CN110321730A - A kind of method, block chain node and the storage medium of operation data processing - Google Patents

A kind of method, block chain node and the storage medium of operation data processing Download PDF

Info

Publication number
CN110321730A
CN110321730A CN201910245264.6A CN201910245264A CN110321730A CN 110321730 A CN110321730 A CN 110321730A CN 201910245264 A CN201910245264 A CN 201910245264A CN 110321730 A CN110321730 A CN 110321730A
Authority
CN
China
Prior art keywords
user
common recognition
customer service
block chain
recognition file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910245264.6A
Other languages
Chinese (zh)
Inventor
乐志能
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910245264.6A priority Critical patent/CN110321730A/en
Publication of CN110321730A publication Critical patent/CN110321730A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/178Techniques for file synchronisation in file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Automation & Control Theory (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application involves block chain technical fields, method, block chain node and the storage medium of a kind of operation data processing are provided, the method is applied to block catenary system, the block catenary system includes multiple block chain nodes, the described method includes: obtaining operation data, based on the block catenary system, respectively each user and each customer service create a common recognition file;Common recognition processing is carried out to the operation data, the chat record obtained in real time is synchronized to the common recognition file of the corresponding customer service of chat record, and it is synchronized to the common recognition file of the corresponding user of chat record, so that the chat record synchronized update in the common recognition file of the user and the common recognition file of the customer service about both sides;The access request for receiving user or customer service carries out identification authentication to user or customer service, and after the authentication is passed, corresponding common recognition file is presented to user or customer service.By this programme, the chat record non-repudiation of user and customer service can be realized.

