CN109815051A - The data processing method and system of block chain - Google Patents
The data processing method and system of block chain Download PDFInfo
- Publication number
- CN109815051A CN109815051A CN201811563833.3A CN201811563833A CN109815051A CN 109815051 A CN109815051 A CN 109815051A CN 201811563833 A CN201811563833 A CN 201811563833A CN 109815051 A CN109815051 A CN 109815051A
- Authority
- CN
- China
- Prior art keywords
- data
- node
- user
- uplink data
- class
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application provides a kind of data processing method of block chain, comprising: the uplink data of the first user is received by first kind node, the data type of uplink data includes structured data and non-structural data;First kind node determines the data type of uplink data;It is structured data in response to uplink data, uplink data progress hash conversion is obtained into transformation data, transformation both data and uplink data is uploaded into one or more of described second class node;It is non-structural data in response to uplink data, uplink data progress hash conversion is obtained into transformation data, transformation data are uploaded into one or more of second class node, uplink data is saved in the local of first kind node.Method provided by the present application reduces the data volume of unstructured data cochain, improves the efficiency that block chain node uploads data.
Description
Technical field
The present invention relates to block chain technologies, more particularly, it is related to the data processing method and system of a kind of block chain.
Background technique
In existing block chain technology, in the block chain for being related to government's relevant portion, the node and net of block chain
Data interaction between network is mostly the mode either reported step by step using end-to-end mode, data/address bus mode.These modes
Construction cost, Change cost, O&M cost it is relatively high, and complex management, interface stability, data accuracy and all
Power and transmission security cannot ensure.
In the prior art, the data on the node of block catenary system, are typically necessary and upload in block catenary system, cause
The data volume for needing to upload is huge, influences the efficiency that node uploads data.
Summary of the invention
Implementation method of the present invention provides a kind of data processing method of block chain, by first kind node be ecological node with
User carries out data interaction, undertakes business processing, carries out data by the second class node, that is, full node and synchronizes, between Quan Jiedian mutually
For backup, high concurrent is supported, improve data response efficiency;Moreover, in the data transmission of ecological node to full node, to structure
Data and the processing of non-structural data classification, by structured data and cryptographic Hash while cochain, for non-structural data, only by cryptographic Hash
Cochain, initial data are retained in node local, are associated by cryptographic Hash, reduce the data volume of unstructured data cochain,
Improve the efficiency that node uploads data.
Embodiment of the present invention in a first aspect, provide a kind of data processing method of block chain, be applied to block linkwork
System, the block catenary system includes first kind node and the second class node, and the first kind node is configured to and multiple second classes
Node carries out data communication, is mutually backups between the second class node, which comprises receives the by first kind node
The uplink data of one user, the data type of the uplink data include structured data and non-structural data;First kind node is true
The data type of the fixed uplink data;It is structured data in response to the uplink data, the uplink data is subjected to Hash
Transformation obtains transformation data, and transformation both the data and the uplink data are uploaded to one in the second class node
Or it is multiple;It is non-structural data in response to the uplink data, uplink data progress hash conversion is obtained into transformation data,
The transformation data are uploaded into one or more of described second class node, by the uplink data in the first kind section
The local of point saves.
In some embodiments of the invention, the uplink data includes the identity data of the first user, including under
One of state or a variety of: marital status, credit information, administrative penalty, tax information, information of vehicles, real estate information and
One of consumption data is a variety of.
In some embodiments of the invention, the first kind node include can be in a variety of applications of running of mobile terminal
Program, every kind of application program are used to upload the identity data of the predetermined kind of the first user.
In some embodiments of the invention, the method also includes: for the uplink data be arranged traffic ID, the industry
The function association of the application program of business ID and the upload uplink data.
In some embodiments of the invention, the method also includes: for the uplink data be arranged data ID, the number
It is distributed after being communicated with the second class node according to ID to ensure uniqueness of the data ID in the block catenary system.
In some embodiments of the invention, the method also includes: the second class node, which receives, passes through described first
The a variety of identity datas for the user that a variety of application programs upload in class node, carry out at participle the identity data
Reason, determines the label of the user according to the result of the word segmentation processing, and by the body of the label of the user and the user
Part mark data associated storage.
In some embodiments of the invention, the method also includes: pass through the first kind node receive second user
Resource access request, the resource access request includes the role attribute of the second user and the data of request, wherein institute
It states role attribute and corresponds to scheduled resource access authority;Described second is returned to the first kind node where the second user to use
The role attribute at family has the request data of access authority.
In some embodiments of the invention, the method also includes: receive the second user and pass through the first kind
The associated data for first user that node uploads, so that the second class node is according to the associated data of first user
Correct the label of first user.
The second aspect of embodiment of the present invention provides a kind of block chain, including first kind node and the second class node, institute
It states first kind node to be configured to carry out data communication with multiple second class nodes, be mutually backups between the second class node, institute
Stating first kind node includes first memory and first processor, and the first memory is stored with computer instruction, and described
One processor is configured to execute the computer instruction to realize the corresponding method of first kind node, and the second class node includes
Second memory and second processor, the second memory are stored with computer instruction, and the second processor is configured to hold
The computer instruction of the row second memory storage is to realize the corresponding method of the second class node.
The third aspect of embodiment of the present invention provides a kind of machine readable storage medium, is stored thereon with computer and refers to
It enables, method described in first aspect is realized when the computer instruction is executed by processor.
Detailed description of the invention
Fig. 1 shows the structural schematic diagram of the block catenary system of embodiment according to the present invention.
Fig. 2 shows the structural schematic diagrams of the block catenary system of embodiment according to the present invention.
Fig. 3 shows the flow diagram of the block chain data processing method of embodiment according to the present invention.
Fig. 4 shows the schematic diagram of the block chain data processing of embodiment according to the present invention.
Fig. 5 shows the structural schematic diagram of the block catenary system of embodiment according to the present invention.
Specific embodiment
It is described in detail to various aspects of the present invention below in conjunction with the drawings and specific embodiments.Wherein, many institute's weeks
Module, unit and its mutual connection, link, communication or the operation known are not shown or do not elaborate.Also, institute
Feature, framework or the function of description can combine in any way in one or more embodiments.Those skilled in the art
Member is it should be appreciated that following various embodiments are served only for the protection scope for example, and is not intended to limit the present invention.May be used also
To be readily appreciated that, module or unit or processing mode in each embodiment described herein and shown in the drawings can by it is various not
It is combined and designs with configuration.
The structural schematic diagram of the block catenary system of embodiment according to the present invention is shown referring to Fig. 1, Fig. 1.The block chain
System 100 may include ecological node 102 and full node 103, Quan Jiedian 104 and full node 105, wherein ecological node is first
Class node, full node are the second class node, and first kind node (i.e. ecological node) interacts, the second class node with user 101
(i.e. full node) is interacted by network and other data transfer modes with ecological node.It should be noted that, although Fig. 1 shows
Block catenary system out only shows 1 ecological node and 3 full nodes, but in the deployment of actual block catenary system, ecology
The number of node and full node can be carried out being arranged accordingly.
In some embodiments of the invention, ecological node can in a block catenary system (for example, government affairs catenary system)
Be it is multiple, each ecological node may include the one or more using journey of the node data acquisition that operation undertakes block chain
Sequence, which can be can be in Intelligent mobile equipment, for example, the mobile devices such as computers such as collection, plate, operation are answered
With program APP.These APP can be the different administrative departments exploitation by government organs, for acquiring different types of data.?
Under such scene, user is common citizen etc..
In some embodiments of the invention, first kind node includes that can apply journey in a variety of of running of mobile terminal
Sequence, identity data of the every kind of application program for the predetermined kind of upload user.For example, some application programs can upload
The biological information of the biological information of user, such as fingerprint, gender, facial information, acoustic information and handwriting information etc, in addition
Some application programs can be with the personal characteristics data of upload user, for example, marital status, credit information, administrative penalty, tax letter
One of breath, information of vehicles, real estate information and consumption data are a variety of.These identity datas, can be user
Itself is uploaded oneself by the application program for being used to upload these identity datas or browser page of oneself downloading,
There can be the staff of government department in government affairs catenary system to upload by its dedicated application program or browsing pages;This
Outside, it is also possible to the staff of related business or enterprises and institutions in government affairs catenary system and passes through application program or browse page
Face uploads.
In other embodiment of the invention, ecological node can also use in the form of browser/server and complete
Node carries out data interaction, these ecological nodes can access the predetermined resource or data in full node by login account.
In the block catenary system of the embodiment of the present invention, full node can be mutually backups, and can use data base set
The form of group, it is synchronous that database can carry out data in real time or according to the scheduled period.For example, can be according to the property of data
Matter, the requirement to real-time select real-time synchronization or cycle synchronisation.These full nodes can use the form of distributed storage
To the uplink data of ecological node saved with it is synchronous.
In some embodiments, these full node deployments multiple administrative regions different in geographical location.For example, can portion
Administration is in different provinces.In other embodiments, full node can also be deployed in the administrative machine of difference of same administrative region
Inside structure facility, for example, revenue department, security department and supervision department etc. can be deployed in.
Fig. 2 shows the structural schematic diagrams of the block catenary system of embodiment according to the present invention.The block catenary system 200 can
Including full node 201, Quan Jiedian 202, Quan Jiedian 203, Quan Jiedian 204, Quan Jiedian 205 and full node 206, ecological node 207,
Ecological node 208, ecological node 209 and ecological node 210, wherein be mutually backups between Quan Jiedian 201 to 206, form one
The system of full node, can be deployed in same geographical location, can also be deployed in different geographical locations, unified external, to life
State node provides service;It may include APP2 and APP3, ecological node 209 that ecological node 207, which may include APP1, ecological node 208,
It may include APP4 and APP5, ecological node 210 may include APP6, these APP can be the APP of different nodes in block chain, example
Such as, source node, storage node, transit node, sale node and the APP of user node etc. be can be, each node can wrap
Include the APP etc. of different vendor.
In other embodiments, Quan Jiedian can be the data being deployed in not in the government affairs catenary system of administrative region
Synchronous and shared distributed server system, ecological node can be the client port that different administrative departments provide the public,
Every kind of port may include one or more clients, these clients upload different uplink datas for user.
The flow diagram of the block chain data processing method of embodiment according to the present invention is shown referring to Fig. 3, Fig. 3,
This method is applied to block catenary system, and the block catenary system includes first kind node and the second class node, the first kind section
Point is configured to carry out data communication with multiple second class nodes, is mutually backups between the second class node, which comprises
Step S301, step S302, step S303 and step S304 are described above-mentioned steps below with reference to specific example.
Step S301, first kind node receive the uplink data of the first user, and the data type of the uplink data includes
Structured data and non-structural data.
In an embodiment of the present invention, first kind node is referred to as ecological node, directly interacts with user,
Undertake the preliminary treatment to business datum.The uplink data of user side is diversified, including structured data and non-structural
Data, wherein structured data may include scheduled data format and data length, convenient in the complete of the network side of block chain
Node is saved and is handled.Non-structural data, for example, the office documents of node side, XML, HTML, all kinds of reports, picture
With audio, video information etc., do not have fixed structure, access is inconvenient, and for government affairs catenary system, such non-structural
Specific gravity shared by data is not small, therefore to the processing of the cochain of unstructured data, is related to the data entirety of government affairs catenary system
Cochain treatment effeciency and the unstructured data treatment effeciency of network side.It should be noted that the first user can
Any one user interacted with ecological node.In government affairs catenary system, at different ecological nodes, corresponding different types of the
One user.
Step S302, first kind node determine the data type of the uplink data.
It in an embodiment of the present invention,, can be with from data type angular divisions as described above, data to uplink data
It is divided into structured data and non-structural data.In some embodiments, it can be determined according to the suffix or agreement field of uplink data
To the data type of uplink data, for example, the uplink data that suffix is XML, HTML and TEXT is non-structural data.In the present invention
Other embodiments in, can also determine the data type of uplink data using other modes, embodiment of the present invention to this not
It limits.
Step S303 is structured data in response to the uplink data, and uplink data progress hash conversion is obtained
Data are converted, both the transformation data and described uplink data are uploaded into one or more of described second class node.
In an embodiment of the present invention, if it is determined that uplink data is structured data, for example, full section can be directly stored in
Data in the wide area information server table of point then directly can carry out hash conversion to the structured data, obtain transformation data,
Will transformation both data and original uplink data be associated, the data after association are then uploaded into full node, can more than
Pass to one or more (for example, being greater than or equal to 2) in full node.In a kind of specific embodiment, data are converted
It can be cryptographic Hash, can be used as a part of original uplink data, for example, identification division.
Step S304 is non-structural data in response to the uplink data, and uplink data progress hash conversion is obtained
To transformation data, the transformation data are uploaded into one or more of described second class node, the uplink data is existed
The local of the first kind node saves.
In an embodiment of the present invention, if it is determined that uplink data is non-structural data, then only that this is non-structured
Uplink data carries out hash conversion, obtains transformation data, and transformation data are only then uploaded to full node, for example, in full node
One or more (for example, be greater than or equal to 2).For non-structured original uplink data, then ecological section is saved in
The local of point.
In a kind of specific embodiment, the data upload of block chain node can be as shown in Figure 4 in government affairs catenary system.Area
Structural data 401 on block chain node can be generated cryptographic Hash 403, and by initial data (i.e. original uplink data) 404
Any one block in government affairs chain block 407,408,409 and 410 is uploaded to together, passes to government affairs chain block in fig. 4, the upper
408.For unstructured data 402, cryptographic Hash 405 is generated, the cryptographic Hash that transformation obtains only then is uploaded into government affairs sequence
Block 408.Initial data 406, i.e., original unstructured data are saved in local file 411.
The block chain data processing method that embodiment of the present invention provides, structural data cochain, unstructured data are breathed out
Uncommon value cochain, initial data retain locally, are associated by cryptographic Hash.This mode saves data space on chain, and on
After the hash value of the non-structural data of chain, it also can be avoided the data being locally stored and be tampered, improve Information Security.
In some embodiments, in the ciphering process of uplink data, public key and private key are used.Specifically, private key is
One 32 byte random number, is made of 64 hexadecimal characters, lower account private key generated of normal condition and its
The exactly like probability of his account is almost nil.
Private key is 256/32 bytes, that is, 64 16 system characters, such as
070fb48e48f0c6488e0491869ce3e556635728f445045731c4d4859e69735a0b
Public key is 512/64 bytes, that is, 128 16 system characters, such as
4c6c17445245c0e8d2df5ef924934d6488797831a694ee77c00f1ea58f44f0d82d1a
594d40097eaed749f230b0cbb36e6656fa500c64eb3ff3b46a6807eb8789
Public key Hash Round Robin data partition is derived from public key, usually a string of ten's digits, that is, KeyID:
4701480943326592696
Wallet address is derived from public key cryptographic Hash:
0470-1480-9433-2659-2696
It should be noted that account: each account is defined by a pair of secret keys on block catenary system, a public key and one
Private key.Private key is secrecy, and public key is all externally disclosed.Wallet is the concept of a comparison image, and an account is usual
It is controlled by private key file, the user for possessing private key can possess the data right to use in the account of corresponding address.Usually handle
The software for managing these digital ciphers is known as " wallet ".The private key file that " backup wallet " can refer to backup account may include
Mnemonic word, Keystore, private key, seed.Paper money packet, the essence of paper money packet are exactly by keystore file or private key with papery
Form save (for example, form of two dimensional code).
In a kind of specific embodiment, wallet address product process can include: random number (entropy) -> mnemonic word -> seed-
> private key -> public key -> wallet address.Wherein, random number can generate mnemonic word by fixed dictionary, fixed dictionary can by with
Family oneself selection.The character string of private key does not have rule that can follow, and readable low is difficult to remember.Data goods is being saved using wallet
When coin, mnemonic word can be used to replace private key.Mnemonic word is equivalent to another form of private key.
Mnemonic word is another form of expression of plaintext private key, and its purpose is to help user to remember complicated private key
(64 cryptographic Hash).Mnemonic word is generally made of 12,15,18,21 words, these words are all derived from a fixed dictionary,
Its genesis sequence is also according to certain algorithm.What mnemonic word was ordered into, and dictionary is very big, permutation and combination is very more, " hits
The probability of word " there's almost no.
The generation of mnemonic word may include following several steps:
1. the random sequence (entropy) that a length is 128~256 (bits) is generated, for example, length is 128bits.
2. taking preceding n after entropy Hash as verification and (n=entropy length/32), for example, n is 4.
3. random sequence+verification and, for example, by the Entropy sequence of 128bits and verification and 4bits combine, obtain
132bits.
4. every 11 cuttings of the result that step 3 obtains, for example, every 11 cuttings of 132bit are obtained 12 pieces
(segments)。
5. the word that every 11 bit byte that step 4 obtains matches fixed dictionary.
6. the result that step 5 obtains is exactly mnemonic(al) word string.
Seed can be generated in mnemonic word, and private key can be generated in seed.In order to generate binary system seed from mnemonic word, use
Hash algorithm encrypts mnemonic word by successive ignition calculating.Certainly be certainly it is irreversible, can prevent collision break
Solution.
The embodiment of the present invention uses elliptic curve data signature algorithm (Elliptic Curve Digital Signature
Algorithm, ECDSA) algorithmic function, by call, key pair (private key and a public key) can be directly generated.Pass through
Public key first carries out SHA-256 Hash operation, and 2. pairs of results carry out SHA-512 Hash operation, and 3. pairs of results carry out 64 circulations
Redundancy check, 4. last progress completions, calculate byte effect and wait operations complementation, finally construct an integer
(KeyID).5. completion is separated into five parts to 20 byte character strings, with "-" number, become XXXX-XXXX-XXXX-XXXX-XXXX
Format.
The embodiment of the present invention is encrypted using the data that Encryption Algorithm uploads ecological node, and the character string of generation can not
It is counter to push away content, and cryptographic Hash is unique, can not distort, and improves the safety and trackability of uplink data.
In some embodiments of the invention, uplink data includes the identity data of the first user, including it is following in
It is one or more: marital status, credit information, administrative penalty, tax information, information of vehicles, real estate information and consumption
One of data are a variety of.The first kind node, i.e., ecological node, including can be in one kind of running of mobile terminal or more
Kind application program, every kind of application program are used to upload the identity data of the predetermined kind of the first user.
It in some embodiments of the invention, can also include: that traffic ID, the traffic ID are set for the uplink data
With the function association for the application program for uploading the uplink data.For example, uplink data can be arranged to corresponding business label,
The business label can be with function association corresponding to the application program.For example, being used for the application of government affairs Lian Zhong XX administrative department
Program corresponds to the function association of the traffic ID of uplink data and the application program of the XX administrative department.A kind of business datum pair
Answer a traffic ID label.Different traffic IDs can be interrelated in block catenary system, passes through the association mark between traffic ID
Know, can determine the topological structure easily determined between each link.
In some embodiments of the invention, the method also includes: for the uplink data be arranged data ID, the number
It is distributed after being communicated with the second class node according to ID to ensure uniqueness of the data ID in the block catenary system.
By the way that data ID is arranged, data can be determined in the record of the links of block chain.
In some embodiments of the present invention, the method also includes: the second class node reception passes through the first kind
The a variety of identity datas for the user that a variety of application programs upload in node, carry out at participle the identity data
Reason, determines the label of the user according to the result of the word segmentation processing, and by the body of the label of the user and the user
Part mark data associated storage.
In some embodiments, a user may include a variety of labels, for example, it may be area label, for example, northern
Capital, Shanghai etc., these regions can indicate birthplace, job site, inhabitation starting point etc..In other embodiments, it marks
Label can also be the label of personal characteristic information, for example, the personnel that break one's promise, Lao Lai etc..
In some embodiments, the identity data of user can be subjected to code storage, and the label of user is put
It is placed in except the coded data of identity data, that is to say, that when accessing the identity data of the user, to the use
The identity data at family is decoded before acquisition, can obtain the label of the user in advance, and such storage mode is convenient
Identity data verifying is carried out by user tag.
For example, the regional label of user A is 110 in full node, corresponding Beijing, if using other labels, for example,
120, corresponding Shanghai, verifying is unsuccessful.In other embodiments, it can be verified by a variety of tag combinations, for example,
Can simultaneously validation region label and first man feature tag.
Label data provided in an embodiment of the present invention can be stored in except the data subject of coding, facilitate acquisition, right
In the verifying of identity data, the label data of user-association can be verified, energy in the case where not decoding data main body
Enough significantly improve the verification efficiency to User Identity data, especially the total amount of data of the identity data of user compared with
Under more scenes.
In some embodiments of the present invention, the method also includes: it receives the second user and passes through the first kind section
The associated data for first user that point uploads, so that the second class node is repaired according to the associated data of first user
The label of just described first user.It should be noted that second user can be in any one use interacted with ecological node
Family.For example, second user can be the staff for managing tentation data in government.In some embodiments, the mark of user
Label are determinations after comprehensive a variety of associated datas, and under such a scenario, the label of user can be according to the user newly uploaded
Associated data be updated, improve label data mark accuracy.
In some embodiments of the present invention, the method also includes: second user is received by the first kind node
Resource access request, the resource access request include the role attribute of the second user and the data of request, wherein described
Role attribute corresponds to scheduled resource access authority;The second user is returned to the first kind node where the second user
Role attribute have access authority request data.Corresponding role can be set in second user, has corresponding data model
It encloses and resource access authority.Each settable corresponding access authorization for resource of role is realized and is controlled the fine granulation of resource.These moneys
Source permission can be configured by function, service and field etc..For example, specification Resource TOC, establishes resource-sharing channel.?
In a kind of specific embodiment, shared resource pond can establish, include module resource, Service Source, data resource in resource pool
And document resources, these resources can enter pond by the node of each block chain.Function privilege can service power with respective modules resource
Limit can be with corresponding data resource and document resources etc. with corresponding with service resource, field.Access of the user to shared resource pond, can
Permission is respectively set to module resource therein, Service Source, data resource and document resources etc., realize to different resource
Fine granulation control.
One role may include the access authority to the different stage of a variety of different resources.For example, role XX, to government affairs
Data resource in the shared resource pond of chain has A grades of access authority, has M grades of access authority to document resources, provides to service
Source has N grades of access authority etc..
Embodiment of the present invention also provides a kind of block catenary system, as shown in figure 5, the block catenary system 500 includes first
Class node 501 and the second class node 502, first kind node can with ecological node described above, can be smart phone,
Tablet computer, PC or laptop etc., the second class node can be full node described above, can be meter
The form of calculation machine or server cluster, is disposed in a distributed fashion.
The first kind node, i.e., ecological node, can be dedicated computer equipment, including 5011 He of first memory
First processor 5012, the first memory are stored with computer instruction, and the first processor is configured to execute the meter
Calculation machine is instructed to realize the corresponding method of first kind node, the second class node, i.e., full node can be dedicated computer
Equipment, including second memory 5021 and second processor 5022, the second memory are stored with computer instruction, and described
Two processors are configured to execute the computer instruction of the second memory storage to realize the corresponding method of the second class node.
Embodiment of the present invention also provides a kind of machine readable storage medium, is stored thereon with computer instruction, described
Methods described above is realized when computer instruction is executed by processor.Wherein, the machine readable storage medium can wrap
The storage medium being contained on first kind node, and may include the storage medium on the second class node.In block catenary system,
These storage mediums are non-volatile storage mediums.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by
The mode of software combination hardware platform is realized.Based on this understanding, technical solution of the present invention makes tribute to background technique
That offers can be embodied in the form of software products in whole or in part, which can store is situated between in storage
In matter, such as ROM/RAM, magnetic disk, CD, including some instructions use is so that a computer equipment (can be individual calculus
Machine, server, smart phone or network equipment etc.) it executes described in certain parts of each embodiment of the present invention or embodiment
Method.
Term and wording used in description of the invention are just to for example, be not intended to constitute restriction.Ability
Field technique personnel should be appreciated that under the premise of not departing from the basic principle of disclosed embodiment, to above embodiment
In each details can carry out various change.Therefore, the scope of the present invention is only determined by claim, in the claims, unless
It is otherwise noted, all terms should be understood by the broadest reasonable meaning.
Claims (10)
1. a kind of data processing method of block chain, which is characterized in that be applied to block catenary system, the block catenary system includes
First kind node and the second class node, the first kind node is configured to carry out data communication with multiple second class nodes, described
It is mutually backups between second class node, which comprises
By first kind node receive the first user uplink data, the data type of the uplink data include structured data and
Non-structural data;
First kind node determines the data type of the uplink data;
It is structured data in response to the uplink data, uplink data progress hash conversion is obtained into transformation data, by institute
It states transformation both data and the uplink data and uploads to one or more of described second class node;
It is non-structural data in response to the uplink data, uplink data progress hash conversion is obtained into transformation data, it will
The transformation data upload to one or more of described second class node, by the uplink data in the first kind node
Local save.
2. the method according to claim 1, wherein the uplink data includes the identity number of the first user
According to, including one of following or a variety of: marital status, credit information, administrative penalty, tax information, information of vehicles, real estate
One of information and consumption data are a variety of.
3. according to the method described in claim 2, it is characterized in that, the first kind node includes can be in running of mobile terminal
A variety of application programs, every kind of application program is used to upload the identity data of the predetermined kind of the first user.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
Traffic ID is set for the uplink data, the function of the traffic ID and the application program for uploading the uplink data is closed
Connection.
5. according to the method described in claim 3, it is characterized in that, the method also includes:
Data ID is set for the uplink data, the data ID is distributed after communicating with the second class node to ensure
State uniqueness of the data ID in the block catenary system.
6. according to the method described in claim 3, it is characterized in that, the method also includes:
The second class node receives a variety of identity marks of the user uploaded by application programs a variety of in the first kind node
Know data, word segmentation processing is carried out to the identity data, the mark of the user is determined according to the result of the word segmentation processing
Label, and by the identity data associated storage of the label of the user and the user.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
The resource access request of second user is received by the first kind node, the resource access request includes described second
The role attribute of user and the data of request, wherein the role attribute corresponds to scheduled resource access authority;
The role attribute for returning to the second user to the first kind node where the second user has asking for access authority
Seek data.
8. the method according to the description of claim 7 is characterized in that the method also includes:
The associated data for first user that the second user is uploaded by the first kind node is received, so as to described
Two class nodes correct the label of first user according to the associated data of first user.
9. a kind of block catenary system, including first kind node and the second class node, the first kind node is configured to and multiple
Two class nodes carry out data communication, are mutually backups between the second class node, the first kind node includes first memory
And first processor, the first memory are stored with computer instruction, the first processor is configured to execute the calculating
Machine is instructed to realize the corresponding method of first kind node, and the second class node includes second memory and second processor, institute
It states second memory and is stored with computer instruction, the second processor is configured to execute the calculating of the second memory storage
Machine is instructed to realize the corresponding method of the second class node.
10. a kind of machine readable storage medium, is stored thereon with computer instruction, the computer instruction is executed by processor
Method described in Shi Shixian claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563833.3A CN109815051A (en) | 2018-12-20 | 2018-12-20 | The data processing method and system of block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563833.3A CN109815051A (en) | 2018-12-20 | 2018-12-20 | The data processing method and system of block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109815051A true CN109815051A (en) | 2019-05-28 |
Family
ID=66601720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811563833.3A Pending CN109815051A (en) | 2018-12-20 | 2018-12-20 | The data processing method and system of block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109815051A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110413762A (en) * | 2019-08-07 | 2019-11-05 | 北京艾摩瑞策科技有限公司 | The cochain method and device thereof of knowledge question associated data |
CN110427431A (en) * | 2019-08-07 | 2019-11-08 | 北京艾摩瑞策科技有限公司 | Service for life associated data processing method and its device on block chain |
CN110427378A (en) * | 2019-08-07 | 2019-11-08 | 北京艾摩瑞策科技有限公司 | It is related to the cochain method and device thereof of internet recruitment associated data |
CN110555783A (en) * | 2019-07-18 | 2019-12-10 | 中国南方电网有限责任公司 | block chain-based power marketing data protection method and system |
CN111127019A (en) * | 2019-12-31 | 2020-05-08 | 江苏恒宝智能系统技术有限公司 | Method, system and device for backing up mnemonic words |
CN111726233A (en) * | 2020-07-30 | 2020-09-29 | 北京共识数信科技有限公司 | Block chain certificate issuing method based on digital identity |
CN112231401A (en) * | 2020-09-27 | 2021-01-15 | 中国建设银行股份有限公司 | Model management method and device based on block chain |
CN112506860A (en) * | 2020-12-15 | 2021-03-16 | 中国银行股份有限公司 | Block chain based collaborative audit method, device and system |
CN112884474A (en) * | 2021-02-19 | 2021-06-01 | 上海源庐加佳信息科技有限公司 | Block chain wallet mnemonic word generating and importing method, system and terminal |
CN113051625A (en) * | 2021-03-24 | 2021-06-29 | 中国工商银行股份有限公司 | Data evidence storing method and device based on block chain |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170031874A1 (en) * | 2015-07-28 | 2017-02-02 | Wesley John Boudville | Blockchain and deep links for mobile apps |
CN106713412A (en) * | 2016-11-09 | 2017-05-24 | 弗洛格(武汉)信息科技有限公司 | Block chain system and construction method of block chain system |
CN107196900A (en) * | 2017-03-24 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of method and device for verification of knowing together |
CN107239479A (en) * | 2017-03-28 | 2017-10-10 | 阿里巴巴集团控股有限公司 | A kind of method and device of data storage and inquiry based on block chain |
CN107748850A (en) * | 2017-10-30 | 2018-03-02 | 北京计算机技术及应用研究所 | A kind of method and system that maintenance of equipment work data is preserved using block chain |
CN107767478A (en) * | 2017-09-06 | 2018-03-06 | 阿里巴巴集团控股有限公司 | A kind of method and device for preserving logging |
CN108234457A (en) * | 2017-12-18 | 2018-06-29 | 苏州涞泽信息科技有限公司 | A kind of credible government data based on block chain shares network system and sharing method |
CN108345685A (en) * | 2018-03-07 | 2018-07-31 | 物数(上海)信息科技有限公司 | More granularity data processing methods, system, equipment and storage medium under block chain |
-
2018
- 2018-12-20 CN CN201811563833.3A patent/CN109815051A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170031874A1 (en) * | 2015-07-28 | 2017-02-02 | Wesley John Boudville | Blockchain and deep links for mobile apps |
CN106713412A (en) * | 2016-11-09 | 2017-05-24 | 弗洛格(武汉)信息科技有限公司 | Block chain system and construction method of block chain system |
CN107196900A (en) * | 2017-03-24 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of method and device for verification of knowing together |
CN107239479A (en) * | 2017-03-28 | 2017-10-10 | 阿里巴巴集团控股有限公司 | A kind of method and device of data storage and inquiry based on block chain |
CN107767478A (en) * | 2017-09-06 | 2018-03-06 | 阿里巴巴集团控股有限公司 | A kind of method and device for preserving logging |
CN107748850A (en) * | 2017-10-30 | 2018-03-02 | 北京计算机技术及应用研究所 | A kind of method and system that maintenance of equipment work data is preserved using block chain |
CN108234457A (en) * | 2017-12-18 | 2018-06-29 | 苏州涞泽信息科技有限公司 | A kind of credible government data based on block chain shares network system and sharing method |
CN108345685A (en) * | 2018-03-07 | 2018-07-31 | 物数(上海)信息科技有限公司 | More granularity data processing methods, system, equipment and storage medium under block chain |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555783A (en) * | 2019-07-18 | 2019-12-10 | 中国南方电网有限责任公司 | block chain-based power marketing data protection method and system |
CN110555783B (en) * | 2019-07-18 | 2023-08-29 | 中国南方电网有限责任公司 | Block chain-based electric power marketing data protection method and system |
CN110413762A (en) * | 2019-08-07 | 2019-11-05 | 北京艾摩瑞策科技有限公司 | The cochain method and device thereof of knowledge question associated data |
CN110427431A (en) * | 2019-08-07 | 2019-11-08 | 北京艾摩瑞策科技有限公司 | Service for life associated data processing method and its device on block chain |
CN110427378A (en) * | 2019-08-07 | 2019-11-08 | 北京艾摩瑞策科技有限公司 | It is related to the cochain method and device thereof of internet recruitment associated data |
CN111127019B (en) * | 2019-12-31 | 2020-10-27 | 江苏恒宝智能系统技术有限公司 | Method, system and device for backing up mnemonic words |
CN111127019A (en) * | 2019-12-31 | 2020-05-08 | 江苏恒宝智能系统技术有限公司 | Method, system and device for backing up mnemonic words |
CN111726233A (en) * | 2020-07-30 | 2020-09-29 | 北京共识数信科技有限公司 | Block chain certificate issuing method based on digital identity |
CN111726233B (en) * | 2020-07-30 | 2023-01-10 | 北京共识数信科技有限公司 | Block chain certificate issuing method based on digital identity |
CN112231401A (en) * | 2020-09-27 | 2021-01-15 | 中国建设银行股份有限公司 | Model management method and device based on block chain |
CN112506860A (en) * | 2020-12-15 | 2021-03-16 | 中国银行股份有限公司 | Block chain based collaborative audit method, device and system |
CN112506860B (en) * | 2020-12-15 | 2024-02-27 | 中国银行股份有限公司 | Collaborative audit method, device and system based on blockchain |
CN112884474A (en) * | 2021-02-19 | 2021-06-01 | 上海源庐加佳信息科技有限公司 | Block chain wallet mnemonic word generating and importing method, system and terminal |
CN113051625A (en) * | 2021-03-24 | 2021-06-29 | 中国工商银行股份有限公司 | Data evidence storing method and device based on block chain |
CN113051625B (en) * | 2021-03-24 | 2024-02-20 | 中国工商银行股份有限公司 | Data storage method and device based on blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109815051A (en) | The data processing method and system of block chain | |
Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
CN109831479A (en) | The data processing method and system of block chain | |
Khan et al. | Smart fir: securing e-fir data through blockchain within smart cities | |
EP4040720A1 (en) | Secure identity card using unclonable functions | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
CN112184444A (en) | Method, apparatus, device and medium for processing information based on information characteristics | |
EP4000218B1 (en) | Method for supporting sharing of travel history of travelers in airports | |
Li et al. | Three-tier storage framework based on TBchain and IPFS for protecting IoT security and privacy | |
Liu et al. | A data preservation method based on blockchain and multidimensional hash for digital forensics | |
CN117313158A (en) | Data processing method and device | |
CN115085934A (en) | Contract management method based on block chain and combined key and related equipment | |
CN112069479B (en) | Face data calling method and device based on block chain | |
Gupta et al. | Secure data access using blockchain technology through IoT cloud and fabric environment | |
CN106254341B (en) | For the data fingerprint extracting method and system of centralized electronic data safety system | |
CN112398861A (en) | Encryption system and method for sensitive data in web configuration system | |
WO2020161203A1 (en) | Identity management on a mobile device | |
Saikumar et al. | Enhancing the Protection of Information in Digital Voting Using Application of Block Chain Technology | |
Santos et al. | Performance analysis of data fragmentation techniques on a cloud server | |
Lavanya et al. | Secured two factor authentication, graph based replication and encryption strategy in cloud computing | |
CN113065171B (en) | Block chain-based big data processing system, method, medium and terminal | |
Li et al. | Privacy protection for medical image management based on blockchain | |
Wu et al. | [Retracted] Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System | |
CN116070191A (en) | Information processing method and device, storage medium, and program product | |
CN105957398A (en) | Parking lot parking space release management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190528 |
|
WD01 | Invention patent application deemed withdrawn after publication |