mechanism can be used as block chain node access area block chain network.
In the embodiment of the present application, the data that the first block chain node can receive user or other block chain nodes upload, Then data are stored in memory pool.The number that first block chain node can receive multiple users simultaneously or block chain node uploads According to can receive user or one or more data that block chain node uploads, multiple data can be packaged while be uploaded to the firstth area Block chain node, can also successively upload.
In the embodiment of the present application, the data for being uploaded to the first block chain node carry identification information.The identification information The identity identification information intrinsic for object corresponding to data can be the category of user's self-setting either object itself Property information.Such as commodity sequence number, the corresponding commodity of each commodity sequence number, commodity sequence number are the identification letters of commodity Breath, which is identification information.When testing to a certain commodity, multiple detection datas may be obtained, then This multiple detection data carries the identification information of the commodity respectively.The for another example identity information of consumer, each identity information are corresponding One consumer, identity information are the identity identification informations of consumer, which is identification information.Certainly, which believes The intrinsic identity identification information of a class object corresponding to breath or data.For example, the company-information of commodity, same factory The data of the multiclass commodity of family carry the company-information respectively, then the company-information is identification information.
In the embodiment of the present application, data are stored in memory pool by the first block chain node, in a certain period of time, deposit Data in memory pool may include the A data for carrying first identifier information, B data, C data, and, carry the second mark Know D data, E data, the F data of information, certainly can also include the data for carrying other identifier information.
S104: when meeting preset condition, the number of the carrying first identifier information stored in the memory pool is collected According to.
In the embodiment of the present application, meeting preset condition includes in receiving preset instructions, reaching preset time or is described The quantity of the data stored in storage reaches preset threshold.
When it is implemented, the first block chain node can be referred to by meeting preset condition in some possible implementations It receives and uploads the preset instructions that the user of data sends, such as node uploads carrying first identifier letter to user in different times Multiple data of breath, after completion data upload, user sends the preset instructions for uploading and finishing to block chain node, the default finger Order may include first identifier information, to indicate that block chain node starts to collect the data for carrying first identifier information.Specifically, with Family can upload data to block chain node by client and send preset instructions.It is full in other possible implementations Sufficient preset condition, which can also be, reaches preset time, specifically can be block chain node and collects once every preset time, or The data that block chain node collects its upload after preset time are arranged in person, designated user.In other possible implementation In, meeting preset condition can also be that the quantity of the data stored in memory pool reaches preset threshold, can be same mark letter The quantity of the data of breath reaches preset threshold, and the quantity for being also possible to all data stored in memory pool reaches preset threshold.
S106: the data being collected into are encrypted to obtain encryption data.
In the embodiment of the present application, the first block chain node can carry out the data being collected into using symmetric encipherment algorithm Encryption.
S108: block is generated according to the encryption data and the block is sent to the second block chain node, so that respectively Block chain end is added after being verified to block common recognition, by the block in block chain node.
In the embodiment of the present application, generating block according to encryption data can specifically include: being generated and is added according to encryption data The cryptographic Hash of ciphertext data;The tree root cryptographic Hash of Merkel tree is calculated according to the cryptographic Hash of encryption data;According to first identifier information Generate the cryptographic Hash of first identifier information;Obtain the timestamp of current block;Obtain the corresponding cryptographic Hash of a upper block;By upper one The corresponding cryptographic Hash of block, the tree root cryptographic Hash of Merkel tree, the cryptographic Hash of first identifier information and the time of current block Stamp is arranged into the block head of current block, and encryption data is arranged into the block main body of current block.
When it is implemented, the corresponding cryptographic Hash of a upper block is by carrying out Hash meter to the data stored in a upper block Calculate acquisition.It specifically, include block head and block main body in a upper block, including the previous area of a upper block in block head The corresponding cryptographic Hash of tree root of the Merkel tree of the cryptographic Hash of block and a upper block, by the two cryptographic Hash using Hash calculation Obtain the corresponding cryptographic Hash of a block.
Current block includes block head and block main body, and the corresponding cryptographic Hash of a upper block is stored in block head, and And it is also stored in block head and generates the timestamp of current block and the tree root cryptographic Hash of Merkel tree, each leaf of Merkel tree Child node storage carries out the cryptographic Hash after Hash calculation to encryption data, and the root node storage encryption data of Merkel tree is corresponding Cryptographic Hash carries out total cryptographic Hash after adding up.Encryption data is stored in block main body.
In the embodiment of the present application, the second block chain node refers to other block chains other than the first block chain node Node will can specifically include in the block deposit block chain of generation: the block of generation be broadcast to the second block chain node;Respectively Block chain link point verifies block according to preset common recognition mechanism;Block chain end is added in the block being verified;It will The block chain of block chain progress each block chain node of broadcast synchronization.
In the embodiment of the present application, it if the data total size being collected into is more than the capacity of a block, can will collect To data be divided into more parts, every part of data sequentially generate a block respectively.In the embodiment of the present application, block chain may include Publicly-owned block chain, alliance's block chain or privately owned block chain.
In one embodiment, method 100 further include: the first identifier information and the area are established in concordance list The corresponding relationship of block.When it is implemented, the corresponding pass of first identifier information with the block Hash of block or block height can be established System.By establishing the corresponding relationship of first identifier information and block in concordance list, user is allow to pass through first identifier information Search corresponding block.Same data can carry multiple identification informations, and the first block chain node is according in multiple identification informations A certain identification information collect data generate block, the Hash of the multiple identification information is settable into the block, the area Block can establish index relative with the multiple identification information.
In another embodiment, method 100 further include: by intelligent contract, determine the data corresponding first Numerical value, first numerical value is for characterizing the increased numerical value into the account of the first block chain node;By intelligent contract, The node identification of the first block chain node and first numerical value are broadcasted, so that each block chain node is to described After node identification and first numerical value common recognition are verified, the node identification and first numerical value are stored in block chain. In the present embodiment, the first numerical value can actually be the remuneration or prize that block chain is write data into the first block chain node It encourages, the first numerical value needs to determine by intelligent contract, to prevent the first block chain node from fabricating the first numerical value without authorization.Different data The first different numerical value can be corresponded to, is provided previously according to needs among intelligent contract.
For example, the first block chain node can be the server of quality monitoring mechanism, and the second block chain node can be with The server of server, inspection mechanism including detection service mechanism, inspection mechanism send article to be detected to detection service machine Structure is detected, detection service mechanism treat detection article detected after, will test result (data i.e. in the application) hair It send to quality monitoring mechanism, result deposit block chain will test by quality monitoring mechanism, the block chain distributed storage is in quality It in the server of regulatory agency, detection service mechanism and inspection mechanism and synchronizes, the server of quality monitoring mechanism provides The testing result of each detection service mechanism is stored in the function of block chain, therefore a testing result of every deposit, quality monitoring Mechanism can collect certain formality expense, which is the first numerical value, and intelligent contract can be by quality monitoring mechanism It determines or is determined jointly by quality monitoring mechanism and detection service mechanism.According to trigger condition, (testing result is stored in intelligent contract Block chain) automatic execute increase to the first numerical value (service charge) in the account of the first block chain node (quality monitoring mechanism), And it is recorded in the form of block in block chain.
In other examples, the first block chain node is also possible to the server of detection service mechanism, the second block chain node For the server of inspection mechanism, the examining report deposit block chain of article to be detected can then be collected detection by detection service device mechanism Take, then check fee is the first numerical value at this time, and intelligent contract can be determined jointly by detection service mechanism and inspection mechanism.Intelligence First numerical value (check fee) is increased to the first block according to trigger condition (testing result is stored in block chain) automatic execute by contract In the account of chain node (detection service mechanism), and it is recorded in block chain in the form of block.
It should be noted that the first block chain node can also be when generating block according to encryption data by the node of itself Mark, the first numerical value and encryption data generate block together, and the block of generation is broadcast to the second block chain link point and is total to Verifying is known, if the remaining sum being equivalent in the account of the first block chain node increases by common recognition verifying.
In yet another embodiment, method 100 further include: receive the second block chain node and trigger intelligent contract hair The encryption data sent, the intelligence contract are used to judge whether the second block chain node to have the decryption encryption data Permission;The encryption data is decrypted, and the data that decryption obtains are returned into the second block chain node.In this Shen It please judge whether the second block chain node has the permission for decrypting the encryption data, node can be passed through in embodiment Mapping relations between mark and decrypted rights determine whether the second block chain node has the decryption ciphertext data Permission, the mapping relations can provide among intelligent contract previously according to needs.Second block chain node can be by searching for area Block chain obtains the encryption data, if the second block chain node has decrypted rights, is sent out encryption data by intelligent contract It sending to the first block chain node, the first block chain node uses key pair encryption data used when encryption data to be decrypted, And the data that decryption obtains are returned into the second block chain node.
Fig. 2 is data query method flow diagram provided by the embodiments of the present application, and this method 200 is applied to the second block chain link Point, method includes the following steps:
S202: receiving data inquiry request, and the data inquiry request carries first identifier information.
Process shown in Fig. 2 is the process of the data in the second block chain node interrogation zone block chain, the second block chain node The data of inquiry are usually deposit block chain in process shown in Fig. 1.
Data inquiry request can be sent to the second block chain node by client by user.
S204: according to the data inquiry request, the corresponding block of the first identifier information and the block are determined The encryption data of middle record, the encryption data be the first block chain node according to carry the data of the first identifier information into Row encryption obtains.
In the embodiment of the present application, the corresponding block of the first identifier information, the index can be determined by concordance list Table includes the corresponding relationship between the block of the data of the first identifier information and the record carrying first identifier information.It should Corresponding relationship can be first identifier information and block-identified corresponding relationship, and block-identified includes that block Hash or block are high Degree, block chain node can be according to first identifier information index to corresponding block.
In the embodiment of the present application, same data can carry multiple identification informations, and the first block chain node is according to multiple marks Know a certain identification information in information and collect data generation block, the Hash of the multiple identification information is settable to arrive the block In, which can establish index relative with the multiple identification information.One or more can be indexed by an identification information Block can index same block by different identification informations.For example, the producer can be indexed not by company-information Corresponding multiple blocks with commodity can index the wherein corresponding block of a certain commodity by commodity sequence number.
In the embodiment of the present application, encryption data is the first block chain node in the number that will carry the first identifier information According to what is encrypted before deposit block chain to the data, the first block chain node can be using symmetric encipherment algorithm to carrying The data of the first identifier information are encrypted.
S206: by intelligent contract, judge whether the second block chain node has the power for decrypting the encryption data Otherwise limit, executes step S210 if so, thening follow the steps S208.
In the embodiment of the present application, judge whether the second block chain node has the power for decrypting the encryption data Limit, can determine whether the second block chain node has decryption by the mapping relations between node identification and decrypted rights The permission of the ciphertext data, the mapping relations can provide among intelligent contract previously according to needs.For example, inspection mechanism Article to be detected is usually sent to detection service mechanism B1 and is detected by A1, and inspection mechanism A2 usually by article to be detected send to Detection service mechanism B2 is detected, then the service of inspection mechanism A1 and detection service mechanism B1 can be provided in intelligent contract The decrypted rights of detection data of the device with decryption detection service mechanism B1, and the clothes of inspection mechanism A2 and detection service mechanism B2 Business device does not have the decrypted rights of the detection data of decryption detection service device mechanism B1 then, and vice versa.
S208: by intelligent contract, the encryption data is sent to the first block chain node.
If the second block chain node has permission decryption encryption data, the second block chain node can pass through intelligent contract Encryption data is sent to the first block chain node, so that encryption data is decrypted in the first block chain node, and will decryption Obtained data return to the second block chain node.In this way, the second block chain node just got it is bright required for it Literary data.
S210: refuse to send the encryption data to the first block chain node.
In one embodiment, method 200 further include: decrypt the encryption number when the second block chain node has According to permission when, by intelligent contract, determine the corresponding second value of data that the first block chain node returns, pass through intelligence Energy contract, the node identification of the second block chain node and the second value is broadcasted, so that each block chain node After being verified to the node identification and second value common recognition, the node identification and the second value are stored in Block chain.
In the embodiment of the present application, the second value is reduced from the account of the second block chain node for characterizing Numerical value.That is, the second value can be considered as the expense that the second block chain node is paid because inquiring the data. The corresponding second value of data is also required to determine by intelligent contract.The expense of second block chain node expenditure can be from its account Remaining sum in deduct, expense deduction can be equally recorded in block chain in the form of block.As it can be seen that not only being stored on block chain Shared data, also publicity upload data or obtain the various incomes of data or the record of expenditure.
In another embodiment, method 200 further include: decrypt the encryption when the second block chain node has When the permission of data, by intelligent contract, determines the corresponding third value of data that the first block chain node returns, pass through Intelligent contract broadcasts the node identification of the first block chain node and the third value, so that each block chain link Point deposits the node identification and the second value after being verified to the node identification and third value common recognition Enter block chain.
In the embodiment of the present application, the third value increases for characterizing into the account of the first block chain node Numerical value.That is, the first block chain link when the third value can be considered as data described in the second block chain querying node The taken in expense of point, or can be considered the expense that the first block chain node is taken in by the second block chain node decryption encryption data With.Since usual encryption data is uploaded by the first block chain node, so third value can also be considered as the first block chain link The remuneration that the data that point itself is shared are obtained because being queried.
Pass through date storage method shown in FIG. 1 and data query method shown in Fig. 2, it is seen that: first, passing through block chain Node forms block chain network, and the data of each block chain nodes sharing can be after each block chain node knows together verifying, deposit In the block chain that each block chain node is safeguarded respectively, in this way, which the data for being stored in block chain are difficult to be tampered or lose.Its Two, block chain node first encrypts data in storing data, other block chain nodes are wanted to obtain data, needs to pass through Intelligent contract verifies the permission of itself, and data can just be checked by having the node with permission only.If third, some block chain link Point is wanted to inquire the data of other block chain nodes sharings, which can be in the number of the block chain storage of oneself maintenance In by identification information-enquiry can (data of the block chain of each block chain node maintenance storage are synchronous), inquire data Efficiency promoted.Four, block chain node is identical by being written with the data of same identification information in storing data In one or more blocks, the data of different identification information are written in different blocks, facilitate the management of follow-up data, right When data are inquired, without traversing whole block chain, corresponding block only need to be found, to further improve inquiry Efficiency.
Fig. 3 is the architecture diagram of data storage and inquiry system provided by the embodiments of the present application.As shown in figure 3, system 300 is wrapped Server 302, server 304 and server 306 are included, server 302 is the first block chain node, server 304 and server 306 be the second block chain node, and the first block chain node and the second block chain node form block chain network, and each server is total With maintenance block chain, the first block chain node storing data, the second block chain node can be looked into block chain from block chain Ask data.Because the block that storing data or inquiry data generate need to be tested through each block chain link point according to preset common recognition mechanism Card.It should be understood that, the data of the block chain node in Fig. 3 are only schematical, according to actual needs, can have any The block chain node of quantity, it is of course possible to which there is any number of first block chain node and the second block chain node.In addition, the The role of one block chain node and the second block chain node is interchangeable.
Based on date storage method shown in FIG. 1, the embodiment of the present application also correspondence provides a kind of data storage device, under Face will be introduced data storage device provided by the embodiments of the present application from the angle of function modoularization.
Fig. 4 is one embodiment schematic diagram of data storage device in the embodiment of the present application, which can use soft The mode of part, hardware or software and hardware combining is realized.Since the embodiment of device 400 is substantially similar to the embodiment of method, institute To describe fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Fig. 4 is referred to, device 400 includes depositing Store up module 402, collection module 404, encrypting module 406 and generation module 408.Memory module 402 will be for will at least a data deposit Enter memory pool, the data carry first identifier information.Collection module 404 is used for when meeting preset condition, is collected in described Deposit the data of the carrying first identifier information stored in pond.Encrypting module 406 is used to carry out the data being collected into Encryption obtains encryption data.Generation module 408 is used to generate block according to the encryption data and the block is sent to the Two block chain nodes, so that block chain is added after being verified to block common recognition, by the block in each block chain node End.
In one aspect, the preset condition that meets includes receiving preset instructions, reaching preset time or the memory The quantity of the data stored in pond reaches preset threshold.
On the other hand, device 400 further includes establishing module.Module is established for establishing described first in concordance list The corresponding relationship of identification information and the block.
In yet another aspect, device 400 further includes processing module.Processing module is used for through intelligent contract, determine described in Corresponding first numerical value of data, first numerical value is for characterizing the increased number into the account of the first block chain node Value;By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that each area Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described first Numerical value is stored in block chain.
In another aspect, device 400 further includes deciphering module.Deciphering module is for receiving the second block chain node The encryption data that intelligent contract is sent is triggered, the encryption data is decrypted, and the data that decryption obtains are returned into institute State the second block chain node.Wherein, the intelligent contract is for judging whether the second block chain node has described in decryption The permission of encryption data.
Based on data query method shown in Fig. 2, the embodiment of the present application also correspondence provides a kind of data query device, under Face will be introduced data query device provided by the embodiments of the present application from the angle of function modoularization.
Fig. 5 is one embodiment schematic diagram of data query device in the embodiment of the present application, which can use soft The mode of part, hardware or software and hardware combining is realized.Since the embodiment of device 500 is substantially similar to the embodiment of method, institute To describe fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Fig. 5 is referred to, device 500 includes connecing Receive module 502, determining module 504 and judging treatmenting module 506.The inquiry request for receiving data of receiving module 502, the number First identifier information is carried according to inquiry request.Determining module 504 is used to determine first mark according to the data inquiry request Know the encryption data recorded in the corresponding block of information and the block, the encryption data be the first block chain node according to Carry what the data of the first identifier information were encrypted.Judging treatmenting module 506 is used for through intelligent contract, judgement Whether the second block chain node has the permission for decrypting the encryption data;If so, described will be added by intelligent contract Ciphertext data is sent to the first block chain node, so that the encryption data is decrypted in the first block chain node, And the data that decryption obtains are returned into the second block chain node;If it is not, refusing to send to the first block chain node The encryption data.
In one aspect, device 500 further includes first processing module.First processing module is used to work as the second block chain When node has the permission for decrypting the encryption data, by intelligent contract, the number that the first block chain node returns is determined According to corresponding second value, the second value is for characterizing the numerical value reduced from the account of the second block chain node; By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that each block Chain node is after being verified the node identification and second value common recognition, by the node identification and second number Value deposit block chain.
In one aspect, device 500 further includes Second processing module.Second processing module is used to work as the second block chain When node has the permission for decrypting the encryption data, by intelligent contract, the number that the first block chain node returns is determined According to corresponding third value, the third value is for characterizing the increased numerical value into the account of the first block chain node; By intelligent contract, the node identification of the first block chain node and the third value are broadcasted, so that each block Chain node is after being verified the node identification and third value common recognition, by the node identification and second number Value deposit block chain.
Above embodiments are that device provided by the embodiments of the present application is introduced from the angle of function modoularization, below will Device provided by the embodiments of the present application is illustrated from the angle of hardware entities.
In the embodiment of the present application, a kind of calculating equipment is also provided, which may include processor and be used for Store the memory of the executable instruction of the processor.Wherein, the processor is configured to via the execution executable finger The step of enabling to execute the storage of the data in any one above-mentioned embodiment or querying method.
Person of ordinary skill in the field it is understood that various aspects of the disclosure can be implemented as system, method or Program product.Therefore, various aspects of the disclosure can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
Calculating equipment according to an embodiment of the present application is described referring to Fig. 6.For ease of description, illustrate only with The relevant part of the embodiment of the present application, it is disclosed by specific technical details, please refer to the embodiment of the present application method part.
It is showed in the form of universal computing device as shown in fig. 6, calculating equipment 600.Calculating equipment 600 may include processing Device 602 and memory 604, wherein be stored with executable instruction on memory 604, wherein the executable instruction, which is worked as, to be performed When make processor 602 execute in any one above-mentioned embodiment data storage or querying method.
As shown in fig. 6, calculating equipment 600 can also include connecting different system components (including processor 602 and memory 604) bus 606.Bus 606 indicates one of a few class bus structures or a variety of, including memory bus or memory Controller, peripheral bus, graphics acceleration port, processor or the local using any bus structures in a variety of bus structures Bus.For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel system knot Structure (MAC) bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) Bus.
It calculates equipment 600 and typically comprises a variety of computer system readable media.These media can be it is any can be by Calculate the usable medium that equipment 600 accesses, including volatile and non-volatile media, moveable and immovable medium.
Memory 604 may include the computer system readable media of form of volatile memory, such as arbitrary access is deposited Reservoir (RAM) 608 and and/or cache memory 610.Calculate equipment 600 may further include it is other it is removable/can not Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 612 can be used for reading and writing not Movably, non-volatile magnetic media (Fig. 6 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 6 The disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") is provided, and non-volatile to moving The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving Device can be connected by one or more data media interfaces with bus 606.Memory 604 may include at least one program Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform above-mentioned Data storage or querying method in one embodiment of anticipating.
Program/utility 614 with one group of (at least one) program module 616, can store in such as memory In 604, such program module 616 includes but is not limited to operating system, one or more application program, other program modules And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 616 Usually execute data storage or the querying method in any one above-mentioned embodiment.
Calculating equipment 600 can also be with one or more external equipments 622 (such as keyboard, sensing equipment, display 624 Deng) communication, can also be enabled a user to one or more equipment interact with the calculating equipment 600 communicate, and/or with make Any equipment (such as network interface card, the modem that the calculating equipment 600 can be communicated with one or more of the other calculating equipment Etc.) communication.This communication can be carried out by input/output (I/O) interface 618.Also, calculating equipment 600 can also lead to Cross network adapter 620 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, example Such as internet) communication.As shown, network adapter 620 is communicated by bus 606 with the other modules for calculating equipment 600.It answers When understanding, although not shown in the drawings, other hardware and/or software module can be used in conjunction with equipment 600 is calculated, including but unlimited In: microcode, device driver, redundant processor, external disk drive array, RAID system, tape drive and data Backup storage system etc..
Program of the processor 602 by operation storage in the memory 604, thereby executing various function application and data Processing, such as realize data storage or querying method in any one above-mentioned embodiment.
A kind of computer readable storage medium is also provided in the embodiment of the present application, is stored thereon with computer program, it is described Computer program includes executable instruction, when the executable instruction is executed by processor, implements any one above-mentioned embodiment In data storage or the step of querying method.In some possible embodiments, various aspects of the disclosure can also be real It is now a kind of form of program product comprising program code, when described program product is run on the terminal device, the journey Sequence code be used for make the terminal device execute this specification data storage or querying method described in it is each according to the disclosure The step of kind exemplary embodiment.
Program product according to an embodiment of the present disclosure for realizing the above method can be using portable compact disc only It reads memory (CD-ROM) and including program code, and can be run on terminal device, such as PC.However, this public affairs The program product opened is without being limited thereto, and in this document, readable storage medium storing program for executing can be any tangible Jie for including or store program Matter, the program can be commanded execution system, device or device use or in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
The specific embodiment illustrated above in conjunction with attached drawing describes exemplary embodiment, it is not intended that may be implemented Or fall into all embodiments of the protection scope of claims." exemplary " meaning of the term used in entire this specification Taste " be used as example, example or illustration ", be not meant to than other embodiments " preferably " or " there is advantage ".For offer pair The purpose of the understanding of described technology, specific embodiment include detail.However, it is possible in these no details In the case of implement these technologies.In some instances, public in order to avoid the concept to described embodiment causes indigestion The construction and device known is shown in block diagram form.
The foregoing description of present disclosure is provided so that any those of ordinary skill in this field can be realized or make Use present disclosure.To those skilled in the art, the various modifications carried out to present disclosure are apparent , also, can also answer generic principles defined herein in the case where not departing from the protection scope of present disclosure For other modifications.Therefore, present disclosure is not limited to examples described herein and design, but disclosed herein with meeting Principle and novel features widest scope it is consistent.

Claims (11)

1. date storage method is applied to the first block chain node, comprising:
An at least data are stored in memory pool, the data carry first identifier information;
When meeting preset condition, the data of the carrying first identifier information stored in the memory pool are collected;
The data being collected into are encrypted to obtain encryption data;
Block is generated according to the encryption data and the block is sent to the second block chain node, so that each block chain node After being verified to block common recognition, block chain end is added in the block.
2. according to the method described in claim 1, wherein,
It is described meet preset condition include receive preset instructions, reach preset time or the memory pool in the data that store Quantity reaches preset threshold.
3. method according to claim 1 or 2, wherein the method also includes:
By intelligent contract, corresponding first numerical value of the data is determined, first numerical value is for characterizing to firstth area Increased numerical value in the account of block chain node;
By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that respectively Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described the One numerical value is stored in block chain.
4. method according to claim 1 or 2, wherein the method also includes:
It receives the second block chain node and triggers the encryption data that intelligent contract is sent, the intelligence contract is described for judging Whether the second block chain node has the permission for decrypting the encryption data;
The encryption data is decrypted, and the data that decryption obtains are returned into the second block chain node.
5. data query method is applied to the second block chain node, comprising:
Data inquiry request is received, the data inquiry request carries first identifier information;
According to the data inquiry request, determine that is recorded in the corresponding block of the first identifier information and the block adds Ciphertext data, the encryption data are that the first block chain node is encrypted to obtain according to the data for carrying the first identifier information 's;
By intelligent contract, judge whether the second block chain node has the permission for decrypting the encryption data;
If so, the encryption data is sent to the first block chain node by intelligent contract, so that firstth area The encryption data is decrypted in block chain node, and the data that decryption obtains are returned to the second block chain node;
If it is not, refusing to send the encryption data to the first block chain node.
6. according to the method described in claim 5, wherein, decrypting the encryption data when the second block chain node has When permission, the method also includes:
By intelligent contract, the corresponding second value of data that the first block chain node returns, the second value are determined For characterizing the numerical value reduced from the account of the second block chain node;
By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that respectively Block chain node is after being verified the node identification and second value common recognition, by the node identification and described the Two numerical value are stored in block chain.
7. according to the method described in claim 5, wherein, decrypting the encryption data when the second block chain node has When permission, the method also includes:
By intelligent contract, the corresponding third value of data that the first block chain node returns, the third value are determined For characterizing the increased numerical value into the account of the first block chain node;
By intelligent contract, the node identification of the first block chain node and the third value are broadcasted, so that respectively Block chain node is after being verified the node identification and third value common recognition, by the node identification and described the Two numerical value are stored in block chain.
8. data storage device is applied to the first block chain node, comprising:
Memory module, for an at least data to be stored in memory pool, the data carry first identifier information;
Collection module, for when meeting preset condition, collecting the carrying first identifier information stored in the memory pool Data;
Encrypting module, for being encrypted to obtain encryption data to the data being collected into;
Generation module, for generating block according to the encryption data and the block being sent to the second block chain node, with Make each block chain node after being verified to block common recognition, block chain end is added in the block.
9. data query device is applied to the second block chain node, comprising:
Receiving module, inquiry request, the data inquiry request carry first identifier information for receiving data;
Determining module, for according to the data inquiry request, determining the corresponding block of the first identifier information and described The encryption data recorded in block, the encryption data are the first block chain node according to the number for carrying the first identifier information According to what is encrypted;
Judging treatmenting module, for judging whether the second block chain node has the decryption encryption by intelligent contract The permission of data;If so, the encryption data is sent to the first block chain node by intelligent contract, so that described The encryption data is decrypted in first block chain node, and the data that decryption obtains are returned to the second block chain link Point;If it is not, refusing to send the encryption data to the first block chain node.
10. calculating equipment, comprising:
Processor;And
Memory is stored thereon with executable instruction;
Wherein, the processor is configured to execute the executable instruction to implement side as claimed in any one of claims 1 to 6 Method.
11. computer readable storage medium is stored thereon with computer program, the computer program includes executable instruction, When the executable instruction is executed by processor, implement as the method according to claim 1 to 6.
CN201811452495.6A 2018-11-30 2018-11-30 Date storage method, data query method and device Pending CN109670321A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811452495.6A CN109670321A (en) 2018-11-30 2018-11-30 Date storage method, data query method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811452495.6A CN109670321A (en) 2018-11-30 2018-11-30 Date storage method, data query method and device

Publications (1)

Publication Number Publication Date
CN109670321A true CN109670321A (en) 2019-04-23

Family

ID=66143424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811452495.6A Pending CN109670321A (en) 2018-11-30 2018-11-30 Date storage method, data query method and device

Country Status (1)

Country Link
CN (1) CN109670321A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035130A (en) * 2019-04-24 2019-07-19 中国联合网络通信集团有限公司 A kind of data processing method and device
CN110188546A (en) * 2019-04-26 2019-08-30 特斯联(北京)科技有限公司 A kind of teaching resource management method based on information bank platform
CN110300170A (en) * 2019-06-28 2019-10-01 杭州复杂美科技有限公司 Block chain distributed storage method for down loading, equipment and storage medium
CN110532801A (en) * 2019-08-29 2019-12-03 深圳市网心科技有限公司 Communication means, device, client and storage medium based on multi-tiling interchain
CN110688261A (en) * 2019-11-13 2020-01-14 杭州新链科技有限公司 Heterogeneous electronic file cloud disaster recovery system based on block chain
CN110825809A (en) * 2019-10-25 2020-02-21 嘉兴太美医疗科技有限公司 Storage method and device for drug response information
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN110990883A (en) * 2019-11-22 2020-04-10 金蝶软件(中国)有限公司 Data access method, data access device, computer-readable storage medium and computer equipment
CN110990853A (en) * 2019-11-29 2020-04-10 天津市滨海新区信息技术创新中心 Dynamic heterogeneous redundant data access protection method and device
CN111031036A (en) * 2019-12-12 2020-04-17 深圳大学 Block chain-based vaccine information monitoring method and device and computer equipment
CN111526180A (en) * 2020-03-30 2020-08-11 中国建设银行股份有限公司 Data sharing method and device
CN111666507A (en) * 2020-05-28 2020-09-15 中国工商银行股份有限公司 Individual track retrieval system and method based on block chain
CN111936995A (en) * 2020-06-08 2020-11-13 支付宝实验室(新加坡)有限公司 Distributed storage of customs clearance data
CN112115498A (en) * 2020-09-28 2020-12-22 上海申铁信息工程有限公司 Block chain-based data access authority control method and device
WO2021012746A1 (en) * 2019-07-24 2021-01-28 深圳壹账通智能科技有限公司 Blockchain-based data encryption method and apparatus, electronic device and storage medium
CN112328663A (en) * 2020-11-24 2021-02-05 深圳市鹰硕技术有限公司 Data discovery method and system applied to big data
CN112446035A (en) * 2019-09-05 2021-03-05 阿里健康科技(中国)有限公司 Data management method and device
CN112988891A (en) * 2021-03-11 2021-06-18 重庆文理学院 Method and device for storing block chain account book, electronic equipment and storage medium
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device
CN113256424A (en) * 2021-06-15 2021-08-13 腾讯科技(深圳)有限公司 Transaction data processing method, device, equipment and storage medium
CN113542199A (en) * 2020-04-17 2021-10-22 海信集团有限公司 Network security state evaluation method and server
CN113535854A (en) * 2021-07-28 2021-10-22 深圳创维-Rgb电子有限公司 Block chain-based user data processing method and device and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
US20170372300A1 (en) * 2016-06-24 2017-12-28 PokitDok, Inc. System and method for cryptographically verified data driven contracts
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170372300A1 (en) * 2016-06-24 2017-12-28 PokitDok, Inc. System and method for cryptographically verified data driven contracts
CN107294709A (en) * 2017-06-27 2017-10-24 阿里巴巴集团控股有限公司 A kind of block chain data processing method, apparatus and system
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035130B (en) * 2019-04-24 2021-07-13 中国联合网络通信集团有限公司 Data processing method and device
CN110035130A (en) * 2019-04-24 2019-07-19 中国联合网络通信集团有限公司 A kind of data processing method and device
CN110188546B (en) * 2019-04-26 2020-07-10 特斯联(北京)科技有限公司 Teaching resource management method based on information base platform
CN110188546A (en) * 2019-04-26 2019-08-30 特斯联(北京)科技有限公司 A kind of teaching resource management method based on information bank platform
CN110300170A (en) * 2019-06-28 2019-10-01 杭州复杂美科技有限公司 Block chain distributed storage method for down loading, equipment and storage medium
WO2021012746A1 (en) * 2019-07-24 2021-01-28 深圳壹账通智能科技有限公司 Blockchain-based data encryption method and apparatus, electronic device and storage medium
CN110532801A (en) * 2019-08-29 2019-12-03 深圳市网心科技有限公司 Communication means, device, client and storage medium based on multi-tiling interchain
CN112446035A (en) * 2019-09-05 2021-03-05 阿里健康科技(中国)有限公司 Data management method and device
CN110825809A (en) * 2019-10-25 2020-02-21 嘉兴太美医疗科技有限公司 Storage method and device for drug response information
