CN110781200A - Processing method, device, equipment and medium for block chain abnormal data - Google Patents

Processing method, device, equipment and medium for block chain abnormal data Download PDF

Info

Publication number
CN110781200A
CN110781200A CN201911047904.9A CN201911047904A CN110781200A CN 110781200 A CN110781200 A CN 110781200A CN 201911047904 A CN201911047904 A CN 201911047904A CN 110781200 A CN110781200 A CN 110781200A
Authority
CN
China
Prior art keywords
data
transaction request
transaction
processing
shielding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911047904.9A
Other languages
Chinese (zh)
Other versions
CN110781200B (en
Inventor
张苗
孙君意
王玉操
朱月俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201911047904.9A priority Critical patent/CN110781200B/en
Publication of CN110781200A publication Critical patent/CN110781200A/en
Application granted granted Critical
Publication of CN110781200B publication Critical patent/CN110781200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Abstract

The application discloses a method, a device, equipment and a medium for processing block chain abnormal data, and relates to the technical field of block chains. The specific implementation scheme is as follows: determining the dependency data of the transaction request in the process of executing the transaction request; querying the dependent data in a shielded data list; and processing the transaction request according to the shielding state of the dependent data. According to the embodiment of the application, the dependency data is introduced into the transaction request as the basis for determining the abnormal data, the abnormal data is identified according to the query result of the dependency data in the shielding data list, and different transaction requests are processed based on the identification result, so that the abnormal data stored in the block chain is effectively processed, and the influences of irreparability such as error information or illegal records in the block chain on the accuracy and the legality of the data stored in the block chain are avoided.

Description

Processing method, device, equipment and medium for block chain abnormal data
Technical Field
The present application relates to computer technologies, and in particular, to the field of a block chain technology, and in particular, to a method, an apparatus, a device, and a medium for processing abnormal data of a block chain.
Background
The block chain is essentially realized by the technologies of consensus, encryption, p2p communication and the like, and the uplink storage of data is realized and is not falsifiable. However, as each service uses the block chain for data storage, the problem that the uplink data cannot be modified if there is an illegal or wrong data is inevitable.
Therefore, it is possible to make the blockchain platform have security holes or someone use the blockchain to do something that is not in accordance with the conventional, and these wrong information or illegal records cannot be modified once they are linked up.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a medium for processing abnormal data of a block chain, so as to effectively process the abnormal data stored in the block chain.
In a first aspect, an embodiment of the present application provides a method for processing block chain abnormal data, where the method is performed by a block chain node, and the method includes:
determining the dependency data of the transaction request in the process of executing the transaction request;
querying the dependent data in a shielded data list;
and processing the transaction request according to the shielding state of the dependent data.
In the process of executing the transaction request, determining the dependent data of the transaction request; inquiring the dependent data in a shielded data list; the transaction request is processed according to the data dependent mask state. According to the technical scheme, the dependency data is introduced into the transaction request to serve as the basis for determining the abnormal data, the abnormal data is identified according to the query result of the dependency data in the shielding data list, different transaction requests are processed based on the identification result, the abnormal data stored in the block chain is effectively processed, and the influences on the accuracy and the legality of the data stored in the block chain, such as the irreparable error information or illegal record in the block chain, are avoided.
Optionally, processing the transaction request according to the shielding status of the dependent data includes:
if the dependent data is in a shielded state, returning to the execution process of the transaction request to re-determine new dependent data of the transaction request; or
And if the dependent data is in a shielded state, refusing to execute the transaction request.
In an optional implementation manner of the foregoing application, when it is determined that the dependent data is in the masked state, the execution process of the transaction request is returned, and the new dependent data of the transaction request is re-determined, so as to bypass the masked abnormal data, and process the unmasked data, thereby achieving the effect of using the mask for the abnormal data.
In another alternative embodiment of the above application, when the dependent data is determined to be in the masked state, the request for executing the transaction is rejected, so that the use masking of the abnormal data is realized.
Optionally, the dependent data is read data of a transaction request in the form of an intelligent contract; or
The dependency data is input field data of a transaction request in the form of a field.
In the optional embodiments in the above application, the dependency data is refined into read data of the transaction request in the form of an intelligent contract or input field data of the transaction request in the form of a field, so that the type of the transaction request adapted when abnormal data is masked is enriched.
Optionally, querying the dependent data in a masked data list includes:
inquiring the transaction identification of the transaction data to which the dependent data belongs in the shielded data list; the shielding data list records transaction identification and shielding state.
In an optional implementation manner of the foregoing application, query operation on the dependent data in the shielded data list is refined into transaction identifiers according to the transaction data to which the dependent data belongs, and query is performed in the shielded data list in which the correspondence between the transaction identifiers and the shielding states is recorded, so that the form of the content stored in the shielded data list is improved, and a query mechanism for performing query on the shielding states in the shielded data list is completed.
Optionally, the method further includes:
acquiring a shielded data processing transaction request initiated based on a shielded intelligent contract;
executing the shielded data processing transaction request, operating the shielded data list to generate shielded data processing transaction data, and uplink storing;
wherein the operations performed on the masked data processing transaction request include: at least one of adding masked data, unmasked data, and querying masked data.
In each optional embodiment in the above application, at least one of adding, removing, and querying the masked data in the masked data list is implemented by acquiring and executing the masked data processing transaction request, so that the masked data list is updated and used.
Optionally, the process of executing the data processing transaction request includes:
if the initiating account of the data processing transaction shielding request is a set account, the data processing transaction shielding request is confirmed to be valid; and/or
And if the voting result of the data processing transaction request meets the set requirement, the data processing transaction request is confirmed to be valid.
In each optional embodiment in the above application, in the process of executing the masked data processing transaction request, a comparison operation on the initiating account and/or the voting result is added, so that the validity of the masked data processing transaction request is determined, the masked data processing transaction request is screened through the validity, the condition for executing the masked data processing transaction request is limited, and the influence of any modification of the masked data on the accuracy of the data stored in the block chain is avoided.
Optionally, executing the masked data processing transaction request, and operating the masked data list to generate masked data processing transaction data includes:
executing the shielded data processing transaction request, and acquiring a specified transaction identifier from the shielded data processing transaction request as shielded data to be operated; or
And executing the data shielding transaction request, and screening block chain historical transaction data according to the shielding operation conditions in the data shielding transaction request to determine to-be-operated shielding data.
In an optional implementation manner in the above application, the execution process of the transaction request for processing the masked data is refined to obtain the specified transaction identifier from the transaction request for processing the masked data, or data is screened from the block chain historical transaction data according to the masking operation condition, so as to implement operations such as masking addition, masking removal, masking query and the like on the instruction data or the data meeting the condition, thereby enriching the determination manner of the content of the operator.
In a second aspect, an embodiment of the present application further provides an apparatus for processing blockchain exception data, where the apparatus is configured at a blockchain node, and the apparatus includes:
the dependent data determining module is used for determining the dependent data of the transaction request in the process of executing the transaction request;
the dependent data query module is used for querying the dependent data in a shielded data list;
and the transaction request processing module is used for processing the transaction request according to the shielding state of the dependent data.
In a third aspect, an embodiment of the present application further provides an electronic device, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute a method for processing block chain exception data as provided in an embodiment of the first aspect.
In a fourth aspect, the present application further provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute a processing method of block chain exception data as provided in the embodiments of the first aspect.
Other effects of the above-described alternative will be described below with reference to specific embodiments.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 is a flowchart of a method for processing block chaining abnormal data according to a first embodiment of the present application;
fig. 2 is a flowchart of a method for processing block chaining abnormal data according to a second embodiment of the present application;
fig. 3 is a block chain abnormal data processing apparatus according to a third embodiment of the present application;
fig. 4 is a block diagram of an electronic device for implementing a method for processing block chain exception data according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Example one
Fig. 1 is a flowchart of a method for processing blockchain abnormal data in one embodiment of the present application, where the embodiment of the present application is applied to a case where abnormal data such as error data and illegal data stored in a blockchain network is processed, and the method is executed by a device for processing blockchain abnormal data, where the device is implemented by software and/or hardware and is specifically configured in an electronic device carrying a blockchain node.
A method for processing block chain exception data as shown in fig. 1 includes:
s101, determining the dependency data of the transaction request in the process of executing the transaction request.
The transaction request can be a transaction request in the form of an intelligent contract and/or a transaction request in the form of a field.
Where the dependent data may be data upon which the transaction request is executed. Illustratively, it may be input data and/or output data when executing a transaction request. Wherein, the input data can be carried in the transaction request and directly obtained by analyzing the transaction request; the input data or the output data may be determined by performing a pre-execution of the transaction request prior to executing the transaction request and by a result of the pre-execution.
If the transaction request is in the form of an intelligent contract, reading data of the transaction request with the dependence data in the form of the intelligent contract correspondingly; if the transaction request is a field-type transaction request, the dependency data is the input field data of the field-type transaction request. For example, when the transaction request is an unspent transaction output (UTXO), the input field data may be an input account address and/or an output account address, respectively.
For example, the transaction request may be a transaction data acquisition transaction request, and correspondingly, the dependency data may be a transaction identifier corresponding to the acquired transaction data. For another example, the transaction request may be a function call transaction request, and accordingly, the dependency data may be input data of the smart contract corresponding to the called function. For another example, the transaction request may be a block data query transaction request, and correspondingly, the dependency data may be a transaction identifier of each transaction data included in the queried block.
And S102, inquiring the dependent data in a shielded data list.
The shielding data list stores the corresponding relationship between the dependent data in the block chain and the shielding state in advance, and the shielding state corresponding to the dependent data can be inquired in the shielding data list according to the corresponding relationship.
For example, in order to simplify the data content stored in the masked data list, the masked data may be stored only in the masked data list, so that when the dependent data is queried in the masked data list, it indicates that the dependent data is in a masked state; when the dependent data is not searched in the masked data list, the dependent data is in an unmasked state.
It is understood that, in order to reduce the data storage amount in the mask data list, the mask data may be embodied in the mask data list in the form of identification information. Typically, the transaction identifier of the transaction data to which the abnormal dependency data belongs is stored in the mask data list instead of the dependency data, that is, the transaction identifier and the mask status are recorded in the mask data list.
Correspondingly, the dependent data is queried in the shielded data list, which may be to query the transaction identifier of the transaction data to which the dependent data belongs in the shielded data list.
Specifically, the dependent data is queried in the masked data list, so as to determine the masking state of the dependent data in the masked data list.
For example, if the dependent data is a transaction identifier corresponding to the transaction data acquired in the transaction data acquisition transaction request, if the transaction identifier is recorded in the masked data list, it is determined that the dependent data is in a masked state.
For another example, if the dependent data is input data of the intelligent contract corresponding to the kinetic energy called by the function call transaction request, the input data is transaction data stored in the block chain, and if the transaction identifier of the transaction data corresponding to the input data is recorded in the mask data list, it is determined that the dependent data is in the masked state.
For another example, if the dependent data is the block id of the white query block in the block data query transaction request, if the transaction id corresponding to the transaction data contained in the merkel tree of the block is recorded in the mask data list, it is determined that the dependent data is in the masked state.
S103, processing the transaction request according to the shielding state of the dependent data.
In an optional implementation manner of the embodiment of the present application, the transaction request is processed according to the mask status of the dependent data, which may be returning to an execution process of the transaction request to re-determine new dependent data of the transaction request if the dependent data is in the mask status.
For example, when a user a transfers a set number of blockchain circulation elements to a user B, if some non-spent circulation elements in the user a are transferred by the user C, but the user account of the user C is in a shielded state, other non-spent circulation elements unrelated to the user C need to be searched from the user a to perform a transfer transaction.
It can be appreciated that the use of masking of exception data in a masked state is achieved by actively bypassing dependent data in the masked state when processing transaction requests.
In another optional implementation manner of the embodiment of the present application, the transaction request is processed according to the mask state of the dependent data, and the transaction request may be rejected to be executed if the dependent data is in the mask state.
It can be appreciated that the use of masked packed dependent data is enabled by directly rejecting execution of the masked dependent data when processing a transaction request.
In the process of executing the transaction request, determining the dependent data of the transaction request; inquiring the dependent data in a shielded data list; the transaction request is processed according to the data dependent mask state. According to the technical scheme, the dependency data is introduced into the transaction request to serve as the basis for determining the abnormal data, the abnormal data is identified according to the query result of the dependency data in the shielding data list, different transaction requests are processed based on the identification result, the abnormal data stored in the block chain is effectively processed, and the influences on the accuracy and the legality of the data stored in the block chain, such as the irreparable error information or illegal record in the block chain, are avoided.
Example two
Fig. 2 is a flowchart of a method for processing block chain anomaly data in the second embodiment of the present application, and the second embodiment of the present application performs optimization and improvement on the basis of the technical solutions of the foregoing embodiments.
Furthermore, in the process of processing the abnormal data of the block chain, additionally acquiring a shielded data processing transaction request initiated based on a shielded intelligent contract; executing the shielded data processing transaction request, operating the shielded data list to generate shielded data processing transaction data, and uplink storing; wherein the operations performed on the masked data processing transaction request include: and at least one item of the masked data is added, the masked data is removed and the masked data is inquired, so that the masked data in the masked data list corresponding to the block chain is processed.
A method for processing block chain exception data as shown in fig. 2 includes:
s201, a shielded data processing transaction request initiated based on the shielded intelligent contract is obtained.
The intelligent shielding contract is used for maintaining a shielding data list or performing operations such as query by using the shielding data list.
It will be appreciated that in order to generate a transaction request that can be handled by a masking intelligence contract, the generation of a masking data processing transaction request needs to be performed based on the masking intelligence contract.
S202, executing the request for the masked data processing transaction, operating the masked data list to generate masked data processing transaction data, and uploading the masked data processing transaction data for storage.
Wherein the operations performed on the masked data processing transaction request include: at least one of adding masked data, unmasked data, and querying masked data.
In an optional implementation manner of the embodiment of the present application, if the data shielding transaction request is a data shielding transaction request; correspondingly, the operation performed on the mask data list is as follows: and adding the shielding data in the shielding data list. For example, the transaction identifier of the transaction data to which the data to be masked belongs may be added to the masked data list.
In another optional implementation manner of the embodiment of the present application, if the data transaction request is a unmasked transaction request; accordingly, the masked data manifest is operated to: unmasked data in the masked data list. For example, the transaction identifier of the transaction data to which the mask data recorded in the mask data list belongs may be deleted.
In yet another optional implementation manner of the embodiment of the present application, if the data transaction shielding request is a query transaction shielding request; correspondingly, the operation performed on the mask data list is as follows: and inquiring the shielding state corresponding to the data to be inquired through the shielding data list. For example, whether the transaction identifier of the transaction data to which the data to be queried belongs is recorded in the masked data list or not can be queried; if yes, the shielding state of the data to be inquired is the shielded state, namely the data to be inquired is the shielded data; if not, the shielding state of the data to be queried is indicated to be an unmasked state, that is, the data to be queried is not the shielded data.
In order to reduce the use permission of a user who maintains and uses the shielding data list and reduce the influence of unnecessary shielding operation on data in the block chain on the transparency of the data stored in the block chain, the voting condition of an initiating account and/or each participant of the shielding data processing transaction request can be compared and determined in the process of executing the shielding data processing transaction request, the validity of the shielding data processing transaction request is determined according to the comparison result, and only the valid shielding data processing transaction request is processed subsequently.
In an optional implementation manner of the embodiment of the present application, an initiating account for shielding a data processing transaction request may be determined, and the initiating account is compared with a set account; and if the initiating account of the data processing transaction request is the set account, confirming that the data processing transaction request is valid.
In another optional implementation manner of the embodiment of the present application, a voting condition of each participant of the data processing transaction request may also be determined; and if the voting result of each participant meets the set requirement, the request for shielding the data processing transaction is confirmed to be effective.
For example, the voting result meets the setting requirement, and may be: the ratio of the number of the support votes to the total number of votes satisfies a set proportion threshold. Or, optionally, the voting result meets the setting requirement, and may also be: presetting voting weights of different participants, determining a final voting result according to the product of the voting conditions of the different participants and the voting weights, and determining that the voting result meets the set requirement if the final voting result meets the set proportion threshold. The setting proportion threshold value can be set by a block chain creator in the initial stage of block chain creation according to needs; the voting weights of different participants can be set when each blockchain node participates in the blockchain network.
Specifically, when the masked data processing transaction request is executed, the masked data to be operated needs to be determined, and the masked data list is operated based on the determined masked data to be operated, so as to generate the masked data processing transaction data, and the masked data processing transaction data is uplink stored.
For example, in the process of executing the masked data processing transaction request, when the masked data to be operated is determined, the executed transaction identifier may be obtained from the masked data processing transaction request as the masked data to be operated.
Specifically, when a data shielding transaction request is generated based on a shielding intelligent contract, a transaction identifier of transaction data to which data to be shielded belongs is added to the data shielding transaction request; correspondingly, when the block chain node processes the data processing transaction shielding request, the data processing transaction shielding request is analyzed to obtain a transaction identifier, and the obtained transaction identifier is used as the to-be-operated shielding data.
It can be understood that the precise positioning of the mask data can be realized by the mode of mask data specification, and the execution efficiency of executing the mask data processing transaction request is improved. Preferably, the specification of the masked data may be made by an administrative account that is granted a particular privilege.
For example, when the to-be-operated mask data is determined in the process of executing the mask data processing transaction request, the to-be-operated mask data may be further determined by performing screening in the block chain historical transaction data according to the mask operation condition in the mask data processing transaction request.
Specifically, when a data shielding transaction request is generated based on a shielding intelligent contract, a shielding operation condition corresponding to data to be shielded is added to the data shielding transaction request; correspondingly, when the block chain node processes the data processing transaction shielding request, the block chain node analyzes the data processing transaction shielding request to obtain a shielding operation condition; and screening the block chain historical transaction data based on the shielding operation condition, and taking the screened shielding data as the shielding data to be operated.
Wherein the operation condition is determined by the initiating account of the data processing transaction request or the voting participant of the data processing transaction request according to the requirement. Optionally, the masking operation condition may include, but is not limited to, a block height interval, or transaction data containing specified data, etc.
For example, when the masking operation condition includes a block height interval, if abnormal data corresponding to the masked data processing transaction request is first uplink stored in a 100 th block in the block chain, and a vote is initiated to each block link point by the initiating account at a 180 th block, and a vote result is required to be counted at the 200 th block; if it is determined that the abnormal data needs to be masked in the 200 th block, the transaction identifier of the transaction data to which the abnormal data belongs between the 100 th block and the 200 th block may be used as the masking data to be operated from the time of generating the abnormal data. It is understood that, in order to reduce the influence range of the masking operation in the block chain, the transaction identifier of the transaction data to which the abnormal data belongs may also be used as the masking data to be operated from the time when the data is suspected (i.e. from block 180 to block 200), or from the time when the data is determined to be abnormal (i.e. from block 200 and other blocks thereafter).
For example, when it is determined that a certain account is an abnormal account, a transaction identifier corresponding to historical transaction data of the abnormal account included in the blockchain may be designated as the mask data to be operated.
S203, determining the dependent data of the transaction request in the process of executing the transaction request.
And S204, inquiring the dependent data in a shielded data list.
S205, processing the transaction request according to the shielding state of the dependent data.
It should be noted that, S201 to S202 correspond to a process of operating on the masked data list; S203-S205 correspond to the use of the masked data list. Therefore, S203 to S205 may be executed before S201 to S202, that is, the masked data list after the previous operation is used for query; or, S203 to S205 may be executed after S201 to S202, that is, the masked data list after the current operation is used for querying, and the specific sequence of executing the two is not limited in this embodiment of the application.
In the embodiment of the application, in the processing process of abnormal data of the block chain, an obtaining operation of a shielding data processing transaction request is added, the obtained shielding data processing transaction request is executed, a shielding data list is operated to generate shielding data processing transaction data, and the shielding data processing transaction data is uplink stored, so that the updating and the use in the shielding data list are realized, and the shielding data list can meet the shielding requirements of the block chain in different time periods in the whole life cycle.
EXAMPLE III
Fig. 3 is a structural diagram of a device for processing blockchain abnormal data in a third embodiment of the present application, where the third embodiment of the present application is applied to a case where abnormal data such as error data and illegal data stored in a blockchain network is processed, and the device is implemented by software and/or hardware and is specifically configured in an electronic device carrying a blockchain node.
Fig. 3 shows an apparatus 300 for processing blockchain exception data, which includes: a dependent data determination module 301, a dependent data query module 302, and a transaction request processing module 303. Wherein the content of the first and second substances,
a dependent data determining module 301, configured to determine, in a process of executing a transaction request, dependent data of the transaction request;
a dependent data query module 302, configured to query the dependent data in a masked data list;
a transaction request processing module 303, configured to process the transaction request according to the shielding state of the dependent data.
In the process of executing the transaction request, the dependent data of the transaction request is determined by the dependent data determining module; inquiring the dependent data in a shielded data list through a dependent data inquiry module; and processing the transaction request according to the shielding state of the dependent data through the transaction request processing module. According to the technical scheme, the dependency data is introduced into the transaction request to serve as the basis for determining the abnormal data, the abnormal data is identified according to the query result of the dependency data in the shielding data list, different transaction requests are processed based on the identification result, the abnormal data stored in the block chain is effectively processed, and the influences on the accuracy and the legality of the data stored in the block chain, such as the irreparable error information or illegal record in the block chain, are avoided.
Further, the transaction request processing module 303 is specifically configured to:
if the dependent data is in a shielded state, returning to the execution process of the transaction request to re-determine new dependent data of the transaction request; or
And if the dependent data is in a shielded state, refusing to execute the transaction request.
Further, the dependent data is read data of a transaction request in the form of an intelligent contract; or
The dependency data is input field data of a transaction request in the form of a field.
Further, the dependent data query module 302 is specifically configured to:
inquiring the transaction identification of the transaction data to which the dependent data belongs in the shielded data list; the shielding data list records transaction identification and shielding state.
Further, the device further comprises a shielded data list operation module, which is specifically configured to:
acquiring a shielded data processing transaction request initiated based on a shielded intelligent contract;
executing the shielded data processing transaction request, operating the shielded data list to generate shielded data processing transaction data, and uplink storing;
wherein the operations performed on the masked data processing transaction request include: at least one of adding masked data, unmasked data, and querying masked data.
Further, the masked data manifest operation module, during the process of executing the masked data processing transaction request, is further configured to:
if the initiating account of the data processing transaction shielding request is a set account, the data processing transaction shielding request is confirmed to be valid; and/or the presence of a gas in the gas,
and if the voting result of the data processing transaction request meets the set requirement, the data processing transaction request is confirmed to be valid.
Further, the operation module for shielding the data list performs the following operations: executing the request for processing the transaction with the masked data, and operating the masked data list to generate the transaction data with the masked data, specifically configured to:
executing the shielded data processing transaction request, and acquiring a specified transaction identifier from the shielded data processing transaction request as shielded data to be operated; or
And executing the data shielding transaction request, and screening block chain historical transaction data according to the shielding operation conditions in the data shielding transaction request to determine to-be-operated shielding data.
The processing device for processing the block chain abnormal data can execute the processing method for the block chain abnormal data provided by any embodiment of the application, and has the corresponding functional modules and the beneficial effects of executing the processing method for the block chain abnormal data.
Example four
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
As shown in fig. 4, the block chain exception data processing method according to the embodiment of the present application is implemented in an electronic device. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 4, the electronic apparatus includes: one or more processors 401, memory 402, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 4, one processor 401 is taken as an example.
Memory 402 is a non-transitory computer readable storage medium as provided herein. The memory stores instructions executable by at least one processor to cause the at least one processor to execute the processing method of block chain exception data provided by the application. The non-transitory computer-readable storage medium of the present application stores computer instructions for causing a computer to execute the processing method of block chain anomaly data provided by the present application.
The memory 402, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the processing method of the blockchain exception data in the embodiment of the present application (for example, the processing apparatus 300 of the blockchain exception data, which includes the dependency data determination module 301, the dependency data query module 302, and the transaction request processing module 303, shown in fig. 3). The processor 401 executes various functional applications of the server and data processing, i.e., a processing method of the block chain exception data in the above-described method embodiment, by executing the non-transitory software program, instructions, and modules stored in the memory 402.
The memory 402 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by use of an electronic device that performs a processing method of block chaining exception data, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 402 may optionally include a memory remotely located from the processor 401, and these remote memories may be connected over a network to an electronic device that performs the processing method of the blockchain exception data. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device performing the processing method of the block chain exception data may further include: an input device 403 and an output device 404. The processor 401, the memory 402, the input device 403 and the output device 404 may be connected by a bus or other means, and fig. 4 illustrates an example of a connection by a bus.
The input device 403 may receive input numeric or character information and generate key signal inputs related to user settings and function control of an electronic apparatus performing a processing method of block chain anomaly data, such as an input device of a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, or the like. The output devices 404 may include a display device, auxiliary lighting devices (e.g., LEDs), and haptic feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the dependent data of the transaction request is determined in the process of executing the transaction request; inquiring the dependent data in a shielded data list; the transaction request is processed according to the data dependent mask state. According to the technical scheme, the dependency data is introduced into the transaction request to serve as the basis for determining the abnormal data, the abnormal data is identified according to the query result of the dependency data in the shielding data list, different transaction requests are processed based on the identification result, the abnormal data stored in the block chain is effectively processed, and the influences on the accuracy and the legality of the data stored in the block chain, such as the irreparable error information or illegal record in the block chain, are avoided.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A method for processing block chain exception data, performed by a block chain node, the method comprising:
determining the dependency data of the transaction request in the process of executing the transaction request;
querying the dependent data in a shielded data list;
and processing the transaction request according to the shielding state of the dependent data.
2. The method of claim 1, wherein processing the transaction request according to the data-dependent masking state comprises:
if the dependent data is in a shielded state, returning to the execution process of the transaction request to re-determine new dependent data of the transaction request; or
And if the dependent data is in a shielded state, refusing to execute the transaction request.
3. The method of claim 1, wherein:
the dependent data is read data of a transaction request in an intelligent contract form; or
The dependency data is input field data of a transaction request in the form of a field.
4. The method of claim 1, wherein querying the dependency data in a masked data manifest comprises:
inquiring the transaction identification of the transaction data to which the dependent data belongs in the shielded data list; the shielding data list records transaction identification and shielding state.
5. The method of any of claims 1-4, further comprising:
acquiring a shielded data processing transaction request initiated based on a shielded intelligent contract;
executing the shielded data processing transaction request, operating the shielded data list to generate shielded data processing transaction data, and uplink storing;
wherein the operations performed on the masked data processing transaction request include: at least one of adding masked data, unmasked data, and querying masked data.
6. The method of claim 5, wherein performing the masked data processing transaction request comprises:
if the initiating account of the data processing transaction shielding request is a set account, the data processing transaction shielding request is confirmed to be valid; and/or the presence of a gas in the gas,
and if the voting result of the data processing transaction request meets the set requirement, the data processing transaction request is confirmed to be valid.
7. The method of claim 5, wherein executing the masked data processing transaction request, operating on the masked data manifest to generate masked data processing transaction data comprises:
executing the shielded data processing transaction request, and acquiring a specified transaction identifier from the shielded data processing transaction request as shielded data to be operated; or
And executing the data shielding transaction request, and screening block chain historical transaction data according to the shielding operation conditions in the data shielding transaction request to determine to-be-operated shielding data.
8. An apparatus for processing blockchain exception data, the apparatus configured to be located at a blockchain node, the apparatus comprising:
the dependent data determining module is used for determining the dependent data of the transaction request in the process of executing the transaction request;
the dependent data query module is used for querying the dependent data in a shielded data list;
and the transaction request processing module is used for processing the transaction request according to the shielding state of the dependent data.
9. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of processing block chain exception data as claimed in any one of claims 1 to 7.
10. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform a method of processing block chain anomaly data according to any one of claims 1 to 7.
CN201911047904.9A 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data Active CN110781200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911047904.9A CN110781200B (en) 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911047904.9A CN110781200B (en) 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data

Publications (2)

Publication Number Publication Date
CN110781200A true CN110781200A (en) 2020-02-11
CN110781200B CN110781200B (en) 2022-07-08

Family

ID=69387894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911047904.9A Active CN110781200B (en) 2019-10-30 2019-10-30 Processing method, device, equipment and medium for block chain abnormal data

Country Status (1)

Country Link
CN (1) CN110781200B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111405074A (en) * 2020-06-08 2020-07-10 南京邮电大学 Data center network fault diagnosis and automatic configuration method based on hybrid chain
CN114124641A (en) * 2021-11-26 2022-03-01 成都质数斯达克科技有限公司 Block chain abnormal service processing method, device, equipment and readable storage medium
CN115388931A (en) * 2022-10-27 2022-11-25 河北省科学院应用数学研究所 Credible monitoring method, monitoring terminal and storage medium for sensor abnormal data

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931646A (en) * 2010-08-04 2010-12-29 宇龙计算机通信科技(深圳)有限公司 Internet brows management method, system and terminal
CN104580244A (en) * 2015-01-26 2015-04-29 百度在线网络技术(北京)有限公司 Method and device for defending against malicious click
US20180285996A1 (en) * 2017-04-03 2018-10-04 FutureLab Consulting Inc. Methods and system for managing intellectual property using a blockchain
US20180329940A1 (en) * 2017-05-12 2018-11-15 American Express Travel Related Services Company, Inc. Triggering of distributed data deletion
CN109003078A (en) * 2018-06-27 2018-12-14 阿里巴巴集团控股有限公司 Intelligent contract call method and device, electronic equipment based on block chain
US20190036682A1 (en) * 2017-07-26 2019-01-31 Alibaba Group Holding Limited Secure communications in a blockchain network
CN109615372A (en) * 2018-11-08 2019-04-12 立旃(上海)科技有限公司 Block chain data mask method and device based on intelligent contract
CN110119429A (en) * 2019-04-22 2019-08-13 矩阵元技术(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN110377697A (en) * 2019-06-19 2019-10-25 平安国际智慧城市科技股份有限公司 Update method, device, equipment and the storage medium of metadata standard

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101931646A (en) * 2010-08-04 2010-12-29 宇龙计算机通信科技(深圳)有限公司 Internet brows management method, system and terminal
CN104580244A (en) * 2015-01-26 2015-04-29 百度在线网络技术(北京)有限公司 Method and device for defending against malicious click
US20180285996A1 (en) * 2017-04-03 2018-10-04 FutureLab Consulting Inc. Methods and system for managing intellectual property using a blockchain
US20180329940A1 (en) * 2017-05-12 2018-11-15 American Express Travel Related Services Company, Inc. Triggering of distributed data deletion
US20190036682A1 (en) * 2017-07-26 2019-01-31 Alibaba Group Holding Limited Secure communications in a blockchain network
CN109003078A (en) * 2018-06-27 2018-12-14 阿里巴巴集团控股有限公司 Intelligent contract call method and device, electronic equipment based on block chain
CN109615372A (en) * 2018-11-08 2019-04-12 立旃(上海)科技有限公司 Block chain data mask method and device based on intelligent contract
CN110119429A (en) * 2019-04-22 2019-08-13 矩阵元技术(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN110377697A (en) * 2019-06-19 2019-10-25 平安国际智慧城市科技股份有限公司 Update method, device, equipment and the storage medium of metadata standard

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
LIEHUANG ZHU等: "Research on the Security of Blockchain Data: A Survey", 《JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY》 *
刘广沛: "基于区块链的云数据完整性保护机制", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
史文斌: "基于Hyperledger Fabric的区块链应用系统云服务化", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111405074A (en) * 2020-06-08 2020-07-10 南京邮电大学 Data center network fault diagnosis and automatic configuration method based on hybrid chain
CN114124641A (en) * 2021-11-26 2022-03-01 成都质数斯达克科技有限公司 Block chain abnormal service processing method, device, equipment and readable storage medium
CN115388931A (en) * 2022-10-27 2022-11-25 河北省科学院应用数学研究所 Credible monitoring method, monitoring terminal and storage medium for sensor abnormal data

Also Published As

Publication number Publication date
CN110781200B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
CN110781200B (en) Processing method, device, equipment and medium for block chain abnormal data
CN111930852A (en) Data processing method, device and equipment based on block chain and storage medium
US20180114033A1 (en) Controlled execution of queries for protecting sensitive data in query responses in an on-demand services environment
CN111310221B (en) Encryption and decryption method, device, equipment and storage medium for persistent layer data
WO2021051546A1 (en) Link abnormality recognition method, server and computer-readable storage medium
CN110619002A (en) Data processing method, device and storage medium
CN106920024B (en) Business process management method, device and equipment
CN113051446A (en) Topological relation query method, device, electronic equipment and medium
CN111752843A (en) Method, device, electronic equipment and readable storage medium for determining influence surface
CN111913808A (en) Task allocation method, device, equipment and storage medium
CN111913998A (en) Data processing method, device, equipment and storage medium
CN110808839A (en) Processing method, device, equipment and medium for block chain abnormal data
CN111047434B (en) Operation record generation method and device, computer equipment and storage medium
CN111352706A (en) Data access method, device, equipment and storage medium
CN113836237A (en) Method and device for auditing data operation of database
CN115222176A (en) Risk control method, apparatus, device and medium
CN111767149A (en) Scheduling method, device, equipment and storage equipment
CN112069137A (en) Method and device for generating information, electronic equipment and computer readable storage medium
CN111563253A (en) Intelligent contract operation method, device, equipment and storage medium
CN110909390A (en) Task auditing method and device, electronic equipment and storage medium
CN111861539A (en) Resource processing method and device, electronic equipment and storage medium
CN110704848B (en) Vulnerability quantitative evaluation method and device
CN111639116B (en) Data access connection session protection method and device
CN110929207B (en) Data processing method, device and computer readable storage medium
CN110750419B (en) Offline task processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant