CN110932892A - Block chain based information early warning method and device, related nodes and storage medium - Google Patents

Block chain based information early warning method and device, related nodes and storage medium Download PDF

Info

Publication number
CN110932892A
CN110932892A CN201911149712.9A CN201911149712A CN110932892A CN 110932892 A CN110932892 A CN 110932892A CN 201911149712 A CN201911149712 A CN 201911149712A CN 110932892 A CN110932892 A CN 110932892A
Authority
CN
China
Prior art keywords
node
log
information
target
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911149712.9A
Other languages
Chinese (zh)
Other versions
CN110932892B (en
Inventor
李茂材
刘区城
王宗友
孔利
刘攀
张劲松
蓝虎
时一防
朱耿良
杨常青
黄焕坤
崔嘉辉
周开班
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911149712.9A priority Critical patent/CN110932892B/en
Publication of CN110932892A publication Critical patent/CN110932892A/en
Application granted granted Critical
Publication of CN110932892B publication Critical patent/CN110932892B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/042Network management architectures or arrangements comprising distributed management centres cooperatively managing the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Abstract

The embodiment of the invention provides an information early warning method and device based on a block chain, a related node and a storage medium, wherein the method comprises the following steps: identifying a target log of a first node to obtain abnormal information; broadcasting the abnormal information to the blockchain network so as to record the abnormal information in each blockchain node of the blockchain network; receiving broadcast information sent by at least one blockchain node except the first node in the blockchain network; and if the broadcast information sent by the n block chain nodes is the same as the abnormal information, triggering an early warning system to perform abnormal warning on the abnormal information. By implementing the method and the device, the target log can be quickly inquired to obtain the abnormal information, and the early warning system is triggered to carry out early warning when the broadcast information sent by the n block chain link points is the same as the abnormal information.

Description

Block chain based information early warning method and device, related nodes and storage medium
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method and an apparatus for information early warning based on blockchain, a related node, and a storage medium.
Background
Smart contracts are computer protocols that are intended to propagate, validate or execute contracts in an informational manner, allowing for trusted transactions without third parties. During specific implementation, the Ethernet workshop platform executes any user-defined contract code through the Ethernet workshop virtual machine to realize an intelligent contract.
At present, logs related to intelligent contracts are stored on the basis of transactions, and when a user's transaction is queried, query and statistics are generally performed according to a hash value of each transaction. It can be seen that the operation of inquiring and counting the transaction log is not simple and convenient, and the operation efficiency is affected.
Disclosure of Invention
The embodiment of the invention discloses an information early warning method and device based on a block chain, a related node and a readable storage medium.
In a first aspect, an embodiment of the present invention provides an information early warning method, an apparatus, a related node, and a readable storage medium based on a block chain, where the information early warning method includes: identifying a target log of a first node to obtain abnormal information, wherein the target log of the first node is a log generated based on service information requested by a service request and is stored in a log system in a key value pair mode, and the first node is any blockchain node in a blockchain network; broadcasting the exception information to the blockchain network to record the exception information in each blockchain node of the blockchain network; receiving broadcast information sent by at least one blockchain node except a first node in a blockchain network, wherein the broadcast information is information obtained by identifying a target log of the blockchain node, and the target log of the blockchain node is a log generated based on service information requested by a service request; if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information, and n is a positive integer.
In one implementation, before identifying the target log of the first node, at least one of the following is further included: taking the user identification of the target user as a key of a key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode; taking the height of the target block as a key of the key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode; and taking the node identification of the first node as a key of the key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode.
In one implementation, the service request is a node exception request, and is configured to request to record node information of a second node, where a target log of a first node records the node information of the second node, and identify the target log of the first node, and obtaining the exception information includes: performing abnormity identification on the node information of the second node to obtain abnormal information; the anomaly information is used for indicating that a second node is unstable in the blockchain network, and the second node is any node in the blockchain network.
In one implementation, the service request is a transaction request, which is used to request execution of a transaction of a target user, a target log of the first node records a transaction amount of the target user, the target log of the first node is identified, and obtaining the exception information includes: carrying out exception identification on the transaction amount of the target user, and if the transaction amount of the target user is larger than a first threshold value, obtaining exception information; the exception information is used to indicate that the transaction amount of the target user exceeds a first threshold.
In one implementation, the service request is a contract operation request, configured to request to operate an intelligent contract deployed in a first node, where an operation frequency of the intelligent contract is recorded in a target log of the first node, and identifying the target log of the first node, and obtaining the exception information includes: performing abnormity identification on a target log of the first node, and if the operating frequency of the intelligent contract is greater than a second threshold value, obtaining abnormal information; the anomaly information is used to indicate that the operating frequency of the smart contract is greater than a second threshold.
In one implementation, the service request is a contract operation request, configured to request execution of an intelligent contract deployed in a first node, a target log of the first node records resource consumption of the first node, and identifying the target log of the first node, where obtaining the abnormal information includes: and carrying out exception identification on the target log of the first node, and if the resource consumption of the first node is greater than a third threshold value, obtaining exception information, wherein the exception information is used for indicating that the resource consumed by the first node for executing the intelligent contract is greater than the third threshold value.
In one implementation, the method further comprises: and if the data volume stored in the log system reaches a fourth threshold value, migrating the log related to the first block to a target storage medium for storage, wherein the target storage medium is different from the storage medium occupied by the log system.
In a second aspect, an embodiment of the present invention provides an information early warning apparatus, where the information early warning apparatus includes:
an identification unit: the system comprises a log system, a target log, a first node and a second node, wherein the log system is used for identifying the target log of the first node to obtain abnormal information, the target log of the first node is a log generated based on service information requested by a service request and is stored in the log system in a key value pair mode, and the first node is any blockchain node in a blockchain network;
a broadcasting unit: broadcasting the exception information to the blockchain network to record the exception information in each blockchain node of the blockchain network;
a receiving unit: the system comprises a first node, a second node and a third node, wherein the first node is used for receiving broadcast information sent by at least one blockchain node in a blockchain network, the broadcast information is information obtained by identifying a target log of the blockchain node, and the target log of the blockchain node is a log generated based on service information requested by a service request;
the early warning unit: if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information, and n is a positive integer.
In a third aspect, embodiments of the present invention provide a block link point, including:
a memory comprising computer readable instructions;
a processor coupled to the memory for executing the computer readable instructions, thereby causing the computer device to perform the method as described in the first aspect or any possible implementation of the first aspect.
In a fourth aspect, embodiments of the present invention provide a computer-readable storage medium storing one or more instructions adapted to be loaded by a processor and to perform a method as described in the first aspect or any possible implementation manner of the first aspect.
In the embodiment of the invention, a first node acquires a target log of the first node, identifies the target log of the first node and obtains abnormal information, wherein the target log is a log generated based on service information requested by a first service request and is stored in a log system in a key-value pair mode; broadcasting the abnormal information to the blockchain network so as to record the abnormal information in each blockchain node of the blockchain network; receiving broadcast information sent by at least one blockchain node except a first node in a blockchain network; if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information. Therefore, the first node stores the target log in the log system in a key value pair mode, so that the target log can be conveniently inquired from the log system to obtain abnormal information, and when the broadcast information sent by the n block chain nodes is the same as the abnormal information, the early warning system is triggered to carry out early warning.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a block chain network architecture diagram according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an information early warning method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart of an information early warning method according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of an information early warning method according to an embodiment of the present invention;
fig. 5 is a schematic flow chart of an information early warning method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an information early warning apparatus according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. In addition, the features in the embodiments and the examples described below may be combined with each other without conflict.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein and in the claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should be understood that the term "and/or" as used herein is meant to encompass any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a block chain network architecture diagram according to an embodiment of the present invention. As shown, the blockchain network includes a first node 100, a blockchain node 200, and a log system 300. In the embodiment of the present invention, the first node 100 is taken as an example for convenience of description, and therefore the first node 100 may also be any node in the blockchain node 200, without distinguishing the first node 100 from the blockchain node 200. The intelligent contracts are deployed on the blockchain network, and particularly can be deployed on one or more blockchain nodes. Taking the first node 100 deployed with a service contract, a log contract, a monitoring contract, and a monitoring DAPP (Decentralized Application) as an example, an information early warning scheme based on a block chain provided in the embodiment of the present invention is described. Wherein the service contract and the log contract are similar to an intelligent contract, the service contract is used for stipulating rules of service implementation, and the log contract is used for generating a target log. The monitoring contract is used for recording result information of monitoring the target log, such as whether the target log is abnormal or not. And the monitoring DAPP interacts with the log system and is used for acquiring a target log in the log system and monitoring the target log so as to identify whether the transaction or the block link point corresponding to the target log is abnormal. The blockchain node 200 (e.g., the first node 100) of the present invention may be specifically a terminal device, which includes but is not limited to a mobile phone, a tablet personal computer (tablet personal computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a wearable device (wearable device), a vehicle-mounted device, and other devices supporting network communication; the log system 300 may be specifically a database, and the database is used to store target logs in a blockchain network, and each blockchain node 200 may correspond to one log system 300, or the blockchain nodes 200 may share one log system 300.
The first node 100 receives and responds to the service request and invokes a log contract to generate a target log based on the service information requested by the service request, which is stored in the log system 300 in the form of key-value pairs. Further, the DAPP is monitored to obtain a target log of the first node from the log system 300 at regular time, and the target log of the first node is identified to obtain abnormal information; the first node 100 invokes a monitor contract to broadcast the exception information to the blockchain network to record the exception information in each blockchain node of the blockchain network. Meanwhile, the blockchain node 200 also receives and responds to the service request, and broadcasts broadcast information into the blockchain network after executing the same process as the first node 100, wherein the broadcast information is information obtained by identifying a target log of the blockchain node 200. The blockchain node 200 represents a blockchain link point in the blockchain network except for the first node 100, and is simply referred to as the blockchain node 200 for convenience of description. Accordingly, the first node 100 receives broadcast information transmitted by at least one blockchain node 200. If the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information, and n is a positive integer.
Referring to fig. 2, fig. 2 is a schematic flow chart of an information early warning method based on a block chain according to an embodiment of the present invention, where the information early warning method includes the following steps S201 to S204:
step S201: the first node 100 acquires the target log of the first node 100, identifies the target log of the first node 100, and obtains the abnormal information.
Specifically, the first node 100 receives and responds to the service request, and invokes a log contract to generate a target log based on the service information requested by the service request, and the target log is stored in the log system 300 in the form of key-value pairs. And then, the DAPP is monitored to obtain the target log of the first node from the log system 300 at regular time, and the target log of the first node is identified to obtain abnormal information. The target log of the first node 100 is a corresponding target log generated by the first node 100 invoking a log contract, including but not limited to a user log and a system log; the user log may record information related to the user, such as the first node 100 receiving and responding to the service request sent by the target user; for example, the information (transaction amount, transaction time, etc.) of the target user invoking the service contract to perform the service transaction, the target user creating or invoking the intelligent contract, etc.; the system log may record information related to the blockchain system, such as node information (node exception) of the blockchain node 200 recorded by the first node 100. Further, the storage format of the target log is not limited, such as storage in the format of txt,. doc,. docx,. c,. h, etc. And the log contract stores the target log in the form of key-value pairs in the log system 300 in order to monitor the DAPP for the target log.
Step S202: the first node 100 broadcasts the exception information to the blockchain network to record the exception information in each blockchain node 200 of the blockchain network.
The first node 100 broadcasts the anomaly information to the blockchain network, and accordingly, each blockchain node 200 of the blockchain network receives and records the anomaly information. If the exception information includes that the transaction amount of the user a is greater than the first threshold, each blockchain node 200 records that the transaction amount of the user a is considered to be greater than the first threshold by the first node 100.
Step S203: the first node 100 receives broadcast information transmitted by at least one blockchain node 200 in the blockchain network other than the first node.
The blockchain node 200 receives and responds to the service request and invokes a log contract to generate a target log based on the service information requested by the service request, and the target log is stored in the log system 300 in a key-value pair manner. The DAPP is further monitored to obtain a target log of the blockchain node 200 from the log system 300 at a timing, identify the target log of the blockchain node 200, and obtain abnormal information, which may be referred to as broadcast information for distinguishing from the abnormal information in the first node 100. The blockchain node 200 broadcasts the broadcast information to the blockchain network, and accordingly, the first node 100 receives the broadcast information transmitted by at least one blockchain node 200. For example, the broadcast information includes user a's transaction amount greater than a first threshold, and the blockchain node 200 broadcasts the broadcast information to the blockchain network. At this point, the first node 100 receives the broadcast message, and the record blockchain node 200 considers that the transaction amount of the user a is greater than the first threshold.
Step S204: if the broadcast information sent by the n blockchain nodes 200 is the same as the abnormal information, the first node 100 triggers the early warning system to perform abnormal warning on the abnormal information.
The monitoring contract of the first node 100 receives the broadcast information sent by the n blockchain nodes 200, and if the broadcast information is detected to be the same as the abnormal information, the first node 100 triggers the early warning system to perform abnormal warning on the abnormal information. For example, if the broadcast information broadcast by n block chain nodes 200 indicates that the transaction amount of the user a is greater than the first threshold, and the first node 100 detects that the abnormal information also indicates that the transaction amount of the user a is greater than the first threshold, the first node 100 triggers the early warning system to perform abnormal warning for the transaction amount of the user a that is greater than the first threshold. The early warning system may be a module having an early warning function in a monitoring contract or the first node 100; the n blockchain nodes 200 are any n nodes in the blockchain network, where n is a positive integer, and if n is equal to 2/3m or n is greater than 2/3m and less than m, the monitoring contract triggers an early warning system to perform early warning when receiving that broadcast information sent by the blockchain nodes 200 of 2/3 and above is the same as abnormal information. The early warning mode is not limited, such as sending out early warning prompt sound, outputting prompt information, and the like.
In the embodiment of the invention, a target log of a first node is obtained, the target log of the first node is identified, abnormal information is obtained, the target log is generated based on service information requested by a first service request, and the abnormal information is stored in a log system in a key-value pair mode; broadcasting the abnormal information to the blockchain network so as to record the abnormal information in each blockchain node of the blockchain network; receiving broadcast information sent by at least one blockchain node except a first node in a blockchain network; if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information. Therefore, the target log is stored in the log system in a key value pair mode, the target log is conveniently inquired from the log system to obtain abnormal information, and when the broadcast information sent by the n block chain nodes is the same as the abnormal information, the early warning system is triggered to carry out early warning.
Referring to fig. 3, fig. 3 is a schematic flow chart of an information early warning method based on a block chain according to an embodiment of the present invention, where the information early warning method is an implementation manner of the step S201, and the information early warning method may include the following steps S301 to S303:
step S301: the first node 100 invokes a log contract to store the target log in the form of a key-value pair in the log system 300.
The specific implementation manner of storing the target log in the embodiment of the present invention is not limited, and three possible implementation manners are shown below.
In one implementation, the log contract takes the user identification of the target user as a key of a key-value pair and the target log of the first node as a value of the key-value pair, such that the target log of the first node is stored in the log system 300 in the form of the key-value pair. The user identifier includes, but is not limited to, an address, an Identity Document (ID), a user name, and the like of the target user. If the target log includes a user log, which records the transaction amount of the target user for a certain transaction, the user identifier of the target user can be used as the key of the key-value pair, and the target log is stored in the log system 300, so as to query the transaction amount of the target user for a certain transaction.
In yet another implementation, the log contract uses the height of the target block as a key of the key-value pair and the target log of the first node as a value of the key-value pair, so that the target log of the first node is stored in the log system 300 in the form of the key-value pair. The height of the target chunk represents the index number of the target chunk on the blockchain. If the target log includes a user log, which records the transaction amount of the target user related transaction in the target block, the height of the target block can be used as the key of the key value pair, and the target log is stored in the log system 300, so as to query the transaction amount of the target user in the target block.
In another implementation, the node identifier of the first node of the log contract is used as a key of the key-value pair, and the target log of the first node is used as a value of the key-value pair, so that the target log of the first node is stored in the log system 300 in the form of the key-value pair. Wherein the node identification represents an address, identification, etc. of the first node 100. If the target log includes the system log and records the node information, for example, if the first node considers that the node B is an abnormal node, the node identifier of the first node is used as a key of the key-value pair, and the target log is stored in the log system 300, so as to query the block link point 200 in which the abnormality occurs.
It should be noted that several embodiments of the present invention shown in step S202 may be implemented alone, or may be implemented in combination with any one or more of the above embodiments, and the present invention is not limited thereto.
Optionally, the log contract may encrypt the target log and decrypt the target log using a key corresponding to the target log to prevent the target log from being changed. If the target log is subjected to hash operation to obtain a first hash value, the first hash value is carried in a key corresponding to the transaction log, and after the DAPP acquires the target log through the key pair (target user address), hash operation is performed to obtain a second hash value. And determining whether the second hash value is matched with the first hash value, if not, discarding the target log, and acquiring again.
Step S302: the monitoring DAPP in the first node 100 periodically retrieves the target log of the first node 100 from the log system 300.
The timing is a fixed time interval, and the configuration can be customized according to actual application by research personnel; such as one minute, five minutes, etc. Because the log contract stores the target log in the log system 300 in the form of key-value pairs, the monitoring DAPP can quickly query the target log through the keys of the key-value pairs at regular time, which is beneficial to saving log query time, simplifying log query operation and improving log query efficiency.
Step S303: the monitoring DAPP in the first node 100 identifies the target log of the first node 100, and performs anomaly identification to obtain anomaly information.
After the monitoring DAPP obtains the target log of the first node 100, the target log is identified to obtain abnormal information. If the target log comprises the user log, the related transaction information of the target user is recorded. After the monitoring DAPP obtains the target log, performing anomaly identification to obtain anomaly information, where the anomaly information may include, but is not limited to, a transaction amount of the target user, an operation frequency of the intelligent contract, a resource consumption amount (gas) of the first node, and the like. The specific implementation of the anomaly identification is not limited, and several possible implementations are shown below according to the actual application scenario.
In one implementation manner, if the service request is a transaction request for requesting execution of a transaction of a target user, a target log of a first node records a transaction amount of the target user, performs exception identification on the transaction amount of the target user, and if the transaction amount of the target user is greater than a first threshold value, obtains exception information; the exception information is used to indicate that the transaction amount of the target user exceeds a first threshold. By recognizing the abnormal information, the transaction amount of the target user can be prevented from exceeding an expected or abnormal transfer operation or the like.
Specifically, the first node 100 receives a transaction request of a target user, and invokes a service contract to respond to the transaction request, and executes the transaction of the target user. The first node 100 calls a log contract to generate a user log from the transaction information related to the target user, wherein the transaction amount of the target user is recorded in the user log; the transaction amount may be the transaction amount generated by a single transaction or the total transaction amount of all transactions related to the target user in the target block. The monitoring DAPP of the first node 100 obtains the user log, identifies the user log to obtain the transaction amount of the target user, and obtains the abnormal information if the transaction amount of the target user is greater than the first threshold value. The first threshold is set by a system user, such as a hundred thousand ethernet coins. For example, when the transaction amount of the target user is fifteen thousand ethernet coins and is greater than one hundred thousand ethernet coins, the monitoring DAPP determines that the transaction amount of the target user is abnormal, obtains abnormal information (the transaction amount of the target user is greater than a first threshold), and invokes a monitoring contract to declare the abnormality.
In another implementation, if the service request is a contract operation request, configured to request to operate an intelligent contract deployed in a first node, an operation frequency of the intelligent contract is recorded in a target log of the first node, and the target log of the first node is subjected to exception identification, and if the operation frequency of the intelligent contract is greater than a second threshold, exception information is obtained; the anomaly information is used to indicate that the operating frequency of the smart contract is greater than a second threshold. By identifying the abnormal information, the target user can be prevented from frequently operating the intelligent contract and wasting computing resources.
Specifically, in the example of creating an intelligent contract, the first node 100 receives a contract operation request from a target user, and executes creating an intelligent contract. Then the first node 100 calls a log contract to generate a user log by the information related to the intelligent contract created by the target user, wherein the related information comprises creation time, information of the target user, creation times of the target user and the like; and obtaining the operating frequency of the target user for creating the intelligent contract according to the creation time and the creation times, and recording the operating frequency of creating the intelligent contract in the target log. The monitoring DAPP of the first node 100 obtains the user log, identifies the user log, and obtains abnormal information if the operation frequency of creating the intelligent contract is greater than the second threshold. This second threshold is system-customized, and may be, for example, five times a day. If the target user creates the intelligent contract six times within 11, 7 and 2019, the operation frequency is greater than five times per day, abnormal information is obtained (the target user creates the intelligent contract abnormally), and a monitoring contract is called to declare the abnormal information.
For another example, in the case of invoking an intelligent contract, the first node 100 receives a contract operation request from a target user and executes the invoking of the intelligent contract. Then the first node 100 calls a log contract to generate a user log by the information related to the intelligent contract called by the target user, wherein the related information comprises information of the target user, calling times, calling time, called intelligent contract and the like; and obtaining the operating frequency of the target user for calling the intelligent contract according to the calling time and the calling times, and recording the operating frequency for calling the intelligent contract in the target log. The monitoring DAPP of the first node 100 obtains the user log, identifies the user log, and obtains abnormal information if the operation frequency of calling the intelligent contract is greater than the second threshold value. This second threshold is system-defined, and may be, for example, five times every 10 minutes. If the number of times that the target user calls the intelligent contract within 10 minutes is six, the operation frequency is greater than five times every 10 minutes, abnormal information is obtained (the target user calls the intelligent contract and is abnormal), and a monitoring contract is called to declare the abnormal information.
In another embodiment, the service request is a contract operation request, and is used to request execution of an intelligent contract deployed in a first node, a target log of the first node records resource consumption of the first node, and performs exception identification on the target log of the first node, and if the resource consumption of the first node is greater than a third threshold, exception information is obtained, where the exception information is used to indicate that resources consumed by the first node to execute the intelligent contract are greater than the third threshold. The target user can recall the intelligent contract by identifying the abnormal information, so that the execution of the intelligent contract is prevented from being trapped in endless loop, and the computing resources are wasted.
Specifically, the first node 100 receives the contract operation request and executes the intelligent contract. The first node 100 calls a log contract to generate a user log according to the resource consumption (gas) generated by executing the intelligent contract; the monitoring DAPP of the first node 100 obtains a user log, identifies the user log to obtain a resource consumption amount, and obtains abnormal information if the resource consumption amount is greater than a third threshold value. The third threshold is set by the system in a self-defined manner, for example, the third threshold may be 1000 ethernet coins, and when the resource consumption is greater than 1000 ethernet coins, the exception information is obtained (the resource consumption of the first node 100 is greater than the third threshold), and a monitoring contract is invoked to declare an exception.
It should be noted that several embodiments of the present invention shown in step S303 may be implemented alone, or may be implemented in combination with any one or more of the above embodiments, and the present invention is not limited thereto.
Referring to fig. 4, fig. 4 is a schematic flow chart of an information early warning method based on a block chain according to an embodiment of the present invention, where the information early warning method is another implementation manner of the step S201, and the information early warning method may include the following steps S401 to S403:
step S401: the first node 100 invokes a log contract to store the target log in the form of a key-value pair in the log system 300.
Step S402: the monitoring DAPP periodically retrieves the target log of the first node 100 from the log system 300.
Step S403: the monitoring DAPP identifies the target log of the first node 100 and obtains exception information.
After the monitoring DAPP obtains the target log of the first node 100, the target log is identified to obtain abnormal information. If the target log records abnormal information, the abnormal information can be directly obtained after the DAPP is monitored to obtain the target log. For example, the service request received by the first node 100 is a node exception request, which is used to request to record the node information of the second node, so that the target log of the first node 100 records the node information of the second node. And carrying out abnormity identification on the node information of the second node to obtain abnormal information. The exception information indicates that the second node is unstable in the blockchain. The second node is any node in the block chain network; the node information includes information that the second node joins, exits, and remains online and offline (e.g., network failure, area network not in the blockchain network, etc.), and the like.
Specifically, the first node 100 receives and responds to the node exception request, and records information (node information) that the second node joins, exits the blockchain network, remains online, and the like. And determining whether the second node is in a stable state in the blockchain according to the node information, if the second node is in an unstable state in the blockchain, judging that the second node is an abnormal node by the first node 100 to generate a target log, storing the target log in the log system 300 by adopting a key value pair, and monitoring DAPP to obtain the target log from the log system 300 at regular time to directly obtain abnormal information as the second node is an abnormal node. And then, the monitoring contract records that the first node detects that the second node is an abnormal node. The specific implementation of determining whether the second node is stable is not limited, for example, according to the length of the offline time, the frequency of joining or leaving the blockchain network, and the like, an exemplary method for determining whether the second node is stable in a scoring manner is provided in the embodiment of the present invention. Setting a scoring rule for the node information, and if the score of the second node is lower than a preset score in a fixed time period, proving that the second node is unstable; and if the score of the second node is higher than the preset score, the second node is proved to be stable, wherein the preset score is 7. For example, the second node joins and leaves the blockchain network ten times within 5 minutes, or the second node is in an offline state within 10 hours in the blockchain network within 24 hours, the score will be lower than 7, which indicates that the second node is unstable; on the contrary, if the second node is kept online in the blockchain network within 24 hours and the number of times of joining or exiting the blockchain network is two, the score is higher than 7, which indicates that the second node is stable.
Optionally, if only one log system 300 is deployed in the blockchain, the service request received by the first node 100 is an abnormal request, and is used to request to record the data volume stored in the log system 300, so that the data volume stored in the log system 300 is recorded in the target log of the first node 100, and the target log of the first node 100 is subjected to abnormal identification to obtain abnormal information. The exception information is used to indicate that the log system 300 has insufficient storage space. Specifically, the first node 100 receives and responds to the node exception request, records the amount of data stored by the log system 300, and if the storage space of the log system 300 is insufficient, generates a target log of the information and stores the target log in the log system 300 by using a key value pair. The monitoring DAPP regularly obtains the target log from the log system 300 to obtain abnormal information, and calls a monitoring contract to declare the abnormality.
Referring to fig. 5, fig. 5 is a schematic flow chart of an information early warning method based on a block chain according to an embodiment of the present invention, where the information early warning method includes the following steps S501 to S505:
step S501: the first node 100 identifies the target log of the first node 100, and obtains the abnormal information.
Step S502: the first node 100 broadcasts the exception information to the blockchain network to record the exception information in each blockchain node 200 of the blockchain network.
Step S503: the first node 100 receives broadcast information transmitted by at least one blockchain node 200 in the blockchain network other than the first node.
Step S504: if the broadcast information sent by the n blockchain nodes 200 is the same as the abnormal information, the first node 100 triggers the early warning system to perform abnormal warning on the abnormal information.
The specific implementation of steps S501-S504 may refer to the information early warning method described in fig. 2, and details are not repeated here.
Step S505: if the data amount stored in the log system 300 reaches the fourth threshold, the log related to the first block is migrated to a target storage medium for storage, and the target storage medium is different from the storage medium occupied by the log system 300.
The fourth threshold is set by the system self-definition, for example, set according to the storage space of the database server deployed by the log system 300; the log related to the first block comprises a log generated by the information recorded in the first block that the user calls the service contract to perform service transaction, and the like; the first block is a block whose height is less than that of the target block, and if the height of the target block is 50, the first block is all blocks in the block chain whose height is less than 50. For example, if the amount of data stored in the log system 300 reaches eighty percent of the storage space of the database server, the log related to the first block is migrated to the target storage medium for storage.
It should be noted that several embodiments of the present invention shown in step S403 may be implemented alone, or may be implemented in combination with any one or more of the above embodiments, and the present invention is not limited thereto.
In the embodiment of the invention, a target log of a first node is obtained, the target log of the first node is identified, abnormal information is obtained, the target log is generated based on service information requested by a first service request, and the abnormal information is stored in a log system in a key-value pair mode; broadcasting the abnormal information to the blockchain network so as to record the abnormal information in each blockchain node of the blockchain network; receiving broadcast information sent by at least one blockchain node except a first node in a blockchain network; if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information. Therefore, the target log is stored in the log system in a key value pair mode, the target log is conveniently inquired from the log system to obtain abnormal information, and when the broadcast information sent by the n block chain nodes is the same as the abnormal information, the early warning system is triggered to carry out early warning.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an information early warning apparatus according to an embodiment of the present invention, where the information early warning apparatus may specifically be a terminal device with a log system configured to execute the method steps shown in any one of fig. 2 to fig. 4, and the information early warning apparatus 60 may include an identification unit 601, a broadcast unit 602, a receiving unit 603, and an early warning unit 604. Wherein:
the recognition unit 601: the system comprises a log system, a target log, a first node and a second node, wherein the log system is used for identifying the target log of the first node to obtain abnormal information, the target log of the first node is a log generated based on service information requested by a service request and is stored in the log system in a key value pair mode, and the first node is any blockchain node in a blockchain network;
the broadcasting unit 602: broadcasting the exception information to the blockchain network to record the exception information in each blockchain node of the blockchain network;
the receiving unit 603: the system comprises a first node, a second node and a third node, wherein the first node is used for receiving broadcast information sent by at least one blockchain node in a blockchain network, the broadcast information is information obtained by identifying a target log of the blockchain node, and the target log of the blockchain node is a log generated based on service information requested by a service request;
the early warning unit 604: if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information, and n is a positive integer.
In one implementation, the information early warning apparatus 60 may include an identification unit 601, a broadcast unit 602, a receiving unit 603, and an early warning unit 604, and the information early warning apparatus 60 further includes a storage unit 605, specifically configured to:
taking the user identification of the target user as a key of a key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode;
taking the height of the target block as a key of the key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode;
and taking the node identification of the first node as a key of the key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode.
In an implementation manner, the service request is a node exception request, and is configured to request to record node information of a second node, where a target log of a first node records the node information of the second node, and when the identifying unit 601 is configured to identify the target log of the first node and obtain exception information, the identifying unit is specifically configured to:
performing abnormity identification on the node information of the second node to obtain abnormal information; the anomaly information is used for indicating that a second node is unstable in the blockchain network, and the second node is any node in the blockchain network.
In one implementation manner, the service request is a transaction request, configured to request execution of a transaction of a target user, a target log of a first node records a transaction amount of the target user, and when the identifying unit 601 is configured to identify the target log of the first node and obtain abnormal information, the identifying unit is specifically configured to:
carrying out exception identification on the transaction amount of the target user, and if the transaction amount of the target user is larger than a first threshold value, obtaining exception information; the exception information is used to indicate that the transaction amount of the target user exceeds a first threshold.
In one implementation, the service request is a contract operation request, configured to request to operate an intelligent contract deployed in a first node, where an operation frequency of the intelligent contract is recorded in a target log of the first node, and the identifying unit 601, when configured to identify the target log of the first node and obtain the abnormal information, is specifically configured to:
performing abnormity identification on a target log of the first node, and if the operating frequency of the intelligent contract is greater than a second threshold value, obtaining abnormal information; the anomaly information is used to indicate that the operating frequency of the smart contract is greater than a second threshold.
In one implementation, the service request is a contract operation request, configured to request execution of an intelligent contract deployed in a first node, a target log of the first node records resource consumption of the first node, and the identifying unit 601, when configured to identify the target log of the first node and obtain the abnormal information, is specifically configured to:
and carrying out exception identification on the target log of the first node, and if the resource consumption of the first node is greater than a third threshold value, obtaining exception information, wherein the exception information is used for indicating that the resource consumed by the first node for executing the intelligent contract is greater than the third threshold value.
In one implementation, the information early warning apparatus 60 may include an identification unit 601, a broadcast unit 602, a receiving unit 603, an early warning unit 604, a storage unit 605, and a migration unit 606, and is specifically configured to:
and if the data volume stored in the log system reaches a fourth threshold value, migrating the log related to the first block to a target storage medium for storage, wherein the target storage medium is different from the storage medium occupied by the log system.
According to another embodiment of the present invention, the units in the information warning apparatus shown in fig. 6 may be respectively or entirely combined into one or several other units to form the unit, or some unit(s) may be further split into multiple units with smaller functions to form the unit(s), which may implement the same operation without affecting the implementation of the technical effect of the embodiment of the present invention. The units are divided based on logic functions, and in practical application, the functions of one unit can be realized by a plurality of units, or the functions of a plurality of units can be realized by one unit. In other embodiments of the present invention, the device based on the information early warning method may also include other units, and in practical applications, these functions may also be implemented by being assisted by other units, and may be implemented by cooperation of multiple units.
In the embodiment of the invention, a first node acquires a target log of the first node, identifies the target log of the first node and obtains abnormal information, wherein the target log is a log generated based on service information requested by a first service request and is stored in a log system in a key-value pair mode; broadcasting the abnormal information to the blockchain network so as to record the abnormal information in each blockchain node of the blockchain network; receiving broadcast information sent by at least one blockchain node except a first node in a blockchain network; if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information. Therefore, the first node stores the target log in the log system in a key value pair mode, so that the target log can be conveniently inquired from the log system to obtain abnormal information, and when the broadcast information sent by the n block chain nodes is the same as the abnormal information, the early warning system is triggered to carry out early warning.
Based on the description of the method embodiment and the apparatus embodiment, the embodiment of the present invention further provides a schematic structural diagram of a blockchain node. Referring to fig. 7, the daily blockchain node 70 includes at least a processor 701, an input device 702, an output device 703, and a computer storage medium 704. The processor 701, input device 702, output device 703, and computer storage medium 704 within a block link point may be connected by a bus or other means.
A computer storage medium 704 may be stored in the memory of the block link point, the computer storage medium 704 being for storing a computer program comprising program instructions, the processor 701 being for executing the program instructions stored by the computer storage medium 704. The processor 701 (or CPU) is a computing core and a control core of the terminal, and is adapted to implement one or more instructions, and specifically, is adapted to load and execute one or more instructions so as to implement a corresponding method flow or a corresponding function.
The embodiment of the invention also provides a computer storage medium (Memory), which is Memory terminal equipment in the first node and is used for storing programs and data. It will be appreciated that the computer storage medium herein may comprise both a built-in storage medium in the first node and, of course, an extended storage medium supported by the first node. The computer storage medium provides a storage space that stores an operating system of the first node. Also, one or more instructions, which may be one or more computer programs (including program code), are stored in the memory space and are adapted to be loaded and executed by the processor 701. The computer storage medium may be a high-speed RAM memory, or may be a non-volatile memory (non-volatile memory), such as at least one disk memory; and optionally at least one computer storage medium located remotely from the processor.
In one embodiment, one or more instructions stored in a computer storage medium may be loaded and executed by processor 701 to implement the corresponding steps of the method in the above-described related information warning method embodiment; in a specific implementation, one or more instructions in the computer storage medium are loaded by the processor 701 and perform the following steps:
identifying a target log of a first node to obtain abnormal information, wherein the target log of the first node is a log generated based on service information requested by a service request and is stored in a log system in a key value pair mode, and the first node is any blockchain node in a blockchain network;
broadcasting the exception information to the blockchain network to record the exception information in each blockchain node of the blockchain network;
receiving broadcast information sent by at least one blockchain node except a first node in a blockchain network, wherein the broadcast information is information obtained by identifying a target log of the blockchain node, and the target log of the blockchain node is a log generated based on service information requested by a service request;
if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information, and n is a positive integer.
In one implementation, one or more instructions in a computer storage medium are loaded by processor 701 and perform the steps of:
taking the user identification of the target user as a key of a key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode;
taking the height of the target block as a key of the key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode;
and taking the node identification of the first node as a key of the key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode.
In one implementation manner, the service request is a node exception request, and is configured to request to record node information of a second node, where a target log of a first node records the node information of the second node, and when the service request is used to identify the target log of the first node and obtain exception information, the service request is specifically configured to:
performing abnormity identification on the node information of the second node to obtain abnormal information; the anomaly information is used for indicating that a second node is unstable in the blockchain network, and the second node is any node in the blockchain network.
In one implementation, the service request is a transaction request for requesting to execute a transaction of a target user, a target log of a first node records a transaction amount of the target user, and when the target log of the first node is identified and abnormal information is obtained, one or more instructions in a computer storage medium are loaded by the processor 701 and execute the following steps:
carrying out exception identification on the transaction amount of the target user, and if the transaction amount of the target user is larger than a first threshold value, obtaining exception information; the exception information is used to indicate that the transaction amount of the target user exceeds a first threshold.
In one implementation, the service request is a contract operation request, configured to request to operate an intelligent contract deployed in a first node, where an operation frequency of the intelligent contract is recorded in a target log of the first node, and when the service request is used to identify the target log of the first node and obtain exception information, one or more instructions in a computer storage medium are loaded by the processor 701 and perform the following steps:
performing abnormity identification on a target log of the first node, and if the operating frequency of the intelligent contract is greater than a second threshold value, obtaining abnormal information; the anomaly information is used to indicate that the operating frequency of the smart contract is greater than a second threshold.
In one implementation, the service request is a contract operation request, configured to request execution of an intelligent contract deployed in a first node, a target log of the first node records resource consumption of the first node, and when the target log of the first node is identified and exception information is obtained, one or more instructions in a computer storage medium are loaded by the processor 701 and perform the following steps:
and carrying out exception identification on the target log of the first node, and if the resource consumption of the first node is greater than a third threshold value, obtaining exception information, wherein the exception information is used for indicating that the resource consumed by the first node for executing the intelligent contract is greater than the third threshold value.
In one implementation, one or more instructions in a computer storage medium are loaded by processor 701 and perform the steps of:
and if the data volume stored in the log system reaches a fourth threshold value, migrating the log related to the first block to a target storage medium for storage, wherein the target storage medium is different from the storage medium occupied by the log system.
In the embodiment of the invention, a first node acquires a target log of the first node, identifies the target log of the first node and obtains abnormal information, wherein the target log is a log generated based on service information requested by a first service request and is stored in a log system in a key-value pair mode; broadcasting the abnormal information to the blockchain network so as to record the abnormal information in each blockchain node of the blockchain network; receiving broadcast information sent by at least one blockchain node except a first node in a blockchain network; if the broadcast information sent by the n block chain link points is the same as the abnormal information, the early warning system is triggered to perform abnormal warning aiming at the abnormal information. Therefore, the first node stores the target log in the log system in a key value pair mode, so that the target log can be conveniently inquired from the log system to obtain abnormal information, and when the broadcast information sent by the n block chain nodes is the same as the abnormal information, the early warning system is triggered to carry out early warning.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (10)

1. An information early warning method based on a block chain is applied to a first node, and the method comprises the following steps:
identifying a target log of a first node to obtain abnormal information, wherein the target log of the first node is a log generated based on service information requested by a service request and is stored in a log system in a key value pair mode, and the first node is any blockchain node in a blockchain network;
broadcasting the abnormal information to the blockchain network so as to record the abnormal information in each blockchain node of the blockchain network;
receiving broadcast information sent by at least one blockchain node except the first node in the blockchain network, wherein the broadcast information is information obtained by identifying a target log of the blockchain node, and the target log of the blockchain node is a log generated based on service information requested by a service request;
if the broadcast information sent by the n block chain nodes is the same as the abnormal information, triggering an early warning system to perform abnormal warning on the abnormal information, wherein n is a positive integer.
2. The method of claim 1, wherein prior to identifying the target log for the first node, the method further comprises at least one of:
taking the user identification of a target user as a key of a key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode;
taking the height of the target block as a key of a key-value pair, taking the target log of the first node as a value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode;
and taking the node identification of the first node as a key of the key-value pair, taking the target log of the first node as the value of the key-value pair, and storing the target log of the first node in a log system in a key-value pair mode.
3. The method of claim 1, wherein the service request is a node exception request for requesting to record node information of a second node, the node information of the second node is recorded in a target log of the first node, and the identifying the target log of the first node to obtain exception information comprises:
performing exception identification on the node information of the second node to obtain the exception information; the abnormal information is used for indicating that the second node is unstable in the blockchain network, and the second node is any node in the blockchain network.
4. The method of claim 1, wherein the service request is a transaction request for requesting to execute a transaction of a target user, the target log of the first node records a transaction amount of the target user, and the identifying the target log of the first node to obtain the exception information comprises:
performing exception identification on the transaction amount of the target user, and if the transaction amount of the target user is larger than a first threshold value, obtaining exception information; the exception information is used to indicate that a transaction amount of the target user exceeds a first threshold.
5. The method of claim 1, wherein the service request is a contract operation request for requesting operation on an intelligent contract deployed in the first node, the target log of the first node records an operation frequency of the intelligent contract, and the identifying the target log of the first node and obtaining the exception information comprises:
performing abnormity identification on the target log of the first node, and if the operating frequency of the intelligent contract is greater than a second threshold value, obtaining abnormal information; the anomaly information is used to indicate that the operating frequency of the smart contract is greater than a second threshold.
6. The method of claim 1, wherein the service request is a contract operation request for requesting execution of an intelligent contract deployed in the first node, the target log of the first node records resource consumption of the first node, and the identifying the target log of the first node and obtaining the exception information comprises:
and performing exception identification on the target log of the first node, and if the resource consumption of the first node is greater than a third threshold, obtaining exception information, wherein the exception information is used for indicating that the resource consumed by the first node for executing the intelligent contract is greater than the third threshold.
7. The method of any one of claims 1-6, further comprising:
and if the data volume stored in the log system reaches a fourth threshold value, migrating the log related to the first block to a target storage medium for storage, wherein the target storage medium is different from the storage medium occupied by the log system.
8. An information early warning device based on a block chain, the device comprising:
an identification unit: the system comprises a log system, a target log, a first node and a second node, wherein the log system is used for identifying the target log of the first node to obtain abnormal information, the target log of the first node is a log generated based on service information requested by a service request and is stored in the log system in a key value pair mode, and the first node is any blockchain node in a blockchain network;
a broadcasting unit: the system comprises a broadcast module, a block chain network and a plurality of block chain nodes, wherein the broadcast module is used for broadcasting the abnormal information to the block chain network so as to record the abnormal information in each block chain node of the block chain network;
a receiving unit: receiving broadcast information sent by at least one blockchain node except the first node in the blockchain network, wherein the broadcast information is information obtained by identifying a target log of the blockchain node, and the target log of the blockchain node is a log generated based on service information requested by a service request;
the early warning unit: and if the broadcast information sent by the n block chain nodes is the same as the abnormal information, triggering an early warning system to perform abnormal warning on the abnormal information, wherein n is a positive integer.
9. A block link node, comprising:
a memory comprising computer readable instructions;
a processor coupled to the memory, the processor configured to execute the computer readable instructions to cause the apparatus to perform the blockchain-based information alert method of any one of claims 1 to 7.
10. A computer-readable storage medium, wherein instructions are stored in the computer-readable storage medium, and when the instructions are executed on a computer, the computer is enabled to execute the block chain based information early warning method according to any one of claims 1 to 7.
CN201911149712.9A 2019-11-21 2019-11-21 Block chain based information early warning method and device, related nodes and storage medium Active CN110932892B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911149712.9A CN110932892B (en) 2019-11-21 2019-11-21 Block chain based information early warning method and device, related nodes and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911149712.9A CN110932892B (en) 2019-11-21 2019-11-21 Block chain based information early warning method and device, related nodes and storage medium

Publications (2)

Publication Number Publication Date
CN110932892A true CN110932892A (en) 2020-03-27
CN110932892B CN110932892B (en) 2022-05-31

Family

ID=69850598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911149712.9A Active CN110932892B (en) 2019-11-21 2019-11-21 Block chain based information early warning method and device, related nodes and storage medium

Country Status (1)

Country Link
CN (1) CN110932892B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343208A (en) * 2020-05-21 2020-06-26 腾讯科技(深圳)有限公司 Block chain-based data detection method and device and computer-readable storage medium
CN111935289A (en) * 2020-08-14 2020-11-13 中国工商银行股份有限公司 Dynamic monitoring method and device based on block chain
CN112929432A (en) * 2021-02-01 2021-06-08 杭州复杂美科技有限公司 Broadcasting method, equipment and storage medium based on repeated broadcasting history
CN115378803A (en) * 2022-04-13 2022-11-22 网易(杭州)网络有限公司 Log management method and device, block chain node and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108197959A (en) * 2018-01-23 2018-06-22 华南理工大学 A kind of fast verification pond based on block chain, fast verification system and operating method
US20190068360A1 (en) * 2017-08-24 2019-02-28 International Business Machines Corporation System and method for detecting anomalies in examinations
CN110033244A (en) * 2019-03-15 2019-07-19 阿里巴巴集团控股有限公司 Intelligent contract based on block chain executes method and device and electronic equipment
CN110163618A (en) * 2019-05-31 2019-08-23 深圳前海微众银行股份有限公司 Extremely detection method, device, equipment and the computer readable storage medium traded
CN110362536A (en) * 2019-07-15 2019-10-22 北京工业大学 Log cipher text retrieval method based on alarm association

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190068360A1 (en) * 2017-08-24 2019-02-28 International Business Machines Corporation System and method for detecting anomalies in examinations
CN108197959A (en) * 2018-01-23 2018-06-22 华南理工大学 A kind of fast verification pond based on block chain, fast verification system and operating method
CN110033244A (en) * 2019-03-15 2019-07-19 阿里巴巴集团控股有限公司 Intelligent contract based on block chain executes method and device and electronic equipment
CN110163618A (en) * 2019-05-31 2019-08-23 深圳前海微众银行股份有限公司 Extremely detection method, device, equipment and the computer readable storage medium traded
CN110362536A (en) * 2019-07-15 2019-10-22 北京工业大学 Log cipher text retrieval method based on alarm association

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
NING ZHAO: "Blockchain Combined with Smart Contract to Keep Safety Energy Trading for Autonomous Vehicles", 《IEEE 2019 IEEE 89TH VEHICULAR TECHNOLOGY CONFERENCE》 *
张栋珀: "基于区块链的电能交易平台设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
齐学成等: "基于区块链的仓单管理系统", 《华东师范大学学报自然科学版》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343208A (en) * 2020-05-21 2020-06-26 腾讯科技(深圳)有限公司 Block chain-based data detection method and device and computer-readable storage medium
CN111343208B (en) * 2020-05-21 2020-08-14 腾讯科技(深圳)有限公司 Block chain-based data detection method and device and computer-readable storage medium
CN111935289A (en) * 2020-08-14 2020-11-13 中国工商银行股份有限公司 Dynamic monitoring method and device based on block chain
CN111935289B (en) * 2020-08-14 2022-10-18 中国工商银行股份有限公司 Dynamic monitoring method and device based on block chain
CN112929432A (en) * 2021-02-01 2021-06-08 杭州复杂美科技有限公司 Broadcasting method, equipment and storage medium based on repeated broadcasting history
CN112929432B (en) * 2021-02-01 2022-07-15 杭州复杂美科技有限公司 Broadcasting method, equipment and storage medium based on repeated broadcasting history
CN115378803A (en) * 2022-04-13 2022-11-22 网易(杭州)网络有限公司 Log management method and device, block chain node and storage medium
CN115378803B (en) * 2022-04-13 2023-12-12 网易(杭州)网络有限公司 Log management method, device, blockchain node and storage medium

Also Published As

Publication number Publication date
CN110932892B (en) 2022-05-31

Similar Documents

Publication Publication Date Title
CN110932892B (en) Block chain based information early warning method and device, related nodes and storage medium
EP4053711A1 (en) Consensus method for blockchain, and consensus node, electronic device and storage medium
EP2800024B1 (en) System and methods for identifying applications in mobile networks
CN108566290A (en) service configuration management method, system, storage medium and server
CN110633277A (en) Time sequence data storage method and device, computer equipment and storage medium
CN110474903B (en) Trusted data acquisition method and device and block link point
CN111835760A (en) Alarm information processing method and device, computer storage medium and electronic equipment
CN112434039A (en) Data storage method, device, storage medium and electronic device
CN111143163A (en) Data monitoring method and device, computer equipment and storage medium
CN104967537A (en) Alarm information pushing method and device
CN109766198B (en) Stream processing method, device, equipment and computer readable storage medium
CN110737565A (en) data monitoring method, device, electronic equipment and storage medium
CN108595685B (en) Data processing method and device
CN114185743A (en) Data processing method and device, computer equipment and storage medium
CN111159009B (en) Pressure testing method and device for log service system
CN110442439B (en) Task process processing method and device and computer equipment
EP3805960A1 (en) Methods and systems for identifying software product installation instances
US20150088958A1 (en) Information Processing System and Distributed Processing Method
CN113360321B (en) Micro-service retry calling method and device, electronic equipment and storage medium
CN112637009B (en) Data link detection system, method and device
CN110545296A (en) Log data acquisition method, device and equipment
CN114428704A (en) Method and device for full-link distributed monitoring, computer equipment and storage medium
US10091068B1 (en) System for modeling distributed systems
CN111190858B (en) Method, device, equipment and storage medium for storing software information
CN110611576B (en) Data quality monitoring method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant