CN111209600A - Block chain-based data processing method and related product - Google Patents

Block chain-based data processing method and related product Download PDF

Info

Publication number
CN111209600A
CN111209600A CN201911426095.2A CN201911426095A CN111209600A CN 111209600 A CN111209600 A CN 111209600A CN 201911426095 A CN201911426095 A CN 201911426095A CN 111209600 A CN111209600 A CN 111209600A
Authority
CN
China
Prior art keywords
data
module
target data
audit
uplink
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911426095.2A
Other languages
Chinese (zh)
Inventor
王浩文
周胜平
吴栋
梁乔忠
吴敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alpha Cloud Computing Shenzhen Co Ltd
Original Assignee
Alpha Cloud Computing Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alpha Cloud Computing Shenzhen Co Ltd filed Critical Alpha Cloud Computing Shenzhen Co Ltd
Priority to CN201911426095.2A priority Critical patent/CN111209600A/en
Publication of CN111209600A publication Critical patent/CN111209600A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment of the application discloses a data processing method based on a block chain and a related product, wherein the method is applied to a data processing system based on the block chain, and comprises the following steps: the data processing system based on the block chain comprises the steps of firstly obtaining target data, then obtaining first data according to the target data uplink, then uploading the target data to a data center to obtain second data, then checking the first data with the second data to obtain a checking result, and if the checking result is that the first data is different from the second data, determining that the first data is tampered. The embodiment of the application improves the accuracy of data in the block chain.

Description

Block chain-based data processing method and related product
Technical Field
The present application relates to the field of data processing, and in particular, to a data processing method based on a block chain and a related product.
Background
With the development of networks and the change of business application requirements, people apply for a block chain to store and maintain data which needs to be guaranteed to be credible and untrustworthy. Although killer application of the blockchain is concentrated on data currency such as bitcoin, the characteristics of credibility, non-falsification and the like of data storage constructed in a distributed network find a larger application space in a wider industry scene: in the evolution of an information network to a universal internet, the data scale is larger and larger, the concentration of data is higher and higher, and the attribution party of data ownership puts forward more and more definite transparent and supervision requirements on the development and application of the data in a development and application environment taking a data center platform as a core environment. Therefore, in all industries in the digital reconstruction process, on one hand, the importance of a block chain as a basic overlay network is highlighted, and on the other hand, a solution to the problem with the industry characteristic is more urgent.
In traditional government and enterprise application scenarios, there are various data, which can be classified from the privacy level as: the method is characterized in that data and private data are disclosed, aiming at the problems that how to fully mine the values of the two types of data and privacy protection is not touched, which is a difficult problem in the industry at present.
Content of application
The embodiment of the application provides a data processing method based on a block chain and a related product, so as to improve the accuracy of data in the block chain.
In a first aspect, an embodiment of the present application provides a data processing method based on a block chain, where the method includes: acquiring target data; obtaining first data according to the target data uplink; uploading the target data to a data center to obtain second data; checking the first data and the second data to obtain a checking result; and if the checking result is that the first data and the second data are different, determining that the first data is tampered.
Based on the first aspect, in an embodiment of the present application, the obtaining first data according to the target data uplink includes: acquiring an audit rule; performing uplink audit on the target data according to the audit rule to obtain an audit result; and if the audit result is that the audit is passed, obtaining first data according to the target data uplink.
Based on the first aspect, in a specific embodiment of the present application, after the obtaining the audit rule, the method further includes: and linking the audit rule.
Based on the first aspect, in an embodiment of the present application, the obtaining first data according to the target data uplink includes: determining the current demand according to the target data; if the current demand is greater than a preset demand, chaining the target data to obtain the first data; and if the current demand is less than or equal to a preset demand, performing Hash chain on the target data to obtain the first data.
Based on the first aspect, in a specific embodiment of the present application, after determining that the first data is tampered, the method further includes: deleting or identifying the first data over a blockchain network.
Based on the first aspect, in a specific embodiment of the present application, the method further includes: performing whole-process monitoring on the first data obtained according to the target data chaining to obtain monitoring data; determining a tampered object according to the monitoring data after the first data is determined to be tampered.
In a second aspect, an embodiment of the present application provides a data processing system based on a block chain, where the system includes a data acquisition module, a transmission module, a block chain network, a data center station, and a check module, where the data acquisition module is in communication connection with the transmission module, the transmission module is in traffic connection with the block chain network and the data center station, respectively, the block chain network is in communication connection with the check module, and the data center station is in communication connection with the check module, where the data acquisition device is configured to acquire target data; the transmission module is used for obtaining first data according to the target data uplink; the transmission module is further used for uploading the target data to a data center to obtain second data; the checking module is used for checking the first data and the second data to obtain a checking result; and if the checking result is that the first data and the second data are different, determining that the first data is tampered.
Based on the second aspect, in an embodiment of the present application, in the obtaining the first data according to the target data uplink, the transmission module is specifically configured to: acquiring an audit rule; performing uplink audit on the target data according to the audit rule to obtain an audit result; and if the audit result is that the audit is passed, obtaining first data according to the target data uplink.
Based on the second aspect, in a specific embodiment of the present application, the transmission module is further configured to: and after acquiring the audit rule, linking the audit rule.
Based on the second aspect, in an embodiment of the present application, in the obtaining the first data according to the target data uplink, the transmission module is specifically configured to: determining the current demand according to the target data; if the current demand is greater than a preset demand, chaining the target data to obtain the first data; and if the current demand is less than or equal to a preset demand, performing Hash chain on the target data to obtain the first data.
Based on the second aspect, in a specific embodiment of the present application, the checking module is further configured to: deleting or identifying the first data through the blockchain network after the determining that the first data is tampered.
Based on the second aspect, in a specific embodiment of the present application, the system further includes a monitoring module, where the monitoring module is in communication connection with the transmission module and the checking module, respectively, and is configured to perform whole-process monitoring on the first data obtained according to the target data uplink to obtain monitored data; the verification module is further used for determining a tampered object according to the monitoring data after the first data is determined to be tampered.
In a third aspect, an embodiment of the present application provides a data processing system based on a blockchain, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method of the first aspect of the embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps described in any one of the methods of the first aspect of the present application.
In a fifth aspect, the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the present application, a data processing system first obtains target data, then obtains first data according to a target data uplink, then uploads the target data to a data center station to obtain second data, then performs a check on the first data and the second data to obtain a check result, and determines that the first data is tampered if the check result is that the first data is different from the second data. Therefore, the data processing system of the embodiment of the application can uplink the target data to obtain the first data, simultaneously upload the target data to the data center to obtain the second data, check the first data and the second data, finally determine whether the first data is tampered, and improve the accuracy of the data in the block chain.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic block diagram of a data processing system provided in the prior art;
fig. 2 is a schematic structural diagram of a data processing system based on a blockchain according to an embodiment of the present application;
fig. 3 is a diagram of a scenario application of data processing based on a block chain according to an embodiment of the present application;
fig. 4 is a diagram of another scenario application of data processing based on a block chain according to an embodiment of the present application;
fig. 5 is a schematic flowchart of a data processing method based on a block chain according to an embodiment of the present application;
fig. 6 is a schematic flowchart of another data processing method based on a blockchain according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of another data processing system based on a blockchain according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The data processing system according to the embodiment of the present application may be an electronic device with communication capability, and the electronic device may include various handheld devices with wireless communication function, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and the like.
The data processing system according to the embodiment of the present application may also be a system composed of a plurality of electronic devices with communication capability, where the electronic devices may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and the like.
To facilitate the understanding of the scheme, a schematic diagram of a data processing system provided in the prior art is first described. Referring to fig. 1, the data processing system 10 includes a data obtaining module 101 and a transmission module 102, the data processing system 10 is communicatively connected to a blockchain network through the transmission module 102, where the data obtaining module 101 includes at least one database, the at least one database is capable of storing corresponding data, and a user may store corresponding data into the at least one database of the data obtaining module 101. The transmission module 102 can upload the data in the data acquisition module 101 to the blockchain network for storage, and finally, a user can acquire the data in the blockchain network to achieve the purpose of use.
In order to solve the problems in the prior art, embodiments of the present application provide a data processing method based on a block chain and a data processing system based on the block chain, so as to improve the authenticity of data uploaded to a block chain network, and further improve the accuracy of data in the block chain.
The embodiments of the present application will be described below with reference to the drawings. The terminology used in the description of the embodiments section of the present application is for the purpose of describing particular embodiments of the present application only and is not intended to be limiting.
A block chain based data processing system provided by the present application is described in detail below. Referring to fig. 2, fig. 2 is a schematic structural diagram of a block chain-based data processing system according to an embodiment of the present disclosure, in which the block chain-based data processing system 20 includes a data acquisition module 201, a transmission module (an audit rule acquisition module 202, a cochain audit module 203, a demand determination module 204, a target data cochain module 205, a target data hash cochain module 206, a data upload module 207, an audit rule cochain module 208), a checking module (a tamper-proof checking module 209, a tamper object determination module 210, an uplink data control module 211), and a monitoring module (not shown in the figure), in which the data acquisition module 201 is connected to the transmission module and the checking module respectively, the transmission module (including the demand determination module 204, the target data cochain module 205, the target data hash cochain module 206, and the audit rule cochain module 208) of the block chain-based data processing system 20 and a block chain network, the transmission module (data uploading module 207) and the data center of the blockchain-based data processing system 20 are in communication connection, the check module (including the on-chain data control module 211) of the blockchain-based data processing system 20 is in communication connection with the blockchain network, the check module and the data center of the blockchain-based data processing system 20 are in communication connection, the check module in the blockchain-based data processing system 20 includes the tamper-proof check module 209, so that the data check function is provided, when the data acquisition module 201 in the data processing system 20 uploads data to the blockchain network and uploads the data to the data center through another channel, finally, the check module can check the data in the blockchain network and the data in the data center, and finally determines whether the data uploaded to the blockchain network is tampered, the accuracy of the data after the uplink is improved.
The block chain-based data processing system 20 is described in detail as follows:
(1) the data acquisition module 201: the data acquiring module 201 is used for acquiring target data.
This part is the same as the above-described part of the data acquisition module 101 in fig. 1, and is not described again here.
The target data may be original data, or may be metadata, and the target data may be business data, target data, or resource data, or target data, or may be other types of data, which is not limited specifically.
Specifically, the data acquisition module 101 may be divided into a data acquisition module, an original data module, and a metadata module, where the data acquisition module acquires data written by a user, where the data may be processed data, and stores corresponding original data in the original data module, and stores metadata in the original data in the metadata module.
(2) The audit rule obtaining module 202: the audit rule obtaining module 202 is configured to obtain an audit rule. The audit rule may include at least one constraint condition of data generation, multi-party control protocol, rule, and flow defined by the blockchain, which is not specifically limited.
Here, the block chain is used to realize consensus on the basis of identity authentication and tamper resistance based on cryptography, block byzantine attacks of a few nodes, and realize a definable data update mechanism through contracts, so that access control of data writing can be realized in an open environment, and responsibility, obligation and flow of each party can be defined, that is, an audit rule can be formed as required.
(3) The uplink auditing module 203: the uplink auditing module 203 is used for performing uplink auditing on the target data according to the auditing rule to obtain an auditing result; and if the audit result is that the audit is passed, obtaining first data according to the target data uplink. In addition, if the audit result is that the audit is not passed, the uplink is prohibited according to the fact that the uplink audit of the target data is determined to be failed, and further, corresponding prompt information can be generated and output according to the reason of the audit failure.
Obviously, if the target data meets the constraint of the audit rule, the target data is determined to be approved, and if the target data does not meet the constraint of the audit rule, the target data is determined to be approved.
For example, the auditing rule includes that the monthly income of the user is determined as the privacy data, and when the user is acquired for a month, the monthly income can be jointly uplink after the user identity authentication is passed, and if the user identity authentication is not passed, the uplink audit is determined to be failed, and the uplink is forbidden.
For example, the audit rule may restrict the qualification of the user for uplink on the target data, and when the user performing uplink on the target data does not satisfy the agreed conditions, it is determined that the uplink audit fails, and uplink is prohibited.
Therefore, the cochain audit is performed before the cochain, and the authenticity and credibility of the data are ensured.
(4) The demand determination module 204: the demand determination module 204 is configured to determine a current demand according to the target data.
The corresponding relation between the demand and the target data can be set by a user.
For example, the demand amount and the target data correspond to each other in such a way that the value of the demand amount is equal to a times of the data magnitude of the target data, where a is a positive number greater than 0.
For example, the corresponding relationship between the demand amount and the target data is that when the data size of the target data is greater than or equal to b, the value of the demand amount is a fixed value c, and when the data size of the target data is less than b, the value of the demand amount is a fixed value d, c is greater than d, and c and d are not limited in particular.
(5) Target data uplink module 205: the target data uplink module 205 is configured to uplink the target data to obtain the first data when the current demand is greater than a preset demand.
The preset demand can be set together with the corresponding relation between the demand and the target data, and in an actual application scene, the preset demand can be different and set as required.
(6) Target data hash uplink module 206: the target data hash uplink module 206 is configured to hash uplink the target data to obtain the first data when the current demand is less than or equal to a preset demand.
(7) The data uploading module 207: the data uploading module 207 is configured to upload the target data to a data center station to obtain second data.
It should be noted that a secure channel is provided between the data uploading module 207 and the data center station, and the data is uploaded to the data center station through the secure channel, so that the data is actually and effectively uploaded to the data center station.
(8) Audit rules chaining module 208: the audit rule uplink module 208 is configured to uplink the audit rule after obtaining the audit rule.
It should be understood that the block chain based data processing system 20 chains the audit rule through the audit rule chain module 208, which ensures the transparency and publicity of the rule, and further ensures the trueness and credibility of the data.
(9) Tamper-proof collation module 209: the tamper-proof checking module 209 checks the first data and the second data to obtain a checking result; and if the checking result is that the first data and the second data are different, determining that the first data is tampered. In addition, if the checking result is that the first data and the second data are the same, it is determined that the first data is not tampered.
Therefore, the anti-tampering checking module can check the first data on the chain with the second data of the data center station, and the authenticity and credibility of the data on the chain can be improved.
(10) The tampered object determination module 210: the tampered object determining module 210 is configured to determine the tampered object according to the monitoring data obtained by monitoring the uplink process of the target data after determining that the first data is tampered.
And determining the tampered object so that a user can conveniently make a coping strategy according to the tampered object. The tampered object may be the data processing system 20 itself based on the blockchain, and the tampered object may also be a user of malicious intrusion, which is not limited in particular.
(11) The on-chain data control module 211: the on-chain data control module 211 is configured to delete or identify the first data through the blockchain network after determining that the first data is tampered with.
Deleting or identifying the first data through a blockchain network to improve the authenticity of the data on the chain.
(12) And the monitoring module: and the monitoring module is used for carrying out whole-process monitoring on the first data obtained according to the target data chaining to obtain monitoring data.
The monitoring module monitors the uplink process of the target data to obtain the monitoring data.
Based on the above detailed description of the parts in the data processing system 20 based on the blockchain, in practical applications, the data processing system 20 based on the blockchain may, in a case that only includes the data acquisition module 201, the transmission module (the data upload module 207 and the data uplink module (for uplink of the target data)), and the verification module (the tamper-proof verification module 209), after the acquisition module acquires the target data, uplink the target data through the data uplink module to obtain the first data, and simultaneously upload the target data through the data upload module 207 to the data console to obtain the second data, and finally, verify the first data and the second data through the tamper-proof verification module 209 to determine whether the target data on the chain is tampered, so as to improve the accuracy of the data on the chain.
Based on the above detailed description of the various parts of the block chain based data processing system 20, in practical applications, the block chain based data processing system 20 may add the audit rule obtaining module 202 and the uplink audit module 203 to the transmission module on the basis of only including the data obtaining module 201, the transmission module (the data uploading module 207 and the data uplink module (for uplink of the target data)) and the check module (the tamper-proof check module 209), except that the first data and the second data are checked by the tamper-proof check module 209 to determine whether the target data on the chain is tampered, so as to improve the accuracy of the data on the chain, before the target data is uplink by the data uplink module, the target data is audited by the uplink audit module 203, and the target data is uplink checked by the data uplink module, under the constraint of the audit rule, the accuracy of the first data is further improved.
Based on the above detailed description of each part of the data processing system 20 based on the blockchain, in practical applications, the data processing system 20 based on the blockchain may also be a combination of other modules, which is not limited specifically.
The following illustrates a data processing procedure based on a block chain according to an embodiment of the present application.
Referring to fig. 3, in an application scenario, in a target data item information 1 and an item information 2 obtained by a data processing system based on a block chain, a first item information (corresponding to a number ① in a diagram) is obtained according to an item information 1 link, at the same time, the item information 1 is uploaded to a data center station to obtain a second item information (corresponding to a number ② in the diagram), then the first item information is checked with the second item information (corresponding to a number ② in the diagram), at this time, the first item information and the second item information are obtained, it is determined that the first item information is tampered, and a block chain network is notified to delete or mark the first item information (corresponding to a chinese character a in the diagram), a third item information (corresponding to a number ③ in the diagram) is obtained according to the item information 2 link, at the same time, the item information 2 is uploaded to the data center station to obtain a fourth item information (corresponding to a number ④ in the diagram), at this time, the third item information is checked with the fourth item information, at this time, it is determined that the third item information is the same as the third item information, and the third item information is not tampered.
Referring to fig. 4, in another application scenario, a data processing system based on a block chain acquires target data service information 1, service information 2, service information 3 and service information 4, acquires audit rule 1, audit rule 2, audit rule 3 and audit rule 4 corresponding to service information 1, service information 2, service information 3 and service information 4, respectively, performs uplink audit on service information 1 according to audit rule 1, if the audit result is that the audit is not passed, the service information 1 is static to uplink, performs uplink on service information 2, service information 3 and service information 4 according to audit rule 2, audit rule 3 and audit rule 4, if the audit result is that the audit is passed, obtains first service information (number ① in a corresponding graph) according to service information 2, obtains second service information (number ② in a corresponding graph) according to service information 3, obtains third service information (number ③ in a corresponding graph) according to service information 4, obtains third service information (number in a corresponding graph) according to service information 4, and determines that the service information 2, service information 3 and service information are modified into a sixth service information (number) and a corresponding graph, and determines that the service information is modified by a third service information corresponding to a third service information, and a corresponding graph, and a third service information corresponding graph (number) is modified, and a corresponding graph is not modified, and a corresponding graph is determined that the service information corresponding graph is modified by a corresponding graph, and a corresponding graph is modified by a third service information corresponding graph (⑥), and a corresponding graph is not modified corresponding graph, and a corresponding graph is determined by a corresponding graph, and a corresponding graph is not modified corresponding graph, and a corresponding graph is determined by a corresponding.
It should be noted that fig. 3 and 4 are only examples and should not be construed as limiting the present application.
Therefore, the data processing system in the embodiment of the application can link the target data to obtain the first data, simultaneously upload the target data to the data center to obtain the second data, check the first data and the second data, finally determine whether the first data is tampered, and improve the accuracy of the data in the block chain.
In addition, before the data processing system of the embodiment of the application links the target data through the data link module, the link audit module is used for auditing the target data, and the data processing system links the target data through the data link module after the audit is passed, so that the accuracy of the data in the block chain is further improved under the constraint of the audit rule.
Referring to fig. 5, based on the above-described blockchain-based data processing system and blockchain-based data processing system, an embodiment of the present application provides a method for blockchain-based data processing, which includes, but is not limited to, the following steps:
s501, target data are obtained.
S502, obtaining first data according to the target data uplink.
In an embodiment, the obtaining first data according to the target data uplink includes: determining the current demand according to the target data; if the current demand is greater than a preset demand, chaining the target data to obtain the first data; and if the current demand is less than or equal to a preset demand, performing Hash chain on the target data to obtain the first data.
It should be noted that, for details of obtaining the first data according to the target data uplink, reference may be made to the description of the transmission module (the data upload module 207 and the data uplink module) in the embodiment of fig. 2, which is not described herein again.
S503, uploading the target data to a data center to obtain second data.
S504, the first data and the second data are checked to obtain a checking result.
It should be noted that, for details of the verification result obtained by verifying the first data and the second data, reference may be made to the description of the verification module (tamper-resistant verification module 209) in the embodiment of fig. 2, and details are not repeated here.
And S505, if the checking result is that the first data and the second data are different, determining that the first data is tampered.
Step S503 may be executed before step S502, step S503 may be executed simultaneously with step S502, and the execution order is not limited in the present application.
Referring to fig. 6, based on the above-described blockchain-based data processing system and blockchain-based data processing system, the embodiment of the present application provides yet another blockchain-based data processing method, which includes, but is not limited to, the following steps:
s601, acquiring target data.
And S602, acquiring an audit rule.
S603, linking the audit rule.
S604, performing uplink audit on the target data according to the audit rule to obtain an audit result.
And S605, if the audit result is that the audit is passed, obtaining first data according to the target data uplink.
In an embodiment, the obtaining first data according to the target data uplink includes: determining the current demand according to the target data; if the current demand is greater than a preset demand, chaining the target data to obtain the first data; and if the current demand is less than or equal to a preset demand, performing Hash chain on the target data to obtain the first data.
And S606, uploading the target data to a data center to obtain second data.
S607, the first data and the second data are checked to obtain a check result.
S608, if the checking result shows that the first data and the second data are different, it is determined that the first data are tampered.
S609, deleting or identifying the first data through a block chain network;
s610, performing whole-process monitoring on the first data obtained according to the target data chaining to obtain monitoring data;
s611, determining a tampered object according to the monitoring data.
It should be noted that the steps S605 and S606 are not necessarily in sequence, and the steps S609, S610 and S611 are also not necessarily in sequence.
It should be further noted that, the implementation of the method embodiments in fig. 5 and fig. 6 described above may also refer to the related description of the embodiments in fig. 3 and fig. 4.
It can be seen that the data processing system according to the embodiment of the present application can link the target data to obtain the first data, and at the same time, upload the target data to the data center station to obtain the second data, and check the first data and the second data, to finally determine whether the first data is tampered, thereby improving the accuracy of the data in the block chain.
In addition, before the data processing system of the embodiment of the application links the target data through the data link module, the link audit module is used for auditing the target data, and the data processing system links the target data through the data link module after the audit is passed, so that the accuracy of the data in the block chain is further improved under the constraint of the audit rule.
Based on the same application concept, the following describes yet another data processing system 70 based on block chains provided by the embodiments of the present application. Referring to fig. 7, a data processing system based on a block chain according to an embodiment of the present application includes:
the data acquisition module 701 is configured to acquire target data;
the transmission module 702 is configured to obtain first data according to the target data uplink;
the transmission module 702 is further configured to upload the target data to a data center to obtain second data;
the checking module 703 is configured to check the first data and the second data to obtain a checking result; and if the checking result is that the first data and the second data are different, determining that the first data is tampered.
It should be noted that, through the foregoing detailed description of the blockchain-based data processing system in the embodiment of fig. 2 to 4, the implementation method of each functional module included in the blockchain-based data processing system 70 is clearly known by those skilled in the art, and therefore, for the brevity of the description, the detailed description is not repeated here.
An embodiment of the present application provides a blockchain-based data processing system, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any of the methods described in the above method embodiments.
Embodiments of the present application also provide a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the methods as described in the above method embodiments.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the above-described modules is merely a logical division, and other divisions may be realized in practice, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some interfaces, and may be in an electrical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated modules, if implemented in the form of software functional modules and sold or used as separate products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and as described above, the content of the present specification should not be construed as a limitation to the present application.

Claims (12)

1. A method for processing data based on a blockchain, the method comprising:
acquiring target data;
obtaining first data according to the target data uplink;
uploading the target data to a data center to obtain second data;
checking the first data and the second data to obtain a checking result;
and if the checking result is that the first data and the second data are different, determining that the first data is tampered.
2. The method of claim 1, wherein obtaining first data based on the target data uplink comprises:
acquiring an audit rule;
performing uplink audit on the target data according to the audit rule to obtain an audit result;
and if the audit result is that the audit is passed, obtaining first data according to the target data uplink.
3. The method according to claim 2, wherein after obtaining the audit rule, the method further comprises:
and linking the audit rule.
4. The method according to any of claims 1-3, wherein said obtaining first data based on the target data uplink comprises:
determining the current demand according to the target data;
if the current demand is greater than a preset demand, chaining the target data to obtain the first data;
and if the current demand is less than or equal to a preset demand, performing Hash chain on the target data to obtain the first data.
5. The method of claim 1, wherein after determining that the first data has been tampered with, the method further comprises:
deleting or identifying the first data over a blockchain network.
6. The method according to any one of claims 1-3, further comprising:
performing whole-process monitoring on the first data obtained according to the target data chaining to obtain monitoring data;
determining a tampered object according to the monitoring data after the first data is determined to be tampered.
7. A blockchain-based data processing system comprising a data acquisition module, a transmission module communicatively coupled to a blockchain network and to a data middlebox station, and a reconciliation module communicatively coupled to the blockchain network and to the data middlebox station,
the data acquisition device is used for acquiring target data;
the transmission module is used for obtaining first data according to the target data uplink;
the transmission module is further used for uploading the target data to a data center to obtain second data;
the checking module is used for checking the first data and the second data to obtain a checking result; and if the checking result is that the first data and the second data are different, determining that the first data is tampered.
8. The system of claim 7, wherein, in the aspect of obtaining the first data according to the target data uplink, the transmission module is specifically configured to:
acquiring an audit rule;
performing uplink audit on the target data according to the audit rule to obtain an audit result;
and if the audit result is that the audit is passed, obtaining first data according to the target data uplink.
9. The system of claim 7, wherein after obtaining the audit rule, the transmission module is further configured to:
and linking the audit rule.
10. The system according to any of claims 1-3, wherein, in said obtaining first data according to the target data uplink, the transmission module is specifically configured to:
determining the current demand according to the target data;
if the current demand is greater than a preset demand, chaining the target data to obtain the first data;
and if the current demand is less than or equal to a preset demand, performing Hash chain on the target data to obtain the first data.
11. The system of claim 7, wherein the reconciliation module is further configured to: deleting or identifying the first data through the blockchain network after the determining that the first data is tampered.
12. The system of any one of claims 6-10, further comprising a monitoring module communicatively coupled to the transmission module and the reconciliation module, respectively, wherein,
the monitoring module is used for carrying out whole-process monitoring on the first data obtained according to the target data chaining to obtain monitoring data;
the verification module is further configured to determine a tampered object according to the monitoring data after the first data is determined to be tampered.
CN201911426095.2A 2019-12-31 2019-12-31 Block chain-based data processing method and related product Pending CN111209600A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911426095.2A CN111209600A (en) 2019-12-31 2019-12-31 Block chain-based data processing method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911426095.2A CN111209600A (en) 2019-12-31 2019-12-31 Block chain-based data processing method and related product

Publications (1)

Publication Number Publication Date
CN111209600A true CN111209600A (en) 2020-05-29

Family

ID=70787524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911426095.2A Pending CN111209600A (en) 2019-12-31 2019-12-31 Block chain-based data processing method and related product

Country Status (1)

Country Link
CN (1) CN111209600A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112100661A (en) * 2020-09-16 2020-12-18 深圳集智数字科技有限公司 Data processing method and device
CN112783942A (en) * 2021-01-13 2021-05-11 湖北宸威玺链信息技术有限公司 Block chain-based data acquisition quality verification method, system, device and medium
CN113239056A (en) * 2021-05-19 2021-08-10 浙江网商银行股份有限公司 Data checking method and system based on block chain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset
CN110290192A (en) * 2019-06-18 2019-09-27 贝富(广州)新技术有限公司 The storage of data distribution formula and data capture method, device based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset
CN110290192A (en) * 2019-06-18 2019-09-27 贝富(广州)新技术有限公司 The storage of data distribution formula and data capture method, device based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112100661A (en) * 2020-09-16 2020-12-18 深圳集智数字科技有限公司 Data processing method and device
CN112100661B (en) * 2020-09-16 2024-03-12 深圳集智数字科技有限公司 Data processing method and device
CN112783942A (en) * 2021-01-13 2021-05-11 湖北宸威玺链信息技术有限公司 Block chain-based data acquisition quality verification method, system, device and medium
CN112783942B (en) * 2021-01-13 2022-12-06 湖北宸威玺链信息技术有限公司 Block chain-based data acquisition quality verification method, system, device and medium
CN113239056A (en) * 2021-05-19 2021-08-10 浙江网商银行股份有限公司 Data checking method and system based on block chain

Similar Documents

Publication Publication Date Title
Lee et al. Blockchain based privacy preserving multimedia intelligent video surveillance using secure Merkle tree
CN108270874B (en) Application program updating method and device
CN109784870B (en) Contract management method, contract management device, computer equipment and computer readable storage medium
CN111209600A (en) Block chain-based data processing method and related product
EP3709568A1 (en) Deleting user data from a blockchain
CN103180862A (en) System and method for server-coupled malware prevention
US10778648B2 (en) Systems and methods for regional data storage and data anonymization
CN110266872B (en) Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium
CN110400217B (en) Rule change processing method and device for intelligent contract
US10282461B2 (en) Structure-based entity analysis
EP3744071B1 (en) Data isolation in distributed hash chains
CN113472883A (en) Method, device and equipment for storing data based on block chain and storage medium
WO2020087877A1 (en) Privacy information tracing and evidence collection method, apparatus, and system
US11557005B2 (en) Addressing propagation of inaccurate information in a social networking environment
CN108090364B (en) Method and system for positioning data leakage source
Kedziora et al. Analysis of segregated witness implementation for increasing efficiency and security of the Bitcoin cryptocurrency
CN112925711A (en) Local joint debugging test method and related device
CN114372092A (en) Case collaborative search processing method, system, device and electronic equipment
CN114417397A (en) Behavior portrait construction method and device, storage medium and computer equipment
CN114567678A (en) Resource calling method and device of cloud security service and electronic equipment
CN111107143B (en) Network file transmission detection method, device and system
CN114491661A (en) Log tamper-proofing method and system based on block chain
CN112214464A (en) Evidence preservation method and system based on block chain
CN110879835A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN112581129A (en) Block chain transaction data management method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200529

RJ01 Rejection of invention patent application after publication