CN112583805A - Data processing method and device based on block chain, electronic equipment and storage medium - Google Patents

Data processing method and device based on block chain, electronic equipment and storage medium Download PDF

Info

Publication number
CN112583805A
CN112583805A CN202011410831.8A CN202011410831A CN112583805A CN 112583805 A CN112583805 A CN 112583805A CN 202011410831 A CN202011410831 A CN 202011410831A CN 112583805 A CN112583805 A CN 112583805A
Authority
CN
China
Prior art keywords
block
data
tertiary
sensitive
query result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011410831.8A
Other languages
Chinese (zh)
Other versions
CN112583805B (en
Inventor
王宇
陈正
刘胜
王杰
杨士弘
张生辉
黄朝阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Union Mobile Pay Co Ltd
Original Assignee
Joint Digital Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Joint Digital Technology Beijing Co Ltd filed Critical Joint Digital Technology Beijing Co Ltd
Priority to CN202011410831.8A priority Critical patent/CN112583805B/en
Publication of CN112583805A publication Critical patent/CN112583805A/en
Application granted granted Critical
Publication of CN112583805B publication Critical patent/CN112583805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The embodiment of the application discloses a data processing method and device based on a block chain, electronic equipment and a storage medium. The method comprises the following steps: detecting whether each block of the block chain has sensitive data or not based on a supervision filtering rule; if the sensitive data exist in any block, determining other data except the sensitive data in the block, and generating a tertiary block of the block according to the other data, so that the data in the block chain network is safer.

Description

Data processing method and device based on block chain, electronic equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of block chains, in particular to a data processing method and device based on a block chain, an electronic device and a storage medium.
Background
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is a chain data storage structure formed by combining data blocks in a sequential connection mode according to a time sequence, and has the characteristics of information non-falsification, decentralization, openness and the like. Due to the characteristic that the block chain cannot be tampered, if someone spreads illegal contents by means of the block chain, great challenges are brought to block chain supervision.
In the prior art, illegal data are filtered through a browser outside a block chain, an external device is excessively relied on, so that the block chain system architecture is limited, the data can be filtered only by accessing the block chain browser, and the block chain data filtering process is more complicated and burdensome. Or data filtering is carried out through a filtering rule table arranged outside the block chain, the block chain data and the corresponding chain identification are sent to the content security module, and data filtering is carried out through the filtering rule table in the content security module, so that the filtering rule table of an external data source is excessively depended on, the filtering table needs to be dynamically updated, when multiple nodes of the block chain are deployed in a cross-region mode, extra overhead of block chain data synchronization is increased, and the block chain system is complex to maintain and low in data query efficiency.
Disclosure of Invention
The embodiment of the application provides a data processing method based on a block chain, so that the data query efficiency is improved.
In a first aspect, an embodiment of the present application provides a data processing method based on a block chain, including:
detecting whether each block of the block chain has sensitive data or not based on a supervision filtering rule;
and if the sensitive data exist in any block, determining other data except the sensitive data in the block, and generating a tertiary block of the block according to the other data.
In a second aspect, an embodiment of the present application provides a data processing apparatus based on a block chain, including:
the sensitive data detection module is used for detecting whether each block of the block chain has sensitive data or not based on the supervision filtering rule;
and the tertiary block generation module is used for determining other data except the sensitive data in any block if the sensitive data exists in the block, and generating the tertiary block of the block according to the other data.
In a third aspect, an embodiment of the present application provides an electronic device, including:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method for blockchain-based data processing as in any embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a block chain based data processing method according to any of the embodiments of the present application.
According to the technical scheme of the embodiment of the application, whether sensitive data exist in the block chain is detected, the sensitive data in the block is filtered to obtain other data of the block, and the tertiary block of the block is generated according to the other data. The block chain network enables the data in the block chain network to be safer through the filtered legal data in the tertiary block storage block.
Drawings
Fig. 1 is a flowchart of a data processing method based on a block chain according to an embodiment of the present application;
fig. 2A is a flowchart of a data processing method based on a block chain according to a second embodiment of the present application;
fig. 2B is a schematic structural diagram of a block connection according to a second embodiment of the present disclosure;
fig. 2C is a schematic structural diagram of a block connection according to a second embodiment of the present application;
fig. 3 is a flowchart of a data processing method based on a block chain according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of a data processing apparatus based on a block chain according to a fourth embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application.
Detailed Description
The embodiments of the present application will be described in further detail with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the embodiments of the application and are not limiting of the application. It should be further noted that, for convenience of description, only some structures related to the embodiments of the present application are shown in the drawings, not all of the structures are shown.
Example one
Fig. 1 is a flowchart of a data processing method based on a block chain according to an embodiment of the present disclosure, which is applicable to a data processing situation, especially to a data processing situation based on a block chain, so as to solve the problems of insecurity of data and low query efficiency in a block chain network in the prior art. The method may be performed by the data processing apparatus based on the blockchain provided in the embodiment of the present application, and the apparatus may be implemented in a hardware and/or software manner, and may be integrated in an electronic device carrying a data processing function based on the blockchain, such as a server device, and the like. Referring to fig. 1, the method may specifically include:
s110, detecting whether each block of the block chain has sensitive data or not based on the supervision filtering rule.
In this embodiment, the supervision filtering rule is a rule for filtering non-compliant data in the blockchain network, and may be generated and updated by a supervision node according to a rule in any data format, where the supervision node is a node for supervising and maintaining the blockchain network; the blocks are constituent units of a block chain for storing data, each block being generated on the basis of data of a previous block; sensitive data refers to data that is not compliant in the blockchain network and generally affects the security of the blockchain network.
In this embodiment, a protocol is constructed at a contract layer of the blockchain network, and is used for detecting each block in the blockchain based on a supervision filtering rule in the blockchain network, and the protocol is called a rule engine, and further a program carrying a function of the rule engine is called a rule engine module. For a block chain network with an intelligent contract, a rule engine module is integrated into an intelligent contract engine, and whether sensitive data exists in each block of a block chain is detected through the intelligent contract engine based on a supervision filtering rule. Among other things, smart contracts are computer protocols that aim to propagate, verify, or execute contracts in an informational manner, residing at the contract layer in a blockchain network. Smart contracts allow data records to be made without third parties, which data records are traceable and irreversible. An intelligent contract engine refers to a program code that implements intelligent contracts in a blockchain.
Further, for a blockchain network without an intelligent contract, a rule engine interface service may be used, that is, a rule engine is integrated into an interface service as a part of logic of the interface service, and based on a supervision filtering rule, whether sensitive data exists in each block of a blockchain is detected. The interface service refers to a communication rule between different functional layers of the same computer, and in this embodiment, refers to a communication rule between different functional layers in a block chain network.
S120, if the sensitive data are detected to exist in any block, determining other data except the sensitive data in the block, and generating a tertiary block of the block according to the other data.
In this embodiment, in the blockchain network, since the speed of generating the blocks by ether house is faster than that of generating the blocks by bitcoin, the blocks which are compliant but not added to the main blockchain are generated, and such blocks are called tertiary blocks. The main block chain is used for recording user service data. The Ether Fang is an open-source blockchain common platform capable of freely developing intelligent contracts.
In this embodiment, if it is detected that sensitive data exists in any block, the sensitive data is filtered based on the monitoring filtering rule, and other data in the block except the sensitive data is determined, and then hash calculation is performed on the other data to generate a new block, that is, a tertiary block of the block.
Further, if no sensitive data is detected in any block, no tertiary block of the block needs to be generated.
According to the technical scheme, whether sensitive data exist in each block of the block chain is detected based on the supervision filtering rule, if the sensitive data exist in any block, other data except the sensitive data in the block are determined, the tertiary block of the block is generated according to the other data, and the filtered data are stored through the tertiary block, so that the data in the block chain network are safer.
On the basis of the above embodiments, in order to maintain data security in a blockchain network in real time, as an optional way of the embodiments of the present application, when it is detected that the supervision filtering rule is updated, a detection operation on sensitive data in a block is triggered to be executed.
In this embodiment, the supervision filtering rule is updated by a supervision node in the blockchain system, and when the supervision consideration rule needs to be updated, the supervision node initiates a supervision filtering rule updating transaction request to other nodes in the blockchain network, where the supervision filtering rule updating transaction request may include a filtering rule to be updated, a public key of the supervision node, signature data, and the like when the filtering rule needs to be updated. The signature data is obtained by the supervision node performing hash calculation on the message data by using a hash function, generating a data abstract and then signing the data abstract by using a private key of the supervision node.
Furthermore, the other nodes in the blockchain network respond to the rule update transaction request acquired from the supervision node, and verify the identity of the supervision node, which may specifically be: other nodes in the block chain network acquire the public key of the supervision node from the update transaction request to sign off the signature data to obtain a signed off data abstract, and compare whether the signed off data abstract is consistent with the data abstract before signature, if so, the identity verification of the supervision node is passed; and if the identity check of the supervision nodes is inconsistent, the identity check of the supervision nodes is not passed. Further, in the case that the identity check passes, the supervision filtering rule is written into the blockchain, and the supervision filtering rule is synchronized to other nodes in the blockchain network based on the consensus mechanism verification. The consensus mechanism is an algorithm for each node in the blockchain network to perform consensus on the sequence of the transactions in the blockchain within a certain time period, and may be, for example, workload proofs (Proof of Work, PoW), rights and interests proofs (Proof of stamp, PoS), Delegated rights proofs (DPoS), Practical Byzantine Fault Tolerance (PBFT), and the like.
When other nodes in the block chain network synchronously supervise the filtering rules, namely the supervision filtering rules are detected to be updated, sensitive data in the blocks are detected.
It can be understood that, when the supervision filtering rule is updated, the sensitive data in the block is detected, so that the data in the block chain network is ensured to be safe in real time, and the data queried by the user is further ensured to be safe and reliable.
Example two
Fig. 2A is a flowchart of a data processing method based on a block chain according to a second embodiment of the present application; on the basis of the above embodiment, it is optimized that if the sensitive data is detected in any block, other data in the block except the sensitive data is determined, and the tertiary primary block of the block is generated according to the other data, so as to complete the generation mechanism of the tertiary primary block.
Referring to the method shown in fig. 2A, the method may specifically include:
s210, detecting whether each block of the block chain has sensitive data or not based on the supervision filtering rule.
S220, if the sensitive data exist in any block, determining other data except the sensitive data in the block, and generating a tertiary block of the block according to the other data.
In this embodiment, if it is detected that there is sensitive data in any block, other data in the block except the sensitive data is determined, and a tertiary block of the block is generated according to the other data. For a tertiary block that generates the block from other data, it may be: if the block does not have a tertiary block, a hash of the block is added to the generated tertiary block to connect the generated tertiary block with the block.
Specifically, the rule engine module in the block chain network determines whether the block has a tertiary block, and if the block does not have a tertiary block, adds the hash of the block to the generated tertiary block to connect the generated tertiary block with the block. For example, referring to fig. 2B, a1, B1, and C1 are any block in the block chain network, and if the presence of sensitive data is detected in the B1 block, data other than the sensitive data in the B1 block is determined, a tertiary primary block B2 of the B1 block is generated according to the other data, and a hash of the block B1 is added to the generated tertiary primary block B2 to connect the generated tertiary primary block B2 and the block B1.
Further, for generating the tertiary block of the block according to other data, the following may be also used: if the block has other tertiary blocks, adding the hash of the tail tertiary block in the other tertiary blocks in the generated tertiary block to connect the generated tertiary block with the tail tertiary block.
Specifically, the rule engine module in the block chain network determines whether the block has a tertiary block, and if the block has a tertiary block, hash of a tail tertiary block in other tertiary blocks is added to the generated tertiary block to connect the generated tertiary block with the tail tertiary block. For example, referring to fig. 2C, a1, B1, C1 are any block in the block chain network, a tertiary primary block B2 is connected to block B1 and is a tail tertiary primary block that distinguishes B1, if sensitive data is detected in the B1 block, data other than the sensitive data in the B1 block is determined, a tertiary primary block B3 of the B1 block is generated according to the other data, and a hash of the tail tertiary primary block B2 is added to the generated tertiary primary block B3 to connect the generated tertiary primary block B3 and the tail tertiary primary block B2.
Optionally, the tertiary block of the block is generated according to other data, and the method may further include: generating a sensitive mark for the sensitive data of the block; a tertiary block of the block is generated based on the other data and the sensitive label.
In this embodiment, the sensitive flag is a flag used for characterizing whether the block has sensitive data, and may be a flag indicating whether the block has sensitive data, for example, the flag is 1 if the block has sensitive data, and the flag is 0 if the block does not have sensitive data; or a service transaction number in the block, i.e. an ID number; it may also be the version number of the block; and so on.
In this embodiment, the rule engine module in the block chain network generates a sensitive mark for the sensitive data of the block, and performs encryption calculation on other data and the sensitive mark to generate a tertiary block of the block. Wherein, the encryption may be encryption by a hash algorithm. If the block does not have a tertiary block, a hash of the block is added to the generated tertiary block to connect the generated tertiary block with the block. If the block has other tertiary blocks, adding the hash of the tail tertiary block in the other tertiary blocks in the generated tertiary block to connect the generated tertiary block with the tail tertiary block.
According to the technical scheme of the embodiment of the application, if sensitive data exist in any block, under different conditions, namely under the condition that any block in a block chain network has a tertiary block and under the condition that any block in the block chain network does not have the tertiary block, the tertiary block of the block is generated; furthermore, a sensitive mark is generated for sensitive data, and a tertiary block of the block is further generated, and by the above method, only filtered data is recorded without influencing the chain structure in the block chain system, so that incremental data in the block chain network is less, and the burden of nodes in the block chain network is reduced.
EXAMPLE III
Fig. 3 is a flowchart of a data processing method based on a block chain according to a third embodiment of the present application; on the basis of the above embodiment, the operation of data query in the block chain network with tertiary blocks is further added.
Referring to the method of fig. 3, the method may specifically include:
s310, in response to the data query transaction request acquired from the user node, determining a target block to be queried.
Wherein, the user node is a common user in the block chain network; the data query transaction request refers to a request for a data query transaction initiated by a user node to a blockchain network, and may include a transaction ID; the target block is a block where data to be searched by the user node is located.
In the embodiment, a user node initiates a data query transaction request to a blockchain network; and other nodes in the block chain network respond to the data query transaction request acquired from the user node, and determine a target block to be queried according to the data query transaction request. For example, other nodes in the blockchain network may determine the target block to be queried based on the transaction ID in the data query transaction request.
And further, determining whether the target block is connected with the tertiary block, if not, acquiring a data query structure from the target block, and feeding back a data query result to the user node.
And S320, if the target block is connected with the tertiary block, acquiring a data query result from the tertiary block, and feeding the data query result back to the user node.
In this embodiment, if the target block is connected with the tertiary block, it is indicated that sensitive data exists in the target block, data query is performed without being performed in the target block, a data query result is obtained from the tertiary block of the target block, if the data query result is fed back to the user node, and if the data is queried, the queried data is fed back to the user node; and if the data is not queried, feeding back the result of the query to the user node. With continued reference to FIG. 2B, for example, if the target block to be queried is B1, and the block B1 has a tertiary B2, the data query result is obtained from the tertiary B2.
Further, if the target block chain is connected with at least two tertiary blocks, a data query result is obtained from the tail tertiary block, and the data query result is fed back to the user node.
In this embodiment, if the target block is connected with at least two tertiary blocks, it indicates that the blocks in the block chain network are filtered for multiple times, and each time the supervised filtering rule is updated, the blocks in the block chain network are correspondingly detected and generate the tertiary blocks, the tertiary blocks generated each time are connected in sequence, and the data in the newly generated tertiary block, that is, the tail tertiary block, is free of sensitive data, so that the data query result is obtained from the tail tertiary block, and the result is safe and accurate. If the data is inquired, the inquired data is fed back to the user node; and if the data is not queried, feeding back the result of the query to the user node. With continued reference to fig. 2C, for example, the target block to be queried is B1, and the block B1 has two tertiary blocks B2 and B3, and the data query result is obtained from the tail tertiary block B3.
Optionally, if the tertiary block connected to the target block has a sensitive label, the data query result and the sensitive label are fed back to the user node together.
According to the technical scheme, when data query is carried out in the block chain network, whether a target block to be queried has a tertiary block or not is judged, then a data query result is obtained from the tertiary block, and data query service is provided for a user through the tertiary block, so that data filtering is not needed in the data query process, sensitive data propagation can be avoided, and the data query efficiency can be improved.
Example four
Fig. 4 is a schematic structural diagram of a data processing apparatus based on a block chain according to a fourth embodiment of the present disclosure, which is applicable to a data processing situation, and is particularly applicable to a data processing situation based on a block chain to solve the problems of insecurity of data and low query efficiency in a block chain network in the prior art. The apparatus can be implemented in hardware and/or software, and can be integrated into an electronic device that carries a data processing function based on a blockchain, such as a server device.
The block chain based data processing apparatus as shown in fig. 4 comprises a sensitive data detection module 410 and a tertiary block generation module 420, wherein,
a sensitive data detection module 410, configured to detect whether each block of the block chain has sensitive data based on the supervision filtering rule;
a tertiary block generating module 420, configured to determine, if there is sensitive data in any block, other data in the block except the sensitive data, and generate a tertiary block of the block according to the other data.
According to the technical scheme, whether sensitive data exist in each block of the block chain is detected based on the supervision filtering rule, if the sensitive data exist in any block, other data except the sensitive data in the block are determined, the tertiary block of the block is generated according to the other data, and the filtered data are stored through the tertiary block, so that the data in the block chain network are safer.
Furthermore, the device also comprises a detection operation triggering module which is used for detecting the operation of the,
and when the monitoring filtering rule is detected to be updated, triggering to execute the detection operation on the sensitive data in the block.
Further, the tertiary block generation module 420 is specifically configured to,
if the block has no tertiary block, adding the hash of the block in the generated tertiary block to connect the generated tertiary block with the block;
if the block has other tertiary blocks, adding the hash of the tail tertiary block in the other tertiary blocks in the generated tertiary block to connect the generated tertiary block with the tail tertiary block.
Further, the tertiary block generation module 420 includes a sensitive label generation unit and a tertiary block generation unit, wherein,
the sensitive mark generating unit is used for generating a sensitive mark for the sensitive data of the block;
and the tertiary block generating unit is used for generating a tertiary block of the block according to other data and the sensitive mark.
Further, the device also comprises a target block determining module and a query result acquiring module, wherein,
the target block determining module is used for responding to a data query transaction request acquired from a user node and determining a target block to be queried;
and the query result acquisition module is used for acquiring a data query result from the tertiary primary block and feeding the data query result back to the user node if the target block is connected with the tertiary primary block.
Further, the query result obtaining module is specifically configured to,
and if the target block chain is connected with at least two tertiary blocks, acquiring a data query result from the tail tertiary block, and feeding the data query result back to the user node.
The data processing device based on the block chain provided in the above embodiments may execute the data processing method based on the block chain provided in any embodiment of the present application, and has corresponding functional modules and beneficial effects for executing the method.
EXAMPLE five
Fig. 5 is a schematic structural diagram of an electronic device provided in the fifth embodiment of the present application, and fig. 5 shows a block diagram of an exemplary device suitable for implementing the embodiments of the present application. The device shown in fig. 5 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present application.
As shown in FIG. 5, device 12 is in the form of a general purpose computing device. The components of device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally perform the functions and/or methodologies of the embodiments described herein.
Device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with device 12, and/or with any devices (e.g., network card, modem, etc.) that enable device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, to implement the block chain-based data processing method provided in the embodiment of the present application.
EXAMPLE six
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program (or referred to as computer-executable instructions) is stored, where the computer program is used for executing the method for processing data based on a blockchain provided in the embodiment of the present application when executed by a processor, and the method includes:
detecting whether each block of the block chain has sensitive data or not based on a supervision filtering rule;
if the sensitive data exist in any block, determining other data except the sensitive data in the block, and generating a tertiary block of the block according to the other data.
The computer storage media of the embodiments of the present application may take any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for embodiments of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the embodiments of the present application have been described in more detail through the above embodiments, the embodiments of the present application are not limited to the above embodiments, and many other equivalent embodiments may be included without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.

Claims (10)

1. The data processing method based on the block chain is characterized by comprising the following steps:
detecting whether each block of the block chain has sensitive data or not based on a supervision filtering rule;
and if the sensitive data exist in any block, determining other data except the sensitive data in the block, and generating a tertiary block of the block according to the other data.
2. The method of claim 1, further comprising:
and when the monitoring filtering rule is detected to be updated, triggering to execute the detection operation on the sensitive data in the block.
3. The method of claim 1, wherein generating the tertiary block of the block from the other data comprises:
if the block has no tertiary block, adding the hash of the block in the generated tertiary block to connect the generated tertiary block with the block;
if the block has other tertiary blocks, adding the hash of the tail tertiary block in the other tertiary blocks in the generated tertiary block to connect the generated tertiary block with the tail tertiary block.
4. The method of claim 1, wherein generating a tertiary block of the block based on the other data comprises:
generating a sensitive mark for the sensitive data of the block;
and generating a tertiary block of the block according to the other data and the sensitive mark.
5. The method according to any one of claims 1-4, further comprising:
responding to a data query transaction request acquired from a user node, and determining a target block to be queried;
and if the target block is connected with a tertiary block, acquiring a data query result from the tertiary block, and feeding back the data query result to the user node.
6. The method of claim 5, wherein if the target block is connected with a tertiary block, obtaining a data query result from the tertiary block and feeding the data query result back to the user node comprises:
and if the target block chain is connected with at least two tertiary blocks, acquiring a data query result from the tail tertiary block, and feeding the data query result back to the user node.
7. A block chain-based data processing apparatus, comprising:
the sensitive data detection module is used for detecting whether each block of the block chain has sensitive data or not based on the supervision filtering rule;
and the tertiary block generation module is used for determining other data except the sensitive data in any block if the sensitive data exists in the block, and generating the tertiary block of the block according to the other data.
8. The apparatus of claim 7, further comprising:
the target block determining module is used for responding to a data query transaction request acquired from a user node and determining a target block to be queried;
and the query result acquisition module is used for acquiring a data query result from the tertiary block and feeding the data query result back to the user node if the target block is connected with the tertiary block.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the blockchain-based data processing method of any one of claims 1-6.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a method for blockchain-based data processing according to any one of claims 1 to 6.
CN202011410831.8A 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium Active CN112583805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011410831.8A CN112583805B (en) 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011410831.8A CN112583805B (en) 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112583805A true CN112583805A (en) 2021-03-30
CN112583805B CN112583805B (en) 2023-08-15

Family

ID=75127349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011410831.8A Active CN112583805B (en) 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112583805B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672989A (en) * 2021-07-30 2021-11-19 广东浪潮智慧计算技术有限公司 Block chain key information detection method, system, device and readable storage medium
WO2024000988A1 (en) * 2022-06-30 2024-01-04 浪潮电子信息产业股份有限公司 Blockchain monitoring method and apparatus, device, and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
US20190320037A1 (en) * 2018-04-17 2019-10-17 Paypal, Inc. Content linking and aggregation
CN110851536A (en) * 2019-11-19 2020-02-28 南昌航空大学 Block chain construction method with master and slave blocks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190320037A1 (en) * 2018-04-17 2019-10-17 Paypal, Inc. Content linking and aggregation
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
CN110851536A (en) * 2019-11-19 2020-02-28 南昌航空大学 Block chain construction method with master and slave blocks

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672989A (en) * 2021-07-30 2021-11-19 广东浪潮智慧计算技术有限公司 Block chain key information detection method, system, device and readable storage medium
WO2024000988A1 (en) * 2022-06-30 2024-01-04 浪潮电子信息产业股份有限公司 Blockchain monitoring method and apparatus, device, and storage medium

Also Published As

Publication number Publication date
CN112583805B (en) 2023-08-15

Similar Documents

Publication Publication Date Title
CN107577427B (en) data migration method, device and storage medium for blockchain system
CN110414268B (en) Access control method, device, equipment and storage medium
CN111694840B (en) Data synchronization method, device, server and storage medium
JP2023126499A (en) Computer-implemented system and method for combining block-chain technology with digital twins
US20180165476A1 (en) Interlocked blockchains to increase blockchain security
US11392461B2 (en) Method and apparatus for processing information
US8584123B2 (en) Linking transactions
US20190372804A1 (en) Method and apparatus for operating smart network interface card
EP3742321A1 (en) Storage of measurement datasets and distributed databases
US20160048703A1 (en) Securing integrity and consistency of a cloud storage service with efficient client operations
CN111291339A (en) Processing method, device and equipment of block chain data and storage medium
CN112583805B (en) Block chain-based data processing method and device, electronic equipment and storage medium
CN110543516A (en) Intelligent contract processing method and device, computer equipment and storage medium
CN110659256A (en) Multi-computer room synchronization method, computing device and computer storage medium
KR20210008486A (en) Secure dataset management
CN111835808B (en) Data storage method and device, data reading method and device, and storage medium
CN111881209A (en) Data synchronization method and device for heterogeneous database, electronic equipment and medium
WO2022001944A1 (en) Method for modifying linux kernel, and terminal device and storage medium
US20140137083A1 (en) Instrumenting computer program code by merging template and target code methods
US9117013B2 (en) Combining monitoring techniques
CN112416981A (en) Data processing method and device based on block chain, electronic equipment and storage medium
CN111857883B (en) Page data checking method and device, electronic equipment and storage medium
US10157117B2 (en) Processing transaction timestamps
CN114205156A (en) Message detection method and device for tangent plane technology, electronic equipment and medium
CN108052842A (en) Storage, verification method and the device of signed data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220121

Address after: Room 231, block C, No. 28, Xinjiekou Wai Street, Xicheng District, Beijing 100032

Applicant after: UNION MOBILE PAY Co.,Ltd.

Address before: 100088 510, block B, 28 xinjiekouwai street, Xicheng District, Beijing

Applicant before: Joint digital technology (Beijing) Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant