CN112580103A - Intermediate database table-based uplink method and system - Google Patents
Intermediate database table-based uplink method and system Download PDFInfo
- Publication number
- CN112580103A CN112580103A CN202011593118.1A CN202011593118A CN112580103A CN 112580103 A CN112580103 A CN 112580103A CN 202011593118 A CN202011593118 A CN 202011593118A CN 112580103 A CN112580103 A CN 112580103A
- Authority
- CN
- China
- Prior art keywords
- uplink
- data
- state
- waiting
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Abstract
The invention discloses a chaining method and system based on an intermediate database table, and relates to the technical field of block chains. The method comprises the following steps: building an intermediate database, and creating an intermediate table according to data needing to be linked; inserting data needing to be linked into the intermediate table, marking the state of the data as waiting for the link, and using a private key signature of a link operator to sign the data; verifying the signature and the service data through an intelligent contract on the chain, and determining whether the signature and the service data are consistent; and after the verification is passed, performing a data chaining link. The method is simple to operate and high in processing capacity, and the overall safety of the block chain cannot be influenced.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a cochain method and a cochain system based on an intermediate database table.
Background
Block chaining techniques: the blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The common identification mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system, and the data are stored by using the property that the data cannot be tampered so as to ensure the safety of the data. The uplink refers to a process of storing the certificate in the block chain network submitted by the service data. The prior common uplink scheme is that a blockchain network is connected between users, an interface is called, and uplink is carried out, the technical requirement on the use of the scheme is higher, related interfaces of uplink need to be known, the uplink result acquisition modes are also diversified, the concurrent processing capability of a blockchain needs to be considered in the processing, and the integrated use difficulty is high.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a cochain method based on an intermediate database table, which is simple in method and strong in processing capacity.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: an intermediate database table-based uplink method is characterized by comprising the following steps:
building an intermediate database, and creating an intermediate table according to data needing to be linked;
inserting data needing to be linked into the intermediate table, marking the state of the data as waiting for the link, and using a private key signature of a link operator to sign the data;
verifying the signature and the service data through an intelligent contract on the chain, and determining whether the signature and the service data are consistent;
and after the verification is passed, performing a data chaining link.
The application also discloses chaining system based on intermediate database table, its characterized in that includes:
an intermediate table creation module: the method comprises the steps of establishing a middle database, and establishing a middle table according to data needing to be linked;
a data insertion module: the system is used for inserting data needing to be linked into the middle table, marking the state of the data as waiting for the linking, and using a private key signature of a linking operator to sign the data;
a verification module: the intelligent contract is used for verifying the signature and the service data through the intelligent contract on the chain and confirming whether the signature and the service data are consistent;
an upper chain module: and the link for data uplink is verified after the link passes.
Adopt the produced beneficial effect of above-mentioned technical scheme to lie in: according to the method and the device, the uplink is realized through the intermediate table, the block chain and the operation interface on the chain do not need to be known, the operation is simple, and the uplink processing capacity can be improved; and can effectively control the information entry of the upper chain through the intermediate table, reduce the possibility that the chain is attacked; in the application, the intermediate table is only used for transmission, and cannot forge new data or tamper new data uplink, so that the overall security is not influenced.
Drawings
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
FIG. 1 is a flow chart of a method according to an embodiment of the invention;
fig. 2 is a functional block diagram of a system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
As shown in fig. 1, an embodiment of the present invention discloses a cochain method based on an intermediate database table, including the following steps:
building an intermediate database, and creating an intermediate table according to data needing to be linked;
inserting data needing to be linked into the intermediate table, marking the state of the data as waiting for the link, and using a private key signature of a link operator to sign the data;
verifying the signature and the service data through an intelligent contract on the chain, and determining whether the signature and the service data are consistent;
after the verification is passed, performing a link of data chaining;
the method obtains the uplink result by querying the intermediate table.
Furthermore, in the uplink process, the service regularly inquires the record of which the state is waiting for uplink in the intermediate table, calls uplink interfaces in sequence to carry out uplink, updates the uplink state into the uplink, processes the returned transaction hash after the uplink interface is successfully called, updates the transaction hash into the corresponding record of the intermediate table, and updates the state into the state of waiting for verification whether the uplink is successful.
Further, the uplink service regularly inquires the record of which the state is waiting for verification in the intermediate table, calls the uplink result inquired by the uplink interface according to the transaction hash processing, updates the uplink result into the corresponding record of the intermediate table, and if the state is changed into waiting for uplink in failure, the uplink is carried out again.
As shown in fig. 2, an embodiment of the present invention further discloses an uplink system based on an intermediate database table, including:
an intermediate table creation module: the method comprises the steps of establishing a middle database, and establishing a middle table according to data needing to be linked;
a data insertion module: the system is used for inserting data needing to be linked into the middle table, marking the state of the data as waiting for the linking, and using a private key signature of a linking operator to sign the data;
a verification module: the intelligent contract is used for verifying the signature and the service data through the intelligent contract on the chain and confirming whether the signature and the service data are consistent;
an upper chain module: a link for data uplink transmission after passing verification; the system obtains the uplink result by querying the intermediate table.
Further, the system further comprises a status update module: the method is used for inquiring the record with the state of waiting for the uplink in the intermediate table at regular time in the uplink process, calling uplink interfaces in sequence for uplink, updating the uplink state into the uplink, processing the returned transaction hash after the uplink interfaces are successfully called, updating the transaction hash into the corresponding record of the intermediate table, and updating the state into the state of waiting for verifying whether the uplink is successful.
Further, the system further comprises an uplink service timing query module: the method is used for regularly inquiring the record of which the state is waiting for verification in the intermediate table, calling the uplink inquiry result of the uplink interface according to the transaction hash processing, updating the uplink inquiry result into the corresponding record of the intermediate table, and changing the state into waiting for uplink if the uplink inquiry result fails, and re-uplink.
In conclusion, the method and the device realize the uplink through the intermediate table, do not need to know the block chain and the operation interface on the chain, have simple operation and can improve the uplink processing capacity; and can effectively control the information entry of the upper chain through the intermediate table, reduce the possibility that the chain is attacked; in the application, the intermediate table is only used for transmission, and cannot forge new data or tamper new data uplink, so that the overall security is not influenced.
Claims (8)
1. An intermediate database table-based uplink method is characterized by comprising the following steps:
building an intermediate database, and creating an intermediate table according to data needing to be linked;
inserting data needing to be linked into the intermediate table, marking the state of the data as waiting for the link, and using a private key signature of a link operator to sign the data;
verifying the signature and the service data through an intelligent contract on the chain, and determining whether the signature and the service data are consistent;
and after the verification is passed, performing a data chaining link.
2. The intermediate database table based uplink method of claim 1, wherein:
in the uplink process, the service regularly inquires the record of which the state is the waiting uplink in the intermediate table, calls uplink interfaces in sequence to carry out uplink, updates the uplink state into the uplink, processes the returned transaction hash after the uplink interfaces are successfully called, updates the transaction hash into the corresponding record of the intermediate table, and updates the state into the waiting verification of whether the uplink is successful.
3. The intermediate database table based uplink method of claim 2, wherein: and the uplink service regularly inquires the record of which the state is waiting for verification in the intermediate table, calls the uplink result inquired by the uplink interface according to the transaction hash processing, updates the uplink result into the corresponding record of the intermediate table, and changes the state into waiting for uplink if the uplink service fails, and then carries out uplink again.
4. The intermediate database table based uplink method of claim 1, wherein: and obtaining the uplink result by querying the intermediate table.
5. An intermediate database table based uplink system comprising:
an intermediate table creation module: the method comprises the steps of establishing a middle database, and establishing a middle table according to data needing to be linked;
a data insertion module: the system is used for inserting data needing to be linked into the middle table, marking the state of the data as waiting for the linking, and using a private key signature of a linking operator to sign the data;
a verification module: the intelligent contract is used for verifying the signature and the service data through the intelligent contract on the chain and confirming whether the signature and the service data are consistent;
an upper chain module: and the link for data uplink is verified after the link passes.
6. The intermediate database table based uplink system of claim 5, wherein said system further comprises:
a state updating module: the method is used for inquiring the record with the state of waiting for the uplink in the intermediate table at regular time in the uplink process, calling uplink interfaces in sequence for uplink, updating the uplink state into the uplink, processing the returned transaction hash after the uplink interfaces are successfully called, updating the transaction hash into the corresponding record of the intermediate table, and updating the state into the state of waiting for verifying whether the uplink is successful.
7. The intermediate database table based uplink system of claim 5, wherein said system further comprises:
uplink service timing query module: the method is used for regularly inquiring the record of which the state is waiting for verification in the intermediate table, calling the uplink inquiry result of the uplink interface according to the transaction hash processing, updating the uplink inquiry result into the corresponding record of the intermediate table, and changing the state into waiting for uplink if the uplink inquiry result fails, and re-uplink.
8. The intermediate database table based uplink system of claim 5, wherein: the system obtains the uplink result by querying the intermediate table.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011593118.1A CN112580103A (en) | 2020-12-29 | 2020-12-29 | Intermediate database table-based uplink method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011593118.1A CN112580103A (en) | 2020-12-29 | 2020-12-29 | Intermediate database table-based uplink method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112580103A true CN112580103A (en) | 2021-03-30 |
Family
ID=75143918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011593118.1A Pending CN112580103A (en) | 2020-12-29 | 2020-12-29 | Intermediate database table-based uplink method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112580103A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113204550A (en) * | 2021-04-29 | 2021-08-03 | 湖北央中巨石信息技术有限公司 | Block chain-based chain uplink and downlink synchronization method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659430A (en) * | 2019-08-23 | 2020-01-07 | 上海共链信息科技有限公司 | Block chain browsing method supporting multi-block chain network |
CN110704428A (en) * | 2019-09-06 | 2020-01-17 | 深圳壹账通智能科技有限公司 | Data indexing method and device for block chain, computer equipment and storage medium |
US20200142992A1 (en) * | 2018-11-01 | 2020-05-07 | Sap Se | Dual-stack architecture that integrates relational database with blockchain |
CN111125787A (en) * | 2019-12-27 | 2020-05-08 | 上海共链信息科技有限公司 | Gas inspection data cochain system based on block chain and use method thereof |
CN111488343A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | E-commerce data uplink method and device based on business data block chain |
-
2020
- 2020-12-29 CN CN202011593118.1A patent/CN112580103A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200142992A1 (en) * | 2018-11-01 | 2020-05-07 | Sap Se | Dual-stack architecture that integrates relational database with blockchain |
CN110659430A (en) * | 2019-08-23 | 2020-01-07 | 上海共链信息科技有限公司 | Block chain browsing method supporting multi-block chain network |
CN110704428A (en) * | 2019-09-06 | 2020-01-17 | 深圳壹账通智能科技有限公司 | Data indexing method and device for block chain, computer equipment and storage medium |
CN111125787A (en) * | 2019-12-27 | 2020-05-08 | 上海共链信息科技有限公司 | Gas inspection data cochain system based on block chain and use method thereof |
CN111488343A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | E-commerce data uplink method and device based on business data block chain |
Non-Patent Citations (1)
Title |
---|
宋俊典: "基于区块链的数据治理协同方法", 《计算机应用》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113204550A (en) * | 2021-04-29 | 2021-08-03 | 湖北央中巨石信息技术有限公司 | Block chain-based chain uplink and downlink synchronization method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108492108B (en) | Block chain cross-chain communication method, system and computer readable storage medium | |
WO2017177383A1 (en) | Remote management method and device | |
US20080022086A1 (en) | Methods and system for a key recovery plan | |
CN111209558B (en) | Internet of things equipment identity authentication method and system based on block chain | |
CN112364311B (en) | Identity management method and device on blockchain | |
CN105427099A (en) | Network authentication method for secure electronic transactions | |
CN110362357A (en) | A kind of configuration file management method and device of application program | |
WO2020224235A1 (en) | Cross-chain transaction method and apparatus, device, and storage medium | |
CN110210863A (en) | Block chain method for secure transactions, device, electronic equipment and storage medium | |
CN109347865B (en) | User data authentication and evidence storage method and system based on block chain technology | |
CN111340483A (en) | Data management method based on block chain and related equipment | |
CN115396121A (en) | Security authentication method for security chip OTA data packet and security chip device | |
CN109754322A (en) | A kind of data service system | |
CN112950201A (en) | Node management method and related device applied to block chain system | |
CN1786864A (en) | Method for safety identification of computer | |
CN112580103A (en) | Intermediate database table-based uplink method and system | |
CN111869165B (en) | Method and control system for controlling and/or monitoring a device | |
CN104506533A (en) | RFID (radio frequency identification) label ownership transfer method based on PUF (physical unclonable function) | |
CN111160803A (en) | Business process safety and management method and system based on block chain | |
CN110601854B (en) | Authorization client, power distribution terminal equipment and authorization method thereof | |
CN109474431A (en) | Client certificate method and computer readable storage medium | |
CN107171814A (en) | A kind of digital certificate updating method and device | |
CN111131211A (en) | Anti-tampering method for sharing washing machine safety | |
EP4246873A1 (en) | Method and system for changing key in security module | |
CN115482132A (en) | Data processing method and device for electronic contract based on block chain and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210330 |
|
RJ01 | Rejection of invention patent application after publication |