Description

A kind of method, block chain node and the storage medium of operation data processing
Technical field
This application involves method, block chain node and storages that block chain technical field more particularly to operation data are handled Medium.
Background technique
The chat record of customer service and user on current major part APP is all stored in the customer service database of enterprise, when There is ambiguity in communication between user and customer service, or when there is dispute with customer service, user if it is desired to call pervious chat record, Probably due to the risk that permission reason or presence are deliberately deleted by customer service, causes user can not be from customer service database in right-safeguarding True chat record is transferred, user's right is caused to be unable to get guarantee.
Summary of the invention
This application provides method, block chain node and the storage mediums of a kind of processing of operation data, are able to solve existing User's right is unable to get the problem of guarantee in technology.
The application first aspect provides a kind of method of operation data processing, and the method is applied to block catenary system, institute Stating block catenary system includes multiple block chain nodes, which is characterized in that the method is executed by block chain node, the method packet It includes:
Operation data is obtained, the operation data includes the chat note between at least one user and at least one customer service Record;
Based on the block catenary system, respectively each user and each customer service create a common recognition file, described total Know file and refer to the common recognition file of a user Yu at least one customer service, or refers to a customer service and at least one user Common recognition file;
Common recognition processing is carried out to the operation data, the chat record obtained in real time is synchronized to the corresponding visitor of chat record The common recognition file of clothes, and it is synchronized to the common recognition file of the corresponding user of chat record, so that the common recognition of the user Chat record synchronized update in file and the common recognition file of the customer service about both sides;
The access request for receiving user carries out identification authentication to user, and after the authentication is passed, corresponding common recognition is presented to user File;
Alternatively, receiving the access request of customer service, identification authentication is carried out to customer service, after the authentication is passed, presents and corresponds to customer service Common recognition file.
In a kind of possible design, the common recognition file of user and the common recognition file of customer service are distributed account book.
The common recognition file of user and the common recognition file of customer service are by the multiple block chain links for being distributed in different places Point collaboration is completed, and the complete account that each nodes records is traded every time.
It is described to be respectively each user and after each customer service creates a common recognition file in a kind of possible design, The method also includes:
The permission for logging in or checking common recognition file for different user and different customer services setting, is individually for each user or every A customer service setting logs in the account and private key of block chain;
And visible permission or invisible permission are respectively set to different user and different customer services for each common recognition file;
The access request for receiving user carries out identification authentication to user, after the authentication is passed, presents to user corresponding Common recognition file, comprising:
The access request for receiving the first user transmission, to the account and private key of the login block chain of first user input Carry out identification authentication;
After the authentication is passed, the first user of Xiang Suoshu is sent and the matched chat record of the access request.
In a kind of possible design,
The access request that the user sends include the block chain account of user, the block chain account for the customer service put to the proof, At the beginning of the chat record and the end time;
After the access request for receiving user, before the corresponding common recognition file to user's presentation, before, institute State method further include:
Using md5-challenge, according to the block chain account and private key of the user, the block chain for the customer service put to the proof At the beginning of account, the chat record and the end time generates proof number;
Establish it is described put to the proof number and the block chain account and private key of the user, the block chain account for the customer service put to the proof, Mapping relations at the beginning of the chat record and between the end time;
The proof request that the user sends is received, carries the proof number in the proof request;
The proof number is verified, if it exists consistent proof number, it is determined that be proved to be successful;
It is put to the proof number and the mapping relations carry out proof processing according to described, and from the common recognition file under the user name In transfer and the proof number corresponding chat record.
It is described to be respectively each user and after each customer service creates a common recognition file in a kind of possible design, The method also includes:
Disaster tolerance is introduced to each block chain node using snap shot;
When getting the operation data, snapshot processing is carried out to the operation data, the operation data of copy is protected Save as snapshot copy;
After receiving inquiry request, transferred according to the period indicated in the inquiry request corresponding with the period Snapshot copy.
In a kind of possible design, the operation data further includes transaction record, and the common recognition file of user further includes using Transaction record of the family at least one transaction platform;The method also includes:
The removal request of user is received, the removal request deletes the first trade order for requesting;
Identification authentication is carried out to user, after the authentication is passed, deletes the common recognition of all users in the block catenary system The record of the first trade order in file.
In a kind of possible design, the block catenary system includes transaction node, and the transaction node refers to that commodity provide Person;The method also includes:
The modification request of transaction node is received, the modification request is for modifying the second trade order;
Amendment advice is sent respectively to all block chain nodes for participating in second trade order;
After the confirmation message for receiving all block chain nodes for participating in second trade order, asked according to the modification Seek the record for modifying second trade order in the block catenary system in all common recognition files.
The application second aspect provides a kind of block chain node, has the operation realized and correspond to the offer of above-mentioned first aspect The function of the method for data processing.The function it is real can also to execute corresponding software by hardware realization by hardware It is existing.Hardware or software include one or more modules corresponding with above-mentioned function, and the module can be software and/or firmly Part.The block chain node is the node in block catenary system, and in a kind of possible design, the block chain node includes:
Transceiver module, for obtaining operation data, the operation data includes at least one user and at least one customer service Between chat record;
Processing module, for being based on the block catenary system, respectively each user and each customer service create a common recognition File, the common recognition file refers to the common recognition file of a user Yu at least one customer service, or refers to a customer service With the common recognition file of at least one user;
Common recognition processing is carried out to the operation data, is synchronized to the chat record obtained in real time by the transceiver module The common recognition file of the corresponding customer service of chat record, and it is synchronized to the common recognition file of the corresponding user of chat record, so that Obtain the chat record synchronized update in the common recognition file of the user and the common recognition file of the customer service about both sides;
After the access request for receiving user by the transceiver module, identification authentication is carried out to user, after the authentication is passed, to Corresponding common recognition file is presented in user;
Alternatively, by the transceiver module receive customer service access request after, to customer service carry out identification authentication, the authentication is passed Afterwards, corresponding common recognition file is presented to customer service.
In a kind of possible design, the common recognition file of user and the common recognition file of customer service are distributed account book.
The common recognition file of user and the common recognition file of customer service are by the multiple block chain links for being distributed in different places Point collaboration is completed, and the complete account that each nodes records is traded every time.
In a kind of possible design, the processing module is respectively that each user and each customer service create a common recognition file After folder, it is also used to:
The permission for logging in or checking common recognition file for different user and different customer services setting, is individually for each user or every A customer service setting logs in the account and private key of block chain;
And visible permission or invisible permission are respectively set to different user and different customer services for each common recognition file.
In a kind of possible design, the access request that the user sends includes the block chain account of user, is put to the proof At the beginning of the block chain account of customer service, the chat record and the end time;The processing module is in the transceiver module After the access request for receiving user, before corresponding common recognition file is presented to user, it is also used to:
Using md5-challenge, according to the block chain account and private key of the user, the block chain for the customer service put to the proof At the beginning of account, the chat record and the end time generates proof number;
Establish it is described put to the proof number and the block chain account and private key of the user, the block chain account for the customer service put to the proof, Mapping relations at the beginning of the chat record and between the end time;
The proof request that the user sends is received by the transceiver module, carries the proof in the proof request Number;
The proof number is verified, if it exists consistent proof number, it is determined that be proved to be successful;
It is put to the proof number and the mapping relations carry out proof processing according to described, and from the common recognition file under the user name In transfer and the proof number corresponding chat record.
In a kind of possible design, the processing module is respectively that each user and each customer service create a common recognition file After folder, it is also used to:
Disaster tolerance is introduced to each block chain node using snap shot;
When getting the operation data by the transceiver module, snapshot processing is carried out to the operation data, it will The operation data of copy saves as snapshot copy;
After receiving inquiry request by the transceiver module, transferred according to the period indicated in the inquiry request Snapshot copy corresponding with the period.
In a kind of possible design, the operation data further includes transaction record, and the common recognition file of user further includes using Transaction record of the family at least one transaction platform;
The transceiver module is also used to receive the removal request of user, and the removal request deletes the first transaction for requesting Order;
The processing module is also used to carry out identification authentication to user, after the authentication is passed, deletes in the block catenary system The record of the first trade order in the common recognition file of all users.
In a kind of possible design, the block catenary system includes transaction node, and the transaction node refers to that commodity provide Person;
The transceiver module is also used to receive the modification request of transaction node, and the modification request is for modifying the second transaction Order;Amendment advice is sent respectively to all block chain nodes for participating in second trade order;
The processing module is also used to receive all block chains for participating in second trade order in the transceiver module After the confirmation message of node, described the in all common recognition files is modified in the block catenary system according to the modification request The record of two trade orders.
The another aspect of the application provides a kind of block chain node comprising processor, the memory of at least one connection And transceiver, wherein the memory is used to call the program in the memory for storing program code, the processor Code executes method described in above-mentioned first aspect.
The another aspect of the application provides a kind of computer storage medium comprising instruction, when it runs on computers When, so that computer executes method described in above-mentioned first aspect.
Compared to the prior art, in scheme provided by the present application, after obtaining operation data, it is based on the block catenary system, Respectively each user and each customer service create a common recognition file;The chat record obtained in real time is synchronized to chat record The common recognition file of corresponding customer service, and it is synchronized to the common recognition file of the corresponding user of chat record, so that the use Chat record synchronized update in the common recognition file at family and the common recognition file of the customer service about both sides;Receive user or visitor The access request of clothes carries out identification authentication to user or customer service, and after the authentication is passed, corresponding common recognition text is presented to user or customer service Part folder.By this programme, the security mechanism traced to the source can be provided for user, protected user's right, sentenced convenient for later period right-safeguarding Disconnected and evidence obtaining, realizes the chat record non-repudiation of user and customer service.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the method for operation data processing in the embodiment of the present application;
Fig. 2 is a kind of structural schematic diagram of block chain node in the embodiment of the present application;
Fig. 3 is a kind of structural schematic diagram of the embodiment of the present application block chain.
Specific embodiment
It should be appreciated that specific embodiment described herein is not used to limit the application only to explain the application.This The specification and claims of application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing similar right As without being used to describe a particular order or precedence order.It should be understood that the data used in this way in the appropriate case can be with It exchanges, so that the embodiments described herein can be implemented with the sequence other than the content for illustrating or describing herein.In addition, Term " includes " and " having " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a system The process, method, system, product or equipment of column step or module those of are not necessarily limited to be clearly listed step or module, and Being may include other steps or module being not clearly listed or intrinsic for these process, methods, product or equipment, this The division of module appeared in application, only a kind of division in logic can have other when realizing in practical application Division mode, such as multiple modules can be combined into or are integrated in another system, or some features can be ignored, or not held Row.
Method, block chain node and storage medium, the method that the application provides a kind of operation data processing are applied to Block catenary system.Wherein, the block catenary system includes multiple block chain nodes, and block chain node can be the end of user's operation End, is also possible to transaction platform, can also be commodity provider ISP or resource provider.
A kind of linked data structure that data block is combined by block chain in such a way that sequence is connected sequentially in time, And the distributed account book that can not be distorted He can not forge guaranteed in a manner of cryptography.Block chain technology utilizes block chained record knot Structure is known together algorithm with storing data, using distributed node and generates and more new data, protected in the way of cryptography to verify The safety of the transmission of card data and access, programmed using the intelligent contract being made of automatized script code and operation data one Kind completely new distributed basis framework and calculation.Block chain is substantially the database of a disintermediation, while conduct The Floor layer Technology of bit coin is a string of data blocks using the associated generation of cryptography method, contains in each data block The information of bit coin network trading, for verifying the validity (anti-fake) of its information and generating next block.
The each node of block chain stores complete data all in accordance with block chain structure, and traditional distributed storage is usually that will count It is stored according to being divided into more parts according to certain rules.Second is that each node storage of block chain is that independent, status is equivalent, Guarantee the consistency of storage by common recognition mechanism, and traditional distributed storage generally by central node toward other backup nodes Synchrodata.Block chain is also based on common recognition mechanism, requires to reach common understanding between all nodes, assert the account of other nodes records This validity.Node can individually record account book data none of, controlled so as to avoid single book keeping operation people or A possibility that person remembers false account by bribery.Also due to accounting nodes are enough, it is no theoretically except not all node is destroyed Then account would not be lost, to ensure that the safety of account data.
In order to solve the above technical problems, the application it is main the following technical schemes are provided:
Chat message storing user and customer service in a manner of block chain, when user chats with customer service, note The chat record for employing family and customer service, then synchronizes to all users, and each user has the account book of chat record;Work as user When occurring dispute with customer service and disagree, user can search pervious chat record at any time, can provide and trace to the source for user Security mechanism, protect user's right, convenient for later period right-safeguarding judge and collect evidence.
Fig. 1 is please referred to, a kind of method for providing operation data processing to the application below is illustrated, the method Include:
101, operation data is obtained.
Wherein, the operation data includes the chat record between at least one user and at least one customer service.Chat note Record may include photo, text, expression, video or link etc..
102, it is based on the block catenary system, respectively each user and each customer service create a common recognition file.
Wherein, the common recognition file refers to the common recognition file of a user Yu at least one customer service, or refers to one The common recognition file of a customer service and at least one user.
In some embodiments, the common recognition file of user and the common recognition file of customer service are distributed account book.With The common recognition file at family and the common recognition file of customer service are cooperateed with by the multiple block chain nodes for being distributed in different places and are completed, And the complete account that each nodes records is traded every time.As it can be seen that by this common recognition mechanism, these the terrible correlations that can be Block chain node be involved in the legitimacy of supervision transaction and judge, while can also testify jointly for it.
It for example, the common recognition file of user may include the chat record of the user Yu all customer services, and is respectively each Customer service creates individual sub-folder, includes the chat record of the user and a customer service in sub-folder.
It in another example the common recognition file of the customer service includes the chat record of the customer service Yu all users, and is respectively every A user creates individual sub-folder, includes the chat record of the customer service and a user in sub-folder.
103, the chat record obtained in real time is synchronized to the common recognition file of the corresponding customer service of chat record, and synchronous To the common recognition file of the corresponding user of chat record, so that the common recognition text of the common recognition file of the user and the customer service Chat record synchronized update in part folder about both sides.
For example, being based on common recognition mechanism, all reach common understanding between all nodes, so the section where the file of customer service under one's name Point 1 is similarly reached common understanding with the node 2 where the file under user name.Assert having for the chat record of other nodes records Effect property.Node can individually record the chat record between user and customer service, so as to avoid tradition book keeping operation. none of In mode recording mode, because the keeper people of single record chat record control or by bribery due to remembers the chat record of falseness A possibility that, also can be avoided can not put to the proof or deny phenomenon.
104, the access request for receiving user carries out identification authentication to user, after the authentication is passed, presents to user corresponding Common recognition file.In some embodiments, the access request that user sends include user block chain account, the customer service put to the proof Block chain account, at the beginning of the chat record and the end time.The access request that user sends includes packet header and oneself Define field.Wherein, custom field includes fromUid, toUid, startTime and endTime field.Field fromUid Indicate complainant's user name, field toUid indicates complained customer service block chain account name, and field startTime indicates to complain At the beginning of electronic evidence, field endTime indicates to complain the end time of electronic evidence.
Alternatively, the access request of 105, reception customer service, carries out identification authentication to customer service, after the authentication is passed, presented to customer service Corresponding common recognition file.Similarly, the access request that customer service is sent includes the area of the block chain account of customer service, the user put to the proof At the beginning of block chain account, the chat record and the end time.The access request that user sends includes packet header and customized Field.Wherein, custom field includes fromUid, toUid, startTime and endTime field.
Compared with current mechanism, in the embodiment of the present application, after obtaining operation data, it is based on the block catenary system, respectively A common recognition file is created for each user and each customer service;It is corresponding that the chat record obtained in real time is synchronized to chat record Customer service common recognition file, and the common recognition file of the corresponding user of chat record is synchronized to, so that the user Chat record synchronized update in common recognition file and the common recognition file of the customer service about both sides;Receive user or customer service Access request carries out identification authentication to user or customer service, and after the authentication is passed, corresponding common recognition file is presented to user or customer service Folder.By this programme, the security mechanism traced to the source can be provided for user, protects user's right, judged convenient for later period right-safeguarding And evidence obtaining, realize the chat record non-repudiation of user and customer service.
Optionally, in some embodiments of the present application, described is respectively that each user and each customer service create one altogether After knowing file, the method also includes:
The permission for logging in or checking common recognition file for different user and different customer services setting, is individually for each user or every A customer service setting logs in the account and private key of block chain.
Optionally, in some embodiments of the present application, described is respectively that each user and each customer service create one altogether After knowing file, the method also includes:
Visible permission or invisible permission are respectively set to different user and different customer services for each common recognition file.Both it protected The consistency of data is demonstrate,proved, additionally it is possible to reduce the risk that file is cracked and divulges a secret.
Correspondingly, the access request for receiving user, carries out identification authentication to user, after the authentication is passed, is in user Existing corresponding common recognition file, comprising:
The access request for receiving the first user transmission, to the account and private key of the login block chain of first user input Carry out identification authentication;
After the authentication is passed, the first user of Xiang Suoshu is sent and the matched chat record of the access request.
Optionally, in some embodiments of the present application, the account of the login block chain to first user input Number and private key carry out identification authentication, comprising:
Authentication is carried out to first user, after authentication passes through, is verified using the block catenary system, Otherwise, system returns to verifying personnel identity error message, and verifying terminates.
Two dimensional code is sent to first user;
The scan request that first user is directed to the two dimensional code is obtained, the first user of Xiang Suoshu sends and deposits card data Collect, deposit the authorized signature of witness person, deposit the block demonstrate,proved and deposit card transaction described in the information traded in the block catenary system, direction The address chain URL.
According to the digital digest algorithm recorded in two dimensional code recognition result, electronic evidence file and the two dimensional code, use Md5-challenge generates proof number, which can be described as electronic evidence document.
It clicks URL and jumps to common recognition file and check interface, it is literary that the common recognition being directed toward with the block address chain URL will be put to the proof number The proof number of chat record in part folder carries out uniformity comparison, while comparing other element information, if unanimously, showing to know together Chat record in file can be used, and verifying terminates;Otherwise, the chat record in the common recognition file not can be used, verifying Terminate.
Optionally, in some embodiments of the present application, the access request that the user sends includes the block chain of user At the beginning of account, the block chain account for the customer service put to the proof, the chat record and the end time;
After the access request for receiving user, before the corresponding common recognition file to user's presentation, the side Method further include:
Using md5-challenge, according to the block chain account and private key of the user, the block chain for the customer service put to the proof At the beginning of account, the chat record and the end time generates proof number;
Establish it is described put to the proof number and the block chain account and private key of the user, the block chain account for the customer service put to the proof, Mapping relations at the beginning of the chat record and between the end time;
The proof request that the user sends is received, carries the proof number in the proof request;
The proof number is verified, if it exists consistent proof number, it is determined that be proved to be successful;
It is put to the proof number and the mapping relations carry out proof processing according to described, and from the common recognition file under the user name In transfer and the proof number corresponding chat record.
Optionally, in some embodiments of the present application, described is respectively that each user and each customer service create one altogether After knowing file, the method also includes:
Disaster tolerance is introduced to each block chain node using snap shot;
When getting the operation data, snapshot processing is carried out to the operation data, the operation data of copy is protected Save as snapshot copy;
After receiving inquiry request, transferred according to the period indicated in the inquiry request corresponding with the period Snapshot copy.
As it can be seen that can be avoided block chain node failure or damage causes distributed account book to be lost by using disaster tolerance.
Wherein, snapshot refers to that a completely available copy about specified data acquisition system, the copy include that corresponding data exists The image at some time point (time point that copy starts).Snapshot can be a copy of the data represented by it, can also be with It is a duplicate of data.The effect of snapshot is mainly able to carry out online data backup and restores.When storing equipment Quick data recovery can be carried out when application failure or file corruption, and data are restored to the shape at some available time point State.Another effect of snapshot is to provide another data access channel for storage user, when former data are answered online When with processing, the accessible snapshot data of user can also carry out the work such as testing using snapshot.
Optionally, in some embodiments of the present application, the operation data further includes transaction record, the common recognition text of user Part folder further includes transaction record of the user at least one transaction platform;The method also includes:
The removal request of user is received, the removal request deletes the first trade order for requesting;
Identification authentication is carried out to user, after the authentication is passed, deletes the common recognition of all users in the block catenary system The record of the first trade order in file.
Optionally, in some embodiments of the present application, the block catenary system includes transaction node, the transaction node Refer to commodity provider;The method also includes:
The modification request of transaction node is received, the modification request is for modifying the second trade order;
Amendment advice is sent respectively to all block chain nodes for participating in second trade order;
After the confirmation message for receiving all block chain nodes for participating in second trade order, asked according to the modification Seek the record for modifying second trade order in the block catenary system in all common recognition files.
It is right that every technical characteristic mentioned in the various embodiments described above is applied equally to Fig. 2 in the application and Fig. 3 institute The embodiment answered, subsequent similar place repeat no more.
Above to operation data a kind of in the application processing method be illustrated, below to execute aforesaid operations data at The method block chain link point of reason is described.
A kind of structural schematic diagram of block chain node as shown in Figure 2, can be applied to electric business platform, public service platform The platform of equal generations transaction or communication behavior.Block chain node 20 in the embodiment of the present application can be realized corresponding to above-mentioned Fig. 1 In corresponding embodiment the step of the method for performed operation data processing.The function that block chain node 20 is realized can lead to Hardware realization is crossed, corresponding software realization can also be executed by hardware.Hardware or software include one or more and above-mentioned function The corresponding module of energy, the module can be software and/or hardware.The block chain node 20 may include obtaining module 201 With processing module 202, the processing module 202 and the function realization for obtaining module 201 be can refer in embodiment corresponding to Fig. 1 Performed operation, does not repeat herein.Processing module can be used for controlling the transmitting-receiving operation for obtaining module 201.
In some embodiments, the acquisition module 201 can be used for obtaining operation data, and the operation data includes at least Chat record between one user and at least one customer service.
The processing module 202 can be used for based on the block catenary system, respectively each user and each customer service creation One common recognition file, the common recognition file refers to the common recognition file of a user Yu at least one customer service, or refers to The common recognition file of one customer service and at least one user;
Common recognition processing is carried out to the operation data, it is by the transceiver module 201 that the chat record obtained in real time is same The common recognition file of the corresponding customer service of chat record is walked, and is synchronized to the common recognition file of the corresponding user of chat record, So that the chat record synchronized update in the common recognition file of the user and the common recognition file of the customer service about both sides;
After the access request for receiving user by the transceiver module 201, identification authentication is carried out to user, the authentication is passed Afterwards, corresponding common recognition file is presented to user;
Alternatively, by the transceiver module 201 receive customer service access request after, to customer service carry out identification authentication, authentication By rear, corresponding common recognition file is presented to customer service.
In the embodiment of the present application, after transceiver module 201 obtains operation data, processing module 202 is based on the block chain System, respectively each user and each customer service create a common recognition file;The chat record obtained in real time is synchronized to merely It records the common recognition file of corresponding customer service, and is synchronized to the common recognition file of the corresponding user of chat record, so that Chat record synchronized update in the common recognition file of the user and the common recognition file of the customer service about both sides;It receives and uses The access request of family customer service living, carries out identification authentication to user or customer service, after the authentication is passed, presents to user or customer service corresponding Common recognition file.By this programme, the security mechanism traced to the source can be provided for user, protects user's right, be convenient for the later period Right-safeguarding judgement and evidence obtaining, realize the chat record non-repudiation of user and customer service.
In some embodiments, the common recognition file of user and the common recognition file of customer service are distributed account book.
The common recognition file of user and the common recognition file of customer service are by the multiple block chain links for being distributed in different places Point collaboration is completed, and the complete account that each nodes records is traded every time.
In some embodiments, the processing module 202 is respectively that each user and each customer service create a common recognition text After part folder, it is also used to:
The permission for logging in or checking common recognition file for different user and different customer services setting, is individually for each user or every A customer service setting logs in the account and private key of block chain;
Visible permission or invisible permission are respectively set to different user and different customer services for each common recognition file.
In some embodiments, the access request that the user sends include user block chain account, the visitor that is put to the proof At the beginning of the block chain accounts of clothes, the chat record and the end time;The processing module 202 is in the transceiver module After 201 receive the access request of user, before corresponding common recognition file is presented to user, it is also used to:
Using md5-challenge, according to the block chain account and private key of the user, the block chain for the customer service put to the proof At the beginning of account, the chat record and the end time generates proof number;
Establish it is described put to the proof number and the block chain account and private key of the user, the block chain account for the customer service put to the proof, Mapping relations at the beginning of the chat record and between the end time;
The proof request that the user sends is received by the transceiver module 201, in the proof request described in carrying Proof number;
The proof number is verified, if it exists consistent proof number, it is determined that be proved to be successful;
It is put to the proof number and the mapping relations carry out proof processing according to described, and from the common recognition file under the user name In transfer and the proof number corresponding chat record.
In some embodiments, the processing module 202 is respectively that each user and each customer service create a common recognition text After part folder, it is also used to:
Disaster tolerance is introduced to each block chain node using snap shot;
When getting the operation data by the transceiver module 201, snapshot processing is carried out to the operation data, The operation data of copy is saved as into snapshot copy;
After receiving inquiry request by the transceiver module 201, according to the period indicated in the inquiry request Transfer snapshot copy corresponding with the period.
In some embodiments, the operation data further includes transaction record, and the common recognition file of user further includes user In the transaction record of at least one transaction platform;
The transceiver module 201 is also used to receive the removal request of user, and the removal request deletes first for requesting Trade order;
The processing module 202 is also used to carry out identification authentication to user, after the authentication is passed, deletes the block catenary system In all users common recognition file in the first trade order record.
In some embodiments, the block catenary system includes transaction node, and the transaction node refers to commodity provider;
The transceiver module 201 is also used to receive the modification request of transaction node, and the modification request is for modifying second Trade order;Amendment advice is sent respectively to all block chain nodes for participating in second trade order;
The processing module 202 is also used to receive all participation second trade orders in the transceiver module 201 After the confirmation message of block chain node, modified in the block catenary system in all common recognition files according to modification request The record of second trade order.
Describe the block chain node in the embodiment of the present application respectively from the angle of modular functionality entity above, below from Hardware point of view introduces a kind of block chain node, as shown in figure 3, comprising: processor, memory, transceiver (are also possible to input Output unit does not identify in Fig. 3) and storage is in the memory and the computer journey that can run on the processor Sequence.For example, the computer program can be the corresponding program of method of operation data processing in embodiment corresponding to Fig. 1.Example Such as, when block chain node realizes the function of block chain node 20 as shown in Figure 2, the processor executes the computer journey Each step in the method for the operation data processing executed in embodiment corresponding to above-mentioned Fig. 2 by block chain node is realized when sequence Suddenly;Alternatively, the processor realizes the block chain node 20 of embodiment corresponding to above-mentioned Fig. 2 when executing the computer program The function of middle processing module 202, transceiver realize transceiver module in the block chain node 20 of embodiment corresponding to above-mentioned Fig. 2 201 function.
Alleged processor can be central processing unit (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng the processor is the control centre of the computer installation, utilizes various interfaces and the entire computer installation of connection Various pieces.
The memory can be used for storing the computer program and/or module, and the processor is by operation or executes Computer program in the memory and/or module are stored, and calls the data being stored in memory, described in realization The various functions of computer installation.The memory can mainly include storing program area and storage data area, wherein storage program It area can application program (such as sound-playing function, image player function etc.) needed for storage program area, at least one function Deng;Storage data area, which can be stored, uses created data (such as audio data, video data etc.) etc. according to mobile phone.This Outside, memory may include high-speed random access memory, can also include nonvolatile memory, such as hard disk, memory, insert Connect formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash memory Block (Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
The transceiver can also be replaced with receiver and transmitter, can be same or different physical entity.For When identical physical entity, transceiver may be collectively referred to as.The memory can integrate in the processor, can also be with institute Processor is stated to be provided separately.The transceiver can be input-output unit.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, the technical solution of the application substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM), including some instructions are used so that a terminal (can be mobile phone, computer, server or network are set It is standby etc.) execute method described in each embodiment of the application.
Embodiments herein is described above in conjunction with attached drawing, but the application be not limited to it is above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the enlightenment of the application, when not departing from the application objective and scope of the claimed protection, can also it make very much Form, it is all using equivalent structure or equivalent flow shift made by present specification and accompanying drawing content, directly or indirectly Other related technical areas are used in, these are belonged within the protection of the application.

Claims (10)

1. a kind of method of operation data processing, the method are applied to block catenary system, the block catenary system includes multiple Block chain node, which is characterized in that the method is executed by block chain node, which comprises
Operation data is obtained, the operation data includes the chat record between at least one user and at least one customer service;
Based on the block catenary system, respectively each user and each customer service create a common recognition file, the common recognition text Part, which presss from both sides, refers to the common recognition file of a user Yu at least one customer service, or refers to being total to for a customer service and at least one user Know file;
Common recognition processing is carried out to the operation data, the chat record obtained in real time is synchronized to the corresponding customer service of chat record Common recognition file, and it is synchronized to the common recognition file of the corresponding user of chat record, so that the common recognition file of the user Folder and the chat record synchronized update in the common recognition file of the customer service about both sides;
The access request for receiving user carries out identification authentication to user, and after the authentication is passed, corresponding common recognition file is presented to user Folder;
Alternatively, receiving the access request of customer service, identification authentication is carried out to customer service, after the authentication is passed, is presented to customer service corresponding total Know file.
2. the method according to claim 1, wherein the common recognition file of user and the common recognition file of customer service It is distributed account book;
The common recognition file of user and the common recognition file of customer service are assisted by the multiple block chain nodes for being distributed in different places It is same to complete, and the complete account that each nodes records is traded every time.
3. according to the method described in claim 2, it is characterized in that, described is respectively that each user and each customer service create one After common recognition file, the method also includes:
The permission for logging in or checking common recognition file for different user and different customer services setting, is individually for each user or each visitor Clothes setting logs in the account and private key of block chain;
And visible permission or invisible permission are respectively set to different user and different customer services for each common recognition file;
The access request for receiving user carries out identification authentication to user, and after the authentication is passed, corresponding common recognition is presented to user File, comprising:
The access request for receiving the first user transmission carries out the account and private key of the login block chain of first user input Identification authentication;
After the authentication is passed, the first user of Xiang Suoshu is sent and the matched chat record of the access request.
4. according to the method described in claim 2, it is characterized in that,
The access request that the user sends includes the block chain account of user, the block chain account for the customer service put to the proof, described At the beginning of chat record and the end time;
After the access request for receiving user, before the corresponding common recognition file to user's presentation, before, the side Method further include:
Using md5-challenge, according to the block chain account and private key of the user, the block chain account for the customer service put to the proof Number, at the beginning of the chat record and the end time generates and puts to the proof number;
Establish described put to the proof number and the block chain account and private key of the user, the block chain account for the customer service put to the proof, described Mapping relations at the beginning of chat record and between the end time;
The proof request that the user sends is received, carries the proof number in the proof request;
The proof number is verified, if it exists consistent proof number, it is determined that be proved to be successful;
Proof processing is carried out according to the proof number and the mapping relations, and is adjusted from the common recognition file under the user name It takes and the proof number corresponding chat record.
5. method according to any of claims 1-4, which is characterized in that described is respectively each user and each visitor After clothes one common recognition file of creation, the method also includes:
Disaster tolerance is introduced to each block chain node using snap shot;
When getting the operation data, snapshot processing is carried out to the operation data, the operation data of copy is saved as Snapshot copy;
After receiving inquiry request, transferred according to the period indicated in the inquiry request corresponding with the period fast According to copy.
6. method according to any of claims 1-4, which is characterized in that the operation data further includes transaction note Record, the common recognition file of user further includes transaction record of the user at least one transaction platform;The method also includes:
The removal request of user is received, the removal request deletes the first trade order for requesting;
Identification authentication is carried out to user, after the authentication is passed, deletes the common recognition file of all users in the block catenary system The record of the first trade order in folder.
7. according to the method described in claim 6, it is characterized in that, the block catenary system includes transaction node, the transaction Node refers to commodity provider;The method also includes:
The modification request of transaction node is received, the modification request is for modifying the second trade order;
Amendment advice is sent respectively to all block chain nodes for participating in second trade order;
After the confirmation message for receiving all block chain nodes for participating in second trade order, repaired according to modification request Change the record of second trade order in the block catenary system in all common recognition files.
8. a kind of block chain node, the block chain node is the node in block catenary system, which is characterized in that the block chain Node includes:
Transceiver module, for obtaining operation data, the operation data includes between at least one user and at least one customer service Chat record;
Processing module, for being based on the block catenary system, respectively each user and each customer service create a common recognition file Folder, the common recognition file refers to the common recognition file of a user Yu at least one customer service, or refers to customer service and extremely The common recognition file of a few user;
Common recognition processing is carried out to the operation data, the chat record obtained in real time is synchronized to by chat by the transceiver module The common recognition file of corresponding customer service is recorded, and is synchronized to the common recognition file of the corresponding user of chat record, so that institute State the chat record synchronized update in the common recognition file of user and the common recognition file of the customer service about both sides;
After the access request for receiving user by the transceiver module, identification authentication is carried out to user, after the authentication is passed, to user Corresponding common recognition file is presented;
Alternatively, by the transceiver module receive customer service access request after, to customer service carry out identification authentication, after the authentication is passed, Corresponding common recognition file is presented to customer service.
9. a kind of block chain node, which is characterized in that the block chain node includes:
At least one processor, memory and transceiver;
Wherein, the memory is for storing program code, and the processor is for calling the program stored in the memory Code is executed such as method of any of claims 1-7.
10. a kind of computer storage medium, which is characterized in that it includes instruction, when run on a computer, so that calculating Machine executes such as method of any of claims 1-7.
CN201910245264.6A 2019-03-28 2019-03-28 A kind of method, block chain node and the storage medium of operation data processing Pending CN110321730A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910245264.6A CN110321730A (en) 2019-03-28 2019-03-28 A kind of method, block chain node and the storage medium of operation data processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910245264.6A CN110321730A (en) 2019-03-28 2019-03-28 A kind of method, block chain node and the storage medium of operation data processing

Publications (1)

Publication Number Publication Date
CN110321730A true CN110321730A (en) 2019-10-11

Family

ID=68113026

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910245264.6A Pending CN110321730A (en) 2019-03-28 2019-03-28 A kind of method, block chain node and the storage medium of operation data processing

Country Status (1)

Country Link
CN (1) CN110321730A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113095828A (en) * 2021-04-27 2021-07-09 支付宝(杭州)信息技术有限公司 Data evidence storage method and device based on block chain
CN113222344A (en) * 2021-04-15 2021-08-06 卓尔智联(武汉)研究院有限公司 Block chain data processing method and device and storage medium
CN113923178A (en) * 2021-09-30 2022-01-11 在秀网络科技(深圳)有限公司 Method and system for storing and extracting instant messaging and group data files
US11379934B1 (en) * 2020-12-22 2022-07-05 Hui Ju YANG Interactively social media streaming system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101165717A (en) * 2006-10-17 2008-04-23 阿里巴巴公司 Method and system for acquiring electronic evidence
CN106897902A (en) * 2017-02-21 2017-06-27 中链科技有限公司 Service transacting method, system and trading server based on block chain technology
CN107194008A (en) * 2017-06-19 2017-09-22 无锡井通网络科技有限公司 A kind of distributed system quickly updates verification method
US20170289134A1 (en) * 2016-03-30 2017-10-05 Ping Identity Corporation Methods and apparatus for assessing authentication risk and implementing single sign on (sso) using a distributed consensus database
CN108650281A (en) * 2018-02-28 2018-10-12 努比亚技术有限公司 A kind of data managing method, device and computer readable storage medium
CN108717431A (en) * 2018-05-11 2018-10-30 中国科学院软件研究所 A kind of electronic evidence based on block chain deposits card, verification method and system
CN109033475A (en) * 2018-09-10 2018-12-18 湖南智慧政务区块链科技有限公司 A kind of file memory method, device, equipment and storage medium
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain
CN109190331A (en) * 2018-08-20 2019-01-11 电信科学技术第五研究所有限公司 A kind of space instrumentation and command network data trade method based on block chain
CN109325855A (en) * 2018-08-16 2019-02-12 北京京东尚科信息技术有限公司 Block chain network, dispositions method and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101165717A (en) * 2006-10-17 2008-04-23 阿里巴巴公司 Method and system for acquiring electronic evidence
US20170289134A1 (en) * 2016-03-30 2017-10-05 Ping Identity Corporation Methods and apparatus for assessing authentication risk and implementing single sign on (sso) using a distributed consensus database
CN106897902A (en) * 2017-02-21 2017-06-27 中链科技有限公司 Service transacting method, system and trading server based on block chain technology
CN107194008A (en) * 2017-06-19 2017-09-22 无锡井通网络科技有限公司 A kind of distributed system quickly updates verification method
CN108650281A (en) * 2018-02-28 2018-10-12 努比亚技术有限公司 A kind of data managing method, device and computer readable storage medium
CN108717431A (en) * 2018-05-11 2018-10-30 中国科学院软件研究所 A kind of electronic evidence based on block chain deposits card, verification method and system
CN109325855A (en) * 2018-08-16 2019-02-12 北京京东尚科信息技术有限公司 Block chain network, dispositions method and storage medium
CN109190331A (en) * 2018-08-20 2019-01-11 电信科学技术第五研究所有限公司 A kind of space instrumentation and command network data trade method based on block chain
CN109118223A (en) * 2018-08-21 2019-01-01 上海点融信息科技有限责任公司 For managing the method, apparatus and medium of electronic data in block chain
CN109033475A (en) * 2018-09-10 2018-12-18 湖南智慧政务区块链科技有限公司 A kind of file memory method, device, equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11379934B1 (en) * 2020-12-22 2022-07-05 Hui Ju YANG Interactively social media streaming system
CN113222344A (en) * 2021-04-15 2021-08-06 卓尔智联(武汉)研究院有限公司 Block chain data processing method and device and storage medium
CN113095828A (en) * 2021-04-27 2021-07-09 支付宝(杭州)信息技术有限公司 Data evidence storage method and device based on block chain
CN113923178A (en) * 2021-09-30 2022-01-11 在秀网络科技(深圳)有限公司 Method and system for storing and extracting instant messaging and group data files
CN113923178B (en) * 2021-09-30 2024-02-27 在秀网络科技(深圳)有限公司 Method and system for storing and extracting instant messaging and group data files

Similar Documents

Publication Publication Date Title
CN110012015B (en) Block chain-based Internet of things data sharing method and system
US10922772B2 (en) Copyright authorization management method and system
CN110599181B (en) Data processing method, device and equipment based on block chain and storage medium
CN106533696B (en) Identity identifying method, certificate server and user terminal based on block chain
CN110351133A (en) Method and device for the host node hand-off process in block catenary system
CN111464518B (en) Method and device for sending and verifying cross-link communication data
CN110321730A (en) A kind of method, block chain node and the storage medium of operation data processing
CN109961287A (en) A kind of monitoring and managing method and supervisory systems of block chain
CN108416589A (en) Connection method, system and the computer readable storage medium of block chain node
CN116250210A (en) Methods, apparatus, and computer readable media for authentication and authorization of networked data transactions
Zhu et al. Hybrid blockchain design for privacy preserving crowdsourcing platform
CN103888255A (en) Identity authentication method, device and system
CN111897879B (en) Transaction record sharing method and device based on blockchain network and electronic equipment
CN112000744A (en) Signature method and related equipment
CN111866042B (en) Method and device for synchronizing telecommunication account number change
CN109242663A (en) A kind of bookkeeping methods and system based on block chain technology
CN109919614A (en) A kind of method for protecting intelligent contract privacy using zero-knowledge proof in block chain
CN106850693A (en) The method and real-name authentication system of a kind of real-name authentication
CN111934881B (en) Data right determining method and device, storage medium and electronic device
CN113348656A (en) Network transaction verification method based on multiple nodes, system and storage medium thereof
CN111292057A (en) Service processing method based on block chain
CN115277122A (en) Cross-border data flow and supervision system based on block chain
US10867326B2 (en) Reputation system and method
CN111583041A (en) Block chain-based bond issue data storage and verification processing method and device
CN114003959A (en) Decentralized identity information processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination