CN112583805B - Block chain-based data processing method and device, electronic equipment and storage medium - Google Patents

Block chain-based data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112583805B
CN112583805B CN202011410831.8A CN202011410831A CN112583805B CN 112583805 B CN112583805 B CN 112583805B CN 202011410831 A CN202011410831 A CN 202011410831A CN 112583805 B CN112583805 B CN 112583805B
Authority
CN
China
Prior art keywords
block
data
tertiary primary
sensitive
tertiary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011410831.8A
Other languages
Chinese (zh)
Other versions
CN112583805A (en
Inventor
王宇
陈正
刘胜
王杰
杨士弘
张生辉
黄朝阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Union Mobile Pay Co Ltd
Original Assignee
Union Mobile Pay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Union Mobile Pay Co Ltd filed Critical Union Mobile Pay Co Ltd
Priority to CN202011410831.8A priority Critical patent/CN112583805B/en
Publication of CN112583805A publication Critical patent/CN112583805A/en
Application granted granted Critical
Publication of CN112583805B publication Critical patent/CN112583805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the application discloses a data processing method and device based on a blockchain, electronic equipment and a storage medium. The method comprises the following steps: detecting whether sensitive data exists in each block of a block chain based on a supervision filtering rule; if the sensitive data exists in any block, other data except the sensitive data in the block are determined, and a tertiary primary block of the block is generated according to the other data, so that the data in the block chain network is safer.

Description

Block chain-based data processing method and device, electronic equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of blockchains, in particular to a data processing method, device, electronic equipment and storage medium based on blockchains.
Background
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is a chain data storage structure formed by combining data blocks in a sequential connection mode according to a time sequence, and has the characteristics of non-falsification, decentralization, openness and the like of information. Because of the non-tamperable nature of the blockchain, if someone propagates illegal content via the blockchain, it can present a significant challenge to blockchain supervision.
In the prior art, the illegal data is filtered through a browser outside the blockchain, and the architecture of the blockchain system is limited due to too much dependence on an external device, so that the data can be filtered only by accessing the blockchain browser, and the blockchain data filtering process is more complicated and cumbersome. Or the data is filtered through a filtering rule table arranged outside the block chain, the block chain data and the corresponding chain identification are sent to the content security module, and the data is filtered through the filtering rule table in the content security module, so that the filtering rule table which is too dependent on an external data source needs to be dynamically updated, and when the block chain multi-node cross-regional deployment is carried out, the additional overhead of block chain data synchronization is increased, so that the block chain system is complex to maintain and the data query efficiency is low.
Disclosure of Invention
The embodiment of the application provides a data processing method based on a block chain, which is used for improving the data query efficiency.
In a first aspect, an embodiment of the present application provides a data processing method based on a blockchain, including:
detecting whether sensitive data exists in each block of a block chain based on a supervision filtering rule;
if the sensitive data exists in any block, other data except the sensitive data in the block are determined, and a tertiary primary block of the block is generated according to the other data.
In a second aspect, an embodiment of the present application provides a blockchain-based data processing apparatus, including:
the sensitive data detection module