CN109670321A - Date storage method, data query method and device - Google Patents
Date storage method, data query method and device Download PDFInfo
- Publication number
- CN109670321A CN109670321A CN201811452495.6A CN201811452495A CN109670321A CN 109670321 A CN109670321 A CN 109670321A CN 201811452495 A CN201811452495 A CN 201811452495A CN 109670321 A CN109670321 A CN 109670321A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- chain node
- block
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses date storage method, data query method and device, in the scheme of embodiments herein, user is uploaded or is inquired data by block chain node.On the one hand, it is stored in due to the data distribution formula of each block chain nodes sharing in the block chain of each block chain node maintenance, the data of deposit block chain are difficult to be tampered;On the other hand, block chain node encrypts data in storing data, other block chain nodes are wanted to obtain data, needs to verify the permission of itself by intelligent contract;Another aspect, block chain node is recorded the data with same identification information by same block in storing data, and the data of different identification information are recorded by different blocks, facilitates the management and inquiry of follow-up data.
Description
Technical field
This application involves information technology fields, in particular to date storage method, data query method and device.
Background technique
In the information age, as the value of data highlights further, more and more users want to share mutual data.Example
Such as, consumer wishes to obtain the quality testing data of commodity, and businessman wishes to obtain the hobby data of consumer.Currently, generally by
On the one hand data sharing platform receives and stores the data of user's upload, on the other hand provides a user data and look into as intermediary
Service is ask, in this way, the data sharing between being achieved that user.Based on the prior art, safer and efficient number is needed
According to storage method and data query method.
Summary of the invention
In view of problem above, the embodiment of the present invention provides date storage method, data query method and device, to solve
Existing date storage method not can guarantee data safety and the low problem of efficiency data query.
The date storage method of embodiment according to the invention is applied to the first block chain node, comprising: will at least one number
According to deposit memory pool, the data carry first identifier information;When meeting preset condition, collects and store in the memory pool
Carry the data of the first identifier information;The data being collected into are encrypted to obtain encryption data;Added according to described
Ciphertext data generates block and the block is sent to the second block chain node, so that each block chain node is total to the block
After knowledge is verified, block chain end is added in the block.
The data query method of embodiment according to the invention is applied to the second block chain node, comprising: receives data and looks into
Request is ask, the data inquiry request carries first identifier information;According to the data inquiry request, the first identifier is determined
The encryption data recorded in the corresponding block of information and the block, the encryption data are the first block chain node according to taking
What the data with the first identifier information were encrypted;By intelligent contract, judge that the second block chain node is
It is no that there is the permission for decrypting the encryption data;If so, the encryption data is sent to described first by intelligent contract
Block chain node so that the encryption data is decrypted in the first block chain node, and the data that decryption obtains is returned
Back to the second block chain node;If it is not, refusing to send the encryption data to the first block chain node.
The data storage device of embodiment according to the invention is applied to the first block chain node, comprising: memory module,
For an at least data to be stored in memory pool, the data carry first identifier information;Collection module, for when the default item of satisfaction
When part, the data of the carrying first identifier information stored in the memory pool are collected;Encrypting module, for the collection
To data encrypted to obtain encryption data;Generation module, for generating block according to the encryption data and by the area
Block is sent to the second block chain node so that each block chain node to the block common recognition be verified after, by the block
Block chain end is added.
The data query device of embodiment according to the invention is applied to the second block chain node, comprising: receiving module,
Inquiry request for receiving data, the data inquiry request carry first identifier information;Determining module, for according to the number
According to inquiry request, the encryption data recorded in the corresponding block of the first identifier information and the block is determined, it is described to add
Ciphertext data is that the first block chain node is encrypted according to the data for carrying the first identifier information;Judgement processing mould
Block, for judging whether the second block chain node has the permission for decrypting the encryption data by intelligent contract, if
It is the encryption data to be then sent to by the first block chain node by intelligent contract, so that the first block chain link
The encryption data is decrypted in point, and the data that decryption obtains are returned to the second block chain node, if it is not, refusal
The encryption data is sent to the first block chain node.
The calculating equipment of embodiment according to the invention, including processor;And memory, it is stored thereon with executable finger
It enables;Wherein, the processor is configured to execute the executable instruction to implement method above-mentioned.
The computer readable storage medium of embodiment according to the invention is stored thereon with computer program, the calculating
Machine program includes executable instruction, when the executable instruction is executed by processor, implements method above-mentioned.
It can be seen from the above that in the scheme of the embodiment of the present invention, user uploaded by block chain node or
Person inquires data.On the one hand, since the data distribution formula of each block chain nodes sharing is stored in the area of each block chain node maintenance
In block chain, therefore the data for being stored in block chain are difficult to be tampered, and safety is higher;On the other hand, block chain node is in storage number
According to when data are encrypted, other block chain nodes want obtain data, need to verify the permission of itself by intelligent contract,
Data can just be checked by having the node with permission only;Another aspect, block chain node will have same mark in storing data
The data of information are known by identical one or more block records, and the data of different identification information are remembered by different blocks
Record, facilitates the management of follow-up data, when inquiring data, without traversing whole block chain, need to only find corresponding area
Block, to improve the efficiency of inquiry.
Detailed description of the invention
Fig. 1 is date storage method one embodiment flow chart in the embodiment of the present application;
Fig. 2 is data query method one embodiment flow chart in the embodiment of the present application;
Fig. 3 is the architecture diagram of data storage and inquiry system in the embodiment of the present application;
Fig. 4 is data storage device one embodiment schematic diagram in the embodiment of the present application;
Fig. 5 is data query device one embodiment schematic diagram in the embodiment of the present application;
Fig. 6 is one embodiment structural schematic diagram that equipment is calculated in the embodiment of the present application.
Specific embodiment
Theme described herein is discussed referring now to example embodiment.It should be understood that discussing these embodiments only
It is in order to enable those skilled in the art can better understand that being not to claim to realize theme described herein
Protection scope, applicability or the exemplary limitation illustrated in book.It can be in the protection scope for not departing from present disclosure
In the case of, the function and arrangement of the element discussed are changed.Each example can according to need, omit, substitute or
Add various processes or component.For example, described method can be executed according to described order in a different order, with
And each step can be added, omits or combine.In addition, feature described in relatively some examples is in other examples
It can be combined.
As used in this article, term " includes " and its modification indicate open term, are meant that " including but not limited to ".
Term "based" indicates " being based at least partially on ".Term " one embodiment " and " embodiment " expression " at least one implementation
Example ".Term " another embodiment " expression " at least one other embodiment ".Term " first ", " second " etc. may refer to not
Same or identical object, may refer to one or more objects.Here may include other definition, either specific to go back
It is implicit.Unless clearly indicating in context, otherwise the definition of a term is consistent throughout the specification.
As stated in the background art, on the one hand existing data sharing platform can receive and store the number that each user uploads
According on the other hand again to each user offer data query service.But this mode has two: first, due to each use
The shared data in family transfer to the data sharing platform of centralization to store, if someone's malice distorts the data stored on platform, that
The data that each user inquires from platform are exactly incredible;Second, data sharing platform usually simultaneously receive it is multiple
The data inquiry request that user sends, and data sharing platform is limited to the processing capacity of data inquiry request, this has been resulted in
User need wait in line, inquiry data take a long time, the efficiency for inquiring data is lower.
For this purpose, in this specification embodiment, first, forming block chain network, each block chain link by block chain node
The shared data of point can be stored in the block chain that each block chain node is safeguarded respectively after each block chain node knows together verifying
In, in this way, which the data for being stored in block chain are difficult to be tampered or lose.Second, block chain node is first right in storing data
Data are encrypted, other block chain nodes are wanted to obtain data, are needed to verify the permission of itself by intelligent contract, are had tool only
The node having permission can just check data.Third, if some block chain node is wanted to inquire other block chain nodes sharings
Data, which can be (each by identification information-enquiry in the data of the block chain storage of oneself maintenance
The data of the block chain storage of block chain node maintenance are synchronous), the efficiency for inquiring data is promoted.Four, block chain
Node will be written in identical one or more blocks, by different marks in storing data with the data of same identification information
The data for knowing information are written in different blocks, facilitate the management of follow-up data, whole without traversing when inquiring data
Block chain only need to find corresponding block, to further improve the efficiency of inquiry.
In order to keep the technical solution of the application clearer, below in conjunction with concrete scene to provided by the embodiments of the present application
Date storage method and data query method are introduced.
Fig. 1 is date storage method flow chart provided by the embodiments of the present application, and this method 100 is applied to the first block chain link
Point, method 100 the following steps are included:
S102: an at least data are stored in memory pool, the data carry first identifier information;
Process shown in FIG. 1 is the process that the data of itself are stored in block chain by the first block chain node.
In the embodiment of the present application, block chain node can be server or terminal, specifically can be the number for sharing itself
According to user server (below, the server that block chain node is also possible to the user of request inquiry data), or be
The server of other users shared data.For example, the detection service mechanism for providing detection service wants will test report altogether
It enjoys to other users, then the server of detection service mechanism can be used as block chain node access area block chain network.
In the embodiment of the present application, the data that the first block chain node can receive user or other block chain nodes upload,
Then data are stored in memory pool.The number that first block chain node can receive multiple users simultaneously or block chain node uploads
According to can receive user or one or more data that block chain node uploads, multiple data can be packaged while be uploaded to the firstth area
Block chain node, can also successively upload.
In the embodiment of the present application, the data for being uploaded to the first block chain node carry identification information.The identification information
The identity identification information intrinsic for object corresponding to data can be the category of user's self-setting either object itself
Property information.Such as commodity sequence number, the corresponding commodity of each commodity sequence number, commodity sequence number are the identification letters of commodity
Breath, which is identification information.When testing to a certain commodity, multiple detection datas may be obtained, then
This multiple detection data carries the identification information of the commodity respectively.The for another example identity information of consumer, each identity information are corresponding
One consumer, identity information are the identity identification informations of consumer, which is identification information.Certainly, which believes
The intrinsic identity identification information of a class object corresponding to breath or data.For example, the company-information of commodity, same factory
The data of the multiclass commodity of family carry the company-information respectively, then the company-information is identification information.
In the embodiment of the present application, data are stored in memory pool by the first block chain node, in a certain period of time, deposit
Data in memory pool may include the A data for carrying first identifier information, B data, C data, and, carry the second mark
Know D data, E data, the F data of information, certainly can also include the data for carrying other identifier information.
S104: when meeting preset condition, the number of the carrying first identifier information stored in the memory pool is collected
According to.
In the embodiment of the present application, meeting preset condition includes in receiving preset instructions, reaching preset time or is described
The quantity of the data stored in storage reaches preset threshold.
When it is implemented, the first block chain node can be referred to by meeting preset condition in some possible implementations
It receives and uploads the preset instructions that the user of data sends, such as node uploads carrying first identifier letter to user in different times
Multiple data of breath, after completion data upload, user sends the preset instructions for uploading and finishing to block chain node, the default finger
Order may include first identifier information, to indicate that block chain node starts to collect the data for carrying first identifier information.Specifically, with
Family can upload data to block chain node by client and send preset instructions.It is full in other possible implementations
Sufficient preset condition, which can also be, reaches preset time, specifically can be block chain node and collects once every preset time, or
The data that block chain node collects its upload after preset time are arranged in person, designated user.In other possible implementation
In, meeting preset condition can also be that the quantity of the data stored in memory pool reaches preset threshold, can be same mark letter
The quantity of the data of breath reaches preset threshold, and the quantity for being also possible to all data stored in memory pool reaches preset threshold.
S106: the data being collected into are encrypted to obtain encryption data.
In the embodiment of the present application, the first block chain node can carry out the data being collected into using symmetric encipherment algorithm
Encryption.
S108: block is generated according to the encryption data and the block is sent to the second block chain node, so that respectively
Block chain end is added after being verified to block common recognition, by the block in block chain node.
In the embodiment of the present application, generating block according to encryption data can specifically include: being generated and is added according to encryption data
The cryptographic Hash of ciphertext data;The tree root cryptographic Hash of Merkel tree is calculated according to the cryptographic Hash of encryption data;According to first identifier information
Generate the cryptographic Hash of first identifier information;Obtain the timestamp of current block;Obtain the corresponding cryptographic Hash of a upper block;By upper one
The corresponding cryptographic Hash of block, the tree root cryptographic Hash of Merkel tree, the cryptographic Hash of first identifier information and the time of current block
Stamp is arranged into the block head of current block, and encryption data is arranged into the block main body of current block.
When it is implemented, the corresponding cryptographic Hash of a upper block is by carrying out Hash meter to the data stored in a upper block
Calculate acquisition.It specifically, include block head and block main body in a upper block, including the previous area of a upper block in block head
The corresponding cryptographic Hash of tree root of the Merkel tree of the cryptographic Hash of block and a upper block, by the two cryptographic Hash using Hash calculation
Obtain the corresponding cryptographic Hash of a block.
Current block includes block head and block main body, and the corresponding cryptographic Hash of a upper block is stored in block head, and
And it is also stored in block head and generates the timestamp of current block and the tree root cryptographic Hash of Merkel tree, each leaf of Merkel tree
Child node storage carries out the cryptographic Hash after Hash calculation to encryption data, and the root node storage encryption data of Merkel tree is corresponding
Cryptographic Hash carries out total cryptographic Hash after adding up.Encryption data is stored in block main body.
In the embodiment of the present application, the second block chain node refers to other block chains other than the first block chain node
Node will can specifically include in the block deposit block chain of generation: the block of generation be broadcast to the second block chain node;Respectively
Block chain link point verifies block according to preset common recognition mechanism;Block chain end is added in the block being verified;It will
The block chain of block chain progress each block chain node of broadcast synchronization.
In the embodiment of the present application, it if the data total size being collected into is more than the capacity of a block, can will collect
To data be divided into more parts, every part of data sequentially generate a block respectively.In the embodiment of the present application, block chain may include
Publicly-owned block chain, alliance's block chain or privately owned block chain.
In one embodiment, method 100 further include: the first identifier information and the area are established in concordance list
The corresponding relationship of block.When it is implemented, the corresponding pass of first identifier information with the block Hash of block or block height can be established
System.By establishing the corresponding relationship of first identifier information and block in concordance list, user is allow to pass through first identifier information
Search corresponding block.Same data can carry multiple identification informations, and the first block chain node is according in multiple identification informations
A certain identification information collect data generate block, the Hash of the multiple identification information is settable into the block, the area
Block can establish index relative with the multiple identification information.
In another embodiment, method 100 further include: by intelligent contract, determine the data corresponding first
Numerical value, first numerical value is for characterizing the increased numerical value into the account of the first block chain node;By intelligent contract,
The node identification of the first block chain node and first numerical value are broadcasted, so that each block chain node is to described
After node identification and first numerical value common recognition are verified, the node identification and first numerical value are stored in block chain.
In the present embodiment, the first numerical value can actually be the remuneration or prize that block chain is write data into the first block chain node
It encourages, the first numerical value needs to determine by intelligent contract, to prevent the first block chain node from fabricating the first numerical value without authorization.Different data
The first different numerical value can be corresponded to, is provided previously according to needs among intelligent contract.
For example, the first block chain node can be the server of quality monitoring mechanism, and the second block chain node can be with
The server of server, inspection mechanism including detection service mechanism, inspection mechanism send article to be detected to detection service machine
Structure is detected, detection service mechanism treat detection article detected after, will test result (data i.e. in the application) hair
It send to quality monitoring mechanism, result deposit block chain will test by quality monitoring mechanism, the block chain distributed storage is in quality
It in the server of regulatory agency, detection service mechanism and inspection mechanism and synchronizes, the server of quality monitoring mechanism provides
The testing result of each detection service mechanism is stored in the function of block chain, therefore a testing result of every deposit, quality monitoring
Mechanism can collect certain formality expense, which is the first numerical value, and intelligent contract can be by quality monitoring mechanism
It determines or is determined jointly by quality monitoring mechanism and detection service mechanism.According to trigger condition, (testing result is stored in intelligent contract
Block chain) automatic execute increase to the first numerical value (service charge) in the account of the first block chain node (quality monitoring mechanism),
And it is recorded in the form of block in block chain.
In other examples, the first block chain node is also possible to the server of detection service mechanism, the second block chain node
For the server of inspection mechanism, the examining report deposit block chain of article to be detected can then be collected detection by detection service device mechanism
Take, then check fee is the first numerical value at this time, and intelligent contract can be determined jointly by detection service mechanism and inspection mechanism.Intelligence
First numerical value (check fee) is increased to the first block according to trigger condition (testing result is stored in block chain) automatic execute by contract
In the account of chain node (detection service mechanism), and it is recorded in block chain in the form of block.
It should be noted that the first block chain node can also be when generating block according to encryption data by the node of itself
Mark, the first numerical value and encryption data generate block together, and the block of generation is broadcast to the second block chain link point and is total to
Verifying is known, if the remaining sum being equivalent in the account of the first block chain node increases by common recognition verifying.
In yet another embodiment, method 100 further include: receive the second block chain node and trigger intelligent contract hair
The encryption data sent, the intelligence contract are used to judge whether the second block chain node to have the decryption encryption data
Permission;The encryption data is decrypted, and the data that decryption obtains are returned into the second block chain node.In this Shen
It please judge whether the second block chain node has the permission for decrypting the encryption data, node can be passed through in embodiment
Mapping relations between mark and decrypted rights determine whether the second block chain node has the decryption ciphertext data
Permission, the mapping relations can provide among intelligent contract previously according to needs.Second block chain node can be by searching for area
Block chain obtains the encryption data, if the second block chain node has decrypted rights, is sent out encryption data by intelligent contract
It sending to the first block chain node, the first block chain node uses key pair encryption data used when encryption data to be decrypted,
And the data that decryption obtains are returned into the second block chain node.
Fig. 2 is data query method flow diagram provided by the embodiments of the present application, and this method 200 is applied to the second block chain link
Point, method includes the following steps:
S202: receiving data inquiry request, and the data inquiry request carries first identifier information.
Process shown in Fig. 2 is the process of the data in the second block chain node interrogation zone block chain, the second block chain node
The data of inquiry are usually deposit block chain in process shown in Fig. 1.
Data inquiry request can be sent to the second block chain node by client by user.
S204: according to the data inquiry request, the corresponding block of the first identifier information and the block are determined
The encryption data of middle record, the encryption data be the first block chain node according to carry the data of the first identifier information into
Row encryption obtains.
In the embodiment of the present application, the corresponding block of the first identifier information, the index can be determined by concordance list
Table includes the corresponding relationship between the block of the data of the first identifier information and the record carrying first identifier information.It should
Corresponding relationship can be first identifier information and block-identified corresponding relationship, and block-identified includes that block Hash or block are high
Degree, block chain node can be according to first identifier information index to corresponding block.
In the embodiment of the present application, same data can carry multiple identification informations, and the first block chain node is according to multiple marks
Know a certain identification information in information and collect data generation block, the Hash of the multiple identification information is settable to arrive the block
In, which can establish index relative with the multiple identification information.One or more can be indexed by an identification information
Block can index same block by different identification informations.For example, the producer can be indexed not by company-information
Corresponding multiple blocks with commodity can index the wherein corresponding block of a certain commodity by commodity sequence number.
In the embodiment of the present application, encryption data is the first block chain node in the number that will carry the first identifier information
According to what is encrypted before deposit block chain to the data, the first block chain node can be using symmetric encipherment algorithm to carrying
The data of the first identifier information are encrypted.
S206: by intelligent contract, judge whether the second block chain node has the power for decrypting the encryption data
Otherwise limit, executes step S210 if so, thening follow the steps S208.
In the embodiment of the present application, judge whether the second block chain node has the power for decrypting the encryption data
Limit, can determine whether the second block chain node has decryption by the mapping relations between node identification and decrypted rights
The permission of the ciphertext data, the mapping relations can provide among intelligent contract previously according to needs.For example, inspection mechanism
Article to be detected is usually sent to detection service mechanism B1 and is detected by A1, and inspection mechanism A2 usually by article to be detected send to
Detection service mechanism B2 is detected, then the service of inspection mechanism A1 and detection service mechanism B1 can be provided in intelligent contract
The decrypted rights of detection data of the device with decryption detection service mechanism B1, and the clothes of inspection mechanism A2 and detection service mechanism B2
Business device does not have the decrypted rights of the detection data of decryption detection service device mechanism B1 then, and vice versa.
S208: by intelligent contract, the encryption data is sent to the first block chain node.
If the second block chain node has permission decryption encryption data, the second block chain node can pass through intelligent contract
Encryption data is sent to the first block chain node, so that encryption data is decrypted in the first block chain node, and will decryption
Obtained data return to the second block chain node.In this way, the second block chain node just got it is bright required for it
Literary data.
S210: refuse to send the encryption data to the first block chain node.
In one embodiment, method 200 further include: decrypt the encryption number when the second block chain node has
According to permission when, by intelligent contract, determine the corresponding second value of data that the first block chain node returns, pass through intelligence
Energy contract, the node identification of the second block chain node and the second value is broadcasted, so that each block chain node
After being verified to the node identification and second value common recognition, the node identification and the second value are stored in
Block chain.
In the embodiment of the present application, the second value is reduced from the account of the second block chain node for characterizing
Numerical value.That is, the second value can be considered as the expense that the second block chain node is paid because inquiring the data.
The corresponding second value of data is also required to determine by intelligent contract.The expense of second block chain node expenditure can be from its account
Remaining sum in deduct, expense deduction can be equally recorded in block chain in the form of block.As it can be seen that not only being stored on block chain
Shared data, also publicity upload data or obtain the various incomes of data or the record of expenditure.
In another embodiment, method 200 further include: decrypt the encryption when the second block chain node has
When the permission of data, by intelligent contract, determines the corresponding third value of data that the first block chain node returns, pass through
Intelligent contract broadcasts the node identification of the first block chain node and the third value, so that each block chain link
Point deposits the node identification and the second value after being verified to the node identification and third value common recognition
Enter block chain.
In the embodiment of the present application, the third value increases for characterizing into the account of the first block chain node
Numerical value.That is, the first block chain link when the third value can be considered as data described in the second block chain querying node
The taken in expense of point, or can be considered the expense that the first block chain node is taken in by the second block chain node decryption encryption data
With.Since usual encryption data is uploaded by the first block chain node, so third value can also be considered as the first block chain link
The remuneration that the data that point itself is shared are obtained because being queried.
Pass through date storage method shown in FIG. 1 and data query method shown in Fig. 2, it is seen that: first, passing through block chain
Node forms block chain network, and the data of each block chain nodes sharing can be after each block chain node knows together verifying, deposit
In the block chain that each block chain node is safeguarded respectively, in this way, which the data for being stored in block chain are difficult to be tampered or lose.Its
Two, block chain node first encrypts data in storing data, other block chain nodes are wanted to obtain data, needs to pass through
Intelligent contract verifies the permission of itself, and data can just be checked by having the node with permission only.If third, some block chain link
Point is wanted to inquire the data of other block chain nodes sharings, which can be in the number of the block chain storage of oneself maintenance
In by identification information-enquiry can (data of the block chain of each block chain node maintenance storage are synchronous), inquire data
Efficiency promoted.Four, block chain node is identical by being written with the data of same identification information in storing data
In one or more blocks, the data of different identification information are written in different blocks, facilitate the management of follow-up data, right
When data are inquired, without traversing whole block chain, corresponding block only need to be found, to further improve inquiry
Efficiency.
Fig. 3 is the architecture diagram of data storage and inquiry system provided by the embodiments of the present application.As shown in figure 3, system 300 is wrapped
Server 302, server 304 and server 306 are included, server 302 is the first block chain node, server 304 and server
306 be the second block chain node, and the first block chain node and the second block chain node form block chain network, and each server is total
With maintenance block chain, the first block chain node storing data, the second block chain node can be looked into block chain from block chain
Ask data.Because the block that storing data or inquiry data generate need to be tested through each block chain link point according to preset common recognition mechanism
Card.It should be understood that, the data of the block chain node in Fig. 3 are only schematical, according to actual needs, can have any
The block chain node of quantity, it is of course possible to which there is any number of first block chain node and the second block chain node.In addition, the
The role of one block chain node and the second block chain node is interchangeable.
Based on date storage method shown in FIG. 1, the embodiment of the present application also correspondence provides a kind of data storage device, under
Face will be introduced data storage device provided by the embodiments of the present application from the angle of function modoularization.
Fig. 4 is one embodiment schematic diagram of data storage device in the embodiment of the present application, which can use soft
The mode of part, hardware or software and hardware combining is realized.Since the embodiment of device 400 is substantially similar to the embodiment of method, institute
To describe fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Fig. 4 is referred to, device 400 includes depositing
Store up module 402, collection module 404, encrypting module 406 and generation module 408.Memory module 402 will be for will at least a data deposit
Enter memory pool, the data carry first identifier information.Collection module 404 is used for when meeting preset condition, is collected in described
Deposit the data of the carrying first identifier information stored in pond.Encrypting module 406 is used to carry out the data being collected into
Encryption obtains encryption data.Generation module 408 is used to generate block according to the encryption data and the block is sent to the
Two block chain nodes, so that block chain is added after being verified to block common recognition, by the block in each block chain node
End.
In one aspect, the preset condition that meets includes receiving preset instructions, reaching preset time or the memory
The quantity of the data stored in pond reaches preset threshold.
On the other hand, device 400 further includes establishing module.Module is established for establishing described first in concordance list
The corresponding relationship of identification information and the block.
In yet another aspect, device 400 further includes processing module.Processing module is used for through intelligent contract, determine described in
Corresponding first numerical value of data, first numerical value is for characterizing the increased number into the account of the first block chain node
Value;By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that each area
Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described first
Numerical value is stored in block chain.
In another aspect, device 400 further includes deciphering module.Deciphering module is for receiving the second block chain node
The encryption data that intelligent contract is sent is triggered, the encryption data is decrypted, and the data that decryption obtains are returned into institute
State the second block chain node.Wherein, the intelligent contract is for judging whether the second block chain node has described in decryption
The permission of encryption data.
Based on data query method shown in Fig. 2, the embodiment of the present application also correspondence provides a kind of data query device, under
Face will be introduced data query device provided by the embodiments of the present application from the angle of function modoularization.
Fig. 5 is one embodiment schematic diagram of data query device in the embodiment of the present application, which can use soft
The mode of part, hardware or software and hardware combining is realized.Since the embodiment of device 500 is substantially similar to the embodiment of method, institute
To describe fairly simple, the relevent part can refer to the partial explaination of embodiments of method.Fig. 5 is referred to, device 500 includes connecing
Receive module 502, determining module 504 and judging treatmenting module 506.The inquiry request for receiving data of receiving module 502, the number
First identifier information is carried according to inquiry request.Determining module 504 is used to determine first mark according to the data inquiry request
Know the encryption data recorded in the corresponding block of information and the block, the encryption data be the first block chain node according to
Carry what the data of the first identifier information were encrypted.Judging treatmenting module 506 is used for through intelligent contract, judgement
Whether the second block chain node has the permission for decrypting the encryption data;If so, described will be added by intelligent contract
Ciphertext data is sent to the first block chain node, so that the encryption data is decrypted in the first block chain node,
And the data that decryption obtains are returned into the second block chain node;If it is not, refusing to send to the first block chain node
The encryption data.
In one aspect, device 500 further includes first processing module.First processing module is used to work as the second block chain
When node has the permission for decrypting the encryption data, by intelligent contract, the number that the first block chain node returns is determined
According to corresponding second value, the second value is for characterizing the numerical value reduced from the account of the second block chain node;
By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that each block
Chain node is after being verified the node identification and second value common recognition, by the node identification and second number
Value deposit block chain.
In one aspect, device 500 further includes Second processing module.Second processing module is used to work as the second block chain
When node has the permission for decrypting the encryption data, by intelligent contract, the number that the first block chain node returns is determined
According to corresponding third value, the third value is for characterizing the increased numerical value into the account of the first block chain node;
By intelligent contract, the node identification of the first block chain node and the third value are broadcasted, so that each block
Chain node is after being verified the node identification and third value common recognition, by the node identification and second number
Value deposit block chain.
Above embodiments are that device provided by the embodiments of the present application is introduced from the angle of function modoularization, below will
Device provided by the embodiments of the present application is illustrated from the angle of hardware entities.
In the embodiment of the present application, a kind of calculating equipment is also provided, which may include processor and be used for
Store the memory of the executable instruction of the processor.Wherein, the processor is configured to via the execution executable finger
The step of enabling to execute the storage of the data in any one above-mentioned embodiment or querying method.
Person of ordinary skill in the field it is understood that various aspects of the disclosure can be implemented as system, method or
Program product.Therefore, various aspects of the disclosure can be with specific implementation is as follows, it may be assumed that complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
Calculating equipment according to an embodiment of the present application is described referring to Fig. 6.For ease of description, illustrate only with
The relevant part of the embodiment of the present application, it is disclosed by specific technical details, please refer to the embodiment of the present application method part.
It is showed in the form of universal computing device as shown in fig. 6, calculating equipment 600.Calculating equipment 600 may include processing
Device 602 and memory 604, wherein be stored with executable instruction on memory 604, wherein the executable instruction, which is worked as, to be performed
When make processor 602 execute in any one above-mentioned embodiment data storage or querying method.
As shown in fig. 6, calculating equipment 600 can also include connecting different system components (including processor 602 and memory
604) bus 606.Bus 606 indicates one of a few class bus structures or a variety of, including memory bus or memory
Controller, peripheral bus, graphics acceleration port, processor or the local using any bus structures in a variety of bus structures
Bus.For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel system knot
Structure (MAC) bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI)
Bus.
It calculates equipment 600 and typically comprises a variety of computer system readable media.These media can be it is any can be by
Calculate the usable medium that equipment 600 accesses, including volatile and non-volatile media, moveable and immovable medium.
Memory 604 may include the computer system readable media of form of volatile memory, such as arbitrary access is deposited
Reservoir (RAM) 608 and and/or cache memory 610.Calculate equipment 600 may further include it is other it is removable/can not
Mobile, volatile/non-volatile computer system storage medium.Only as an example, storage system 612 can be used for reading and writing not
Movably, non-volatile magnetic media (Fig. 6 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 6
The disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") is provided, and non-volatile to moving
The CD drive of CD (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driving
Device can be connected by one or more data media interfaces with bus 606.Memory 604 may include at least one program
Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform above-mentioned
Data storage or querying method in one embodiment of anticipating.
Program/utility 614 with one group of (at least one) program module 616, can store in such as memory
In 604, such program module 616 includes but is not limited to operating system, one or more application program, other program modules
And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 616
Usually execute data storage or the querying method in any one above-mentioned embodiment.
Calculating equipment 600 can also be with one or more external equipments 622 (such as keyboard, sensing equipment, display 624
Deng) communication, can also be enabled a user to one or more equipment interact with the calculating equipment 600 communicate, and/or with make
Any equipment (such as network interface card, the modem that the calculating equipment 600 can be communicated with one or more of the other calculating equipment
Etc.) communication.This communication can be carried out by input/output (I/O) interface 618.Also, calculating equipment 600 can also lead to
Cross network adapter 620 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, example
Such as internet) communication.As shown, network adapter 620 is communicated by bus 606 with the other modules for calculating equipment 600.It answers
When understanding, although not shown in the drawings, other hardware and/or software module can be used in conjunction with equipment 600 is calculated, including but unlimited
In: microcode, device driver, redundant processor, external disk drive array, RAID system, tape drive and data
Backup storage system etc..
Program of the processor 602 by operation storage in the memory 604, thereby executing various function application and data
Processing, such as realize data storage or querying method in any one above-mentioned embodiment.
A kind of computer readable storage medium is also provided in the embodiment of the present application, is stored thereon with computer program, it is described
Computer program includes executable instruction, when the executable instruction is executed by processor, implements any one above-mentioned embodiment
In data storage or the step of querying method.In some possible embodiments, various aspects of the disclosure can also be real
It is now a kind of form of program product comprising program code, when described program product is run on the terminal device, the journey
Sequence code be used for make the terminal device execute this specification data storage or querying method described in it is each according to the disclosure
The step of kind exemplary embodiment.
Program product according to an embodiment of the present disclosure for realizing the above method can be using portable compact disc only
It reads memory (CD-ROM) and including program code, and can be run on terminal device, such as PC.However, this public affairs
The program product opened is without being limited thereto, and in this document, readable storage medium storing program for executing can be any tangible Jie for including or store program
Matter, the program can be commanded execution system, device or device use or in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed
Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism
Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing
Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or
Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet
Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
The specific embodiment illustrated above in conjunction with attached drawing describes exemplary embodiment, it is not intended that may be implemented
Or fall into all embodiments of the protection scope of claims." exemplary " meaning of the term used in entire this specification
Taste " be used as example, example or illustration ", be not meant to than other embodiments " preferably " or " there is advantage ".For offer pair
The purpose of the understanding of described technology, specific embodiment include detail.However, it is possible in these no details
In the case of implement these technologies.In some instances, public in order to avoid the concept to described embodiment causes indigestion
The construction and device known is shown in block diagram form.
The foregoing description of present disclosure is provided so that any those of ordinary skill in this field can be realized or make
Use present disclosure.To those skilled in the art, the various modifications carried out to present disclosure are apparent
, also, can also answer generic principles defined herein in the case where not departing from the protection scope of present disclosure
For other modifications.Therefore, present disclosure is not limited to examples described herein and design, but disclosed herein with meeting
Principle and novel features widest scope it is consistent.
Claims (11)
1. date storage method is applied to the first block chain node, comprising:
An at least data are stored in memory pool, the data carry first identifier information;
When meeting preset condition, the data of the carrying first identifier information stored in the memory pool are collected;
The data being collected into are encrypted to obtain encryption data;
Block is generated according to the encryption data and the block is sent to the second block chain node, so that each block chain node
After being verified to block common recognition, block chain end is added in the block.
2. according to the method described in claim 1, wherein,
It is described meet preset condition include receive preset instructions, reach preset time or the memory pool in the data that store
Quantity reaches preset threshold.
3. method according to claim 1 or 2, wherein the method also includes:
By intelligent contract, corresponding first numerical value of the data is determined, first numerical value is for characterizing to firstth area
Increased numerical value in the account of block chain node;
By intelligent contract, the node identification of the first block chain node and first numerical value are broadcasted, so that respectively
Block chain node is after being verified the node identification and first numerical value common recognition, by the node identification and described the
One numerical value is stored in block chain.
4. method according to claim 1 or 2, wherein the method also includes:
It receives the second block chain node and triggers the encryption data that intelligent contract is sent, the intelligence contract is described for judging
Whether the second block chain node has the permission for decrypting the encryption data;
The encryption data is decrypted, and the data that decryption obtains are returned into the second block chain node.
5. data query method is applied to the second block chain node, comprising:
Data inquiry request is received, the data inquiry request carries first identifier information;
According to the data inquiry request, determine that is recorded in the corresponding block of the first identifier information and the block adds
Ciphertext data, the encryption data are that the first block chain node is encrypted to obtain according to the data for carrying the first identifier information
's;
By intelligent contract, judge whether the second block chain node has the permission for decrypting the encryption data;
If so, the encryption data is sent to the first block chain node by intelligent contract, so that firstth area
The encryption data is decrypted in block chain node, and the data that decryption obtains are returned to the second block chain node;
If it is not, refusing to send the encryption data to the first block chain node.
6. according to the method described in claim 5, wherein, decrypting the encryption data when the second block chain node has
When permission, the method also includes:
By intelligent contract, the corresponding second value of data that the first block chain node returns, the second value are determined
For characterizing the numerical value reduced from the account of the second block chain node;
By intelligent contract, the node identification of the second block chain node and the second value are broadcasted, so that respectively
Block chain node is after being verified the node identification and second value common recognition, by the node identification and described the
Two numerical value are stored in block chain.
7. according to the method described in claim 5, wherein, decrypting the encryption data when the second block chain node has
When permission, the method also includes:
By intelligent contract, the corresponding third value of data that the first block chain node returns, the third value are determined
For characterizing the increased numerical value into the account of the first block chain node;
By intelligent contract, the node identification of the first block chain node and the third value are broadcasted, so that respectively
Block chain node is after being verified the node identification and third value common recognition, by the node identification and described the
Two numerical value are stored in block chain.
8. data storage device is applied to the first block chain node, comprising:
Memory module, for an at least data to be stored in memory pool, the data carry first identifier information;
Collection module, for when meeting preset condition, collecting the carrying first identifier information stored in the memory pool
Data;
Encrypting module, for being encrypted to obtain encryption data to the data being collected into;
Generation module, for generating block according to the encryption data and the block being sent to the second block chain node, with
Make each block chain node after being verified to block common recognition, block chain end is added in the block.
9. data query device is applied to the second block chain node, comprising:
Receiving module, inquiry request, the data inquiry request carry first identifier information for receiving data;
Determining module, for according to the data inquiry request, determining the corresponding block of the first identifier information and described
The encryption data recorded in block, the encryption data are the first block chain node according to the number for carrying the first identifier information
According to what is encrypted;
Judging treatmenting module, for judging whether the second block chain node has the decryption encryption by intelligent contract
The permission of data;If so, the encryption data is sent to the first block chain node by intelligent contract, so that described
The encryption data is decrypted in first block chain node, and the data that decryption obtains are returned to the second block chain link
Point;If it is not, refusing to send the encryption data to the first block chain node.
10. calculating equipment, comprising:
Processor;And
Memory is stored thereon with executable instruction;
Wherein, the processor is configured to execute the executable instruction to implement side as claimed in any one of claims 1 to 6
Method.
11. computer readable storage medium is stored thereon with computer program, the computer program includes executable instruction,
When the executable instruction is executed by processor, implement as the method according to claim 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811452495.6A CN109670321A (en) | 2018-11-30 | 2018-11-30 | Date storage method, data query method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811452495.6A CN109670321A (en) | 2018-11-30 | 2018-11-30 | Date storage method, data query method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109670321A true CN109670321A (en) | 2019-04-23 |
Family
ID=66143424
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811452495.6A Pending CN109670321A (en) | 2018-11-30 | 2018-11-30 | Date storage method, data query method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109670321A (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035130A (en) * | 2019-04-24 | 2019-07-19 | 中国联合网络通信集团有限公司 | A kind of data processing method and device |
CN110188546A (en) * | 2019-04-26 | 2019-08-30 | 特斯联(北京)科技有限公司 | A kind of teaching resource management method based on information bank platform |
CN110300170A (en) * | 2019-06-28 | 2019-10-01 | 杭州复杂美科技有限公司 | Block chain distributed storage method for down loading, equipment and storage medium |
CN110532801A (en) * | 2019-08-29 | 2019-12-03 | 深圳市网心科技有限公司 | Communication means, device, client and storage medium based on multi-tiling interchain |
CN110688261A (en) * | 2019-11-13 | 2020-01-14 | 杭州新链科技有限公司 | Heterogeneous electronic file cloud disaster recovery system based on block chain |
CN110825809A (en) * | 2019-10-25 | 2020-02-21 | 嘉兴太美医疗科技有限公司 | Storage method and device for drug response information |
CN110929229A (en) * | 2019-11-26 | 2020-03-27 | 中国石油大学(华东) | Block chain-based office document credibility verification method and system |
CN110990883A (en) * | 2019-11-22 | 2020-04-10 | 金蝶软件(中国)有限公司 | Data access method, data access device, computer-readable storage medium and computer equipment |
CN110990853A (en) * | 2019-11-29 | 2020-04-10 | 天津市滨海新区信息技术创新中心 | Dynamic heterogeneous redundant data access protection method and device |
CN111031036A (en) * | 2019-12-12 | 2020-04-17 | 深圳大学 | Block chain-based vaccine information monitoring method and device and computer equipment |
CN111526180A (en) * | 2020-03-30 | 2020-08-11 | 中国建设银行股份有限公司 | Data sharing method and device |
CN111666507A (en) * | 2020-05-28 | 2020-09-15 | 中国工商银行股份有限公司 | Individual track retrieval system and method based on block chain |
CN111936995A (en) * | 2020-06-08 | 2020-11-13 | 支付宝实验室(新加坡)有限公司 | Distributed storage of customs clearance data |
CN112115498A (en) * | 2020-09-28 | 2020-12-22 | 上海申铁信息工程有限公司 | Block chain-based data access authority control method and device |
WO2021012746A1 (en) * | 2019-07-24 | 2021-01-28 | 深圳壹账通智能科技有限公司 | Blockchain-based data encryption method and apparatus, electronic device and storage medium |
CN112328663A (en) * | 2020-11-24 | 2021-02-05 | 深圳市鹰硕技术有限公司 | Data discovery method and system applied to big data |
CN112446035A (en) * | 2019-09-05 | 2021-03-05 | 阿里健康科技(中国)有限公司 | Data management method and device |
CN112988891A (en) * | 2021-03-11 | 2021-06-18 | 重庆文理学院 | Method and device for storing block chain account book, electronic equipment and storage medium |
CN113052721A (en) * | 2021-03-18 | 2021-06-29 | 国网北京市电力公司 | Electric power data processing method and device |
CN113256424A (en) * | 2021-06-15 | 2021-08-13 | 腾讯科技(深圳)有限公司 | Transaction data processing method, device, equipment and storage medium |
CN113542199A (en) * | 2020-04-17 | 2021-10-22 | 海信集团有限公司 | Network security state evaluation method and server |
CN113535854A (en) * | 2021-07-28 | 2021-10-22 | 深圳创维-Rgb电子有限公司 | Block chain-based user data processing method and device and readable storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
US20170372300A1 (en) * | 2016-06-24 | 2017-12-28 | PokitDok, Inc. | System and method for cryptographically verified data driven contracts |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
-
2018
- 2018-11-30 CN CN201811452495.6A patent/CN109670321A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170372300A1 (en) * | 2016-06-24 | 2017-12-28 | PokitDok, Inc. | System and method for cryptographically verified data driven contracts |
CN107294709A (en) * | 2017-06-27 | 2017-10-24 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, apparatus and system |
CN107862215A (en) * | 2017-09-29 | 2018-03-30 | 阿里巴巴集团控股有限公司 | A kind of date storage method, data query method and device |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035130B (en) * | 2019-04-24 | 2021-07-13 | 中国联合网络通信集团有限公司 | Data processing method and device |
CN110035130A (en) * | 2019-04-24 | 2019-07-19 | 中国联合网络通信集团有限公司 | A kind of data processing method and device |
CN110188546B (en) * | 2019-04-26 | 2020-07-10 | 特斯联(北京)科技有限公司 | Teaching resource management method based on information base platform |
CN110188546A (en) * | 2019-04-26 | 2019-08-30 | 特斯联(北京)科技有限公司 | A kind of teaching resource management method based on information bank platform |
CN110300170A (en) * | 2019-06-28 | 2019-10-01 | 杭州复杂美科技有限公司 | Block chain distributed storage method for down loading, equipment and storage medium |
WO2021012746A1 (en) * | 2019-07-24 | 2021-01-28 | 深圳壹账通智能科技有限公司 | Blockchain-based data encryption method and apparatus, electronic device and storage medium |
CN110532801A (en) * | 2019-08-29 | 2019-12-03 | 深圳市网心科技有限公司 | Communication means, device, client and storage medium based on multi-tiling interchain |
CN112446035A (en) * | 2019-09-05 | 2021-03-05 | 阿里健康科技(中国)有限公司 | Data management method and device |
CN110825809A (en) * | 2019-10-25 | 2020-02-21 | 嘉兴太美医疗科技有限公司 | Storage method and device for drug response information |
CN110688261A (en) * | 2019-11-13 | 2020-01-14 | 杭州新链科技有限公司 | Heterogeneous electronic file cloud disaster recovery system based on block chain |
CN110990883A (en) * | 2019-11-22 | 2020-04-10 | 金蝶软件(中国)有限公司 | Data access method, data access device, computer-readable storage medium and computer equipment |
CN110929229A (en) * | 2019-11-26 | 2020-03-27 | 中国石油大学(华东) | Block chain-based office document credibility verification method and system |
CN110990853A (en) * | 2019-11-29 | 2020-04-10 | 天津市滨海新区信息技术创新中心 | Dynamic heterogeneous redundant data access protection method and device |
CN110990853B (en) * | 2019-11-29 | 2022-05-06 | 天津市滨海新区信息技术创新中心 | Dynamic heterogeneous redundant data access protection method and device |
CN111031036A (en) * | 2019-12-12 | 2020-04-17 | 深圳大学 | Block chain-based vaccine information monitoring method and device and computer equipment |
CN111526180A (en) * | 2020-03-30 | 2020-08-11 | 中国建设银行股份有限公司 | Data sharing method and device |
CN111526180B (en) * | 2020-03-30 | 2022-05-24 | 中国建设银行股份有限公司 | Data sharing method and device |
CN113542199A (en) * | 2020-04-17 | 2021-10-22 | 海信集团有限公司 | Network security state evaluation method and server |
CN111666507B (en) * | 2020-05-28 | 2023-10-20 | 中国工商银行股份有限公司 | Personal track retrieval system and method based on block chain |
CN111666507A (en) * | 2020-05-28 | 2020-09-15 | 中国工商银行股份有限公司 | Individual track retrieval system and method based on block chain |
CN111936995A (en) * | 2020-06-08 | 2020-11-13 | 支付宝实验室(新加坡)有限公司 | Distributed storage of customs clearance data |
CN112115498A (en) * | 2020-09-28 | 2020-12-22 | 上海申铁信息工程有限公司 | Block chain-based data access authority control method and device |
CN112115498B (en) * | 2020-09-28 | 2023-12-01 | 上海申铁信息工程有限公司 | Data access authority control method and device based on blockchain |
CN112328663A (en) * | 2020-11-24 | 2021-02-05 | 深圳市鹰硕技术有限公司 | Data discovery method and system applied to big data |
CN112988891A (en) * | 2021-03-11 | 2021-06-18 | 重庆文理学院 | Method and device for storing block chain account book, electronic equipment and storage medium |
CN113052721A (en) * | 2021-03-18 | 2021-06-29 | 国网北京市电力公司 | Electric power data processing method and device |
CN113052721B (en) * | 2021-03-18 | 2024-04-30 | 国网北京市电力公司 | Power data processing method and device |
CN113256424B (en) * | 2021-06-15 | 2021-09-24 | 腾讯科技(深圳)有限公司 | Transaction data processing method, device, equipment and storage medium |
CN113256424A (en) * | 2021-06-15 | 2021-08-13 | 腾讯科技(深圳)有限公司 | Transaction data processing method, device, equipment and storage medium |
CN113535854A (en) * | 2021-07-28 | 2021-10-22 | 深圳创维-Rgb电子有限公司 | Block chain-based user data processing method and device and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109670321A (en) | Date storage method, data query method and device | |
CN110033258B (en) | Service data encryption method and device based on block chain | |
CN106127075B (en) | Encryption method can search for based on secret protection under a kind of cloud storage environment | |
CN110827028B (en) | Block chain-based data acquisition transaction system and method | |
CN112132198B (en) | Data processing method, device and system and server | |
CN109669943A (en) | Date storage method, data query method and device | |
WO2020156088A1 (en) | Blockchain-based information interaction method, blockchain node and credit reporting system | |
CN109255255A (en) | Data processing method, device, equipment and storage medium based on block chain | |
CN107862215A (en) | A kind of date storage method, data query method and device | |
CN105635168B (en) | A kind of application method of offline transaction device and its security key | |
CN111723060B (en) | Blacklist data sharing method and system based on blockchain | |
CN112527873B (en) | Big data management application system based on chain number cube | |
CN103324671A (en) | Information memorization and management method and device based on Webkit browser | |
CN105007301A (en) | Electronic evidence processing system and method based on social platform | |
CN112801827A (en) | Intellectual property management system based on block chain | |
CN108038128A (en) | A kind of search method, system, terminal device and storage medium for encrypting file | |
KR20130024144A (en) | Weighted keyword searching method for perserving privacy, and apparatus thereof | |
Zhu et al. | Blockchain technology in internet of things | |
CN109255250A (en) | A kind of data safety encryption device and application method based on alliance's chain | |
CN116777476A (en) | Medicine credible tracing method based on public key searchable encryption | |
Su et al. | BDTF: A blockchain-based data trading framework with trusted execution environment | |
CN109146683A (en) | A kind of information management and Verification System using block chain | |
CN110213202A (en) | Mark encryption matching process and device, identification processing method and device | |
CN114363089A (en) | Block chain-based network edge terminal data sharing method and model | |
CN108090371B (en) | Data processing method, data tracking method, data processing device and data tracking device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190423 |
|
RJ01 | Rejection of invention patent application after publication |