CN110688261A (en) * 2019-11-13 2020-01-14 杭州新链科技有限公司 Heterogeneous electronic file cloud disaster recovery system based on block chain
CN110990883A (en) * 2019-11-22 2020-04-10 金蝶软件(中国)有限公司 Data access method, data access device, computer-readable storage medium and computer equipment
CN110929229A (en) * 2019-11-26 2020-03-27 中国石油大学(华东) Block chain-based office document credibility verification method and system
CN110990853A (en) * 2019-11-29 2020-04-10 天津市滨海新区信息技术创新中心 Dynamic heterogeneous redundant data access protection method and device
CN110990853B (en) * 2019-11-29 2022-05-06 天津市滨海新区信息技术创新中心 Dynamic heterogeneous redundant data access protection method and device
CN111031036A (en) * 2019-12-12 2020-04-17 深圳大学 Block chain-based vaccine information monitoring method and device and computer equipment
CN111526180A (en) * 2020-03-30 2020-08-11 中国建设银行股份有限公司 Data sharing method and device
CN111526180B (en) * 2020-03-30 2022-05-24 中国建设银行股份有限公司 Data sharing method and device
CN113542199A (en) * 2020-04-17 2021-10-22 海信集团有限公司 Network security state evaluation method and server
CN111666507B (en) * 2020-05-28 2023-10-20 中国工商银行股份有限公司 Personal track retrieval system and method based on block chain
CN111666507A (en) * 2020-05-28 2020-09-15 中国工商银行股份有限公司 Individual track retrieval system and method based on block chain
CN111936995A (en) * 2020-06-08 2020-11-13 支付宝实验室(新加坡)有限公司 Distributed storage of customs clearance data
CN112115498A (en) * 2020-09-28 2020-12-22 上海申铁信息工程有限公司 Block chain-based data access authority control method and device
CN112115498B (en) * 2020-09-28 2023-12-01 上海申铁信息工程有限公司 Data access authority control method and device based on blockchain
CN112328663A (en) * 2020-11-24 2021-02-05 深圳市鹰硕技术有限公司 Data discovery method and system applied to big data
CN112988891A (en) * 2021-03-11 2021-06-18 重庆文理学院 Method and device for storing block chain account book, electronic equipment and storage medium
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device
CN113052721B (en) * 2021-03-18 2024-04-30 国网北京市电力公司 Power data processing method and device
CN113256424B (en) * 2021-06-15 2021-09-24 腾讯科技(深圳)有限公司 Transaction data processing method, device, equipment and storage medium
CN113256424A (en) * 2021-06-15 2021-08-13 腾讯科技(深圳)有限公司 Transaction data processing method, device, equipment and storage medium
CN113535854A (en) * 2021-07-28 2021-10-22 深圳创维-Rgb电子有限公司 Block chain-based user data processing method and device and readable storage medium

Similar Documents

Publication Publication Date Title
CN109670321A (en) Date storage method, data query method and device
CN110033258B (en) Service data encryption method and device based on block chain
CN106127075B (en) Encryption method can search for based on secret protection under a kind of cloud storage environment
CN110827028B (en) Block chain-based data acquisition transaction system and method
CN112132198B (en) Data processing method, device and system and server
CN109669943A (en) Date storage method, data query method and device
WO2020156088A1 (en) Blockchain-based information interaction method, blockchain node and credit reporting system
CN109255255A (en) Data processing method, device, equipment and storage medium based on block chain
CN107862215A (en) A kind of date storage method, data query method and device
CN105635168B (en) A kind of application method of offline transaction device and its security key
CN111723060B (en) Blacklist data sharing method and system based on blockchain
CN112527873B (en) Big data management application system based on chain number cube
CN103324671A (en) Information memorization and management method and device based on Webkit browser
CN105007301A (en) Electronic evidence processing system and method based on social platform
CN112801827A (en) Intellectual property management system based on block chain
CN108038128A (en) A kind of search method, system, terminal device and storage medium for encrypting file
KR20130024144A (en) Weighted keyword searching method for perserving privacy, and apparatus thereof
Zhu et al. Blockchain technology in internet of things
CN109255250A (en) A kind of data safety encryption device and application method based on alliance's chain
CN116777476A (en) Medicine credible tracing method based on public key searchable encryption
Su et al. BDTF: A blockchain-based data trading framework with trusted execution environment
CN109146683A (en) A kind of information management and Verification System using block chain
CN110213202A (en) Mark encryption matching process and device, identification processing method and device
CN114363089A (en) Block chain-based network edge terminal data sharing method and model
CN108090371B (en) Data processing method, data tracking method, data processing device and data tracking device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190423

RJ01 Rejection of invention patent application after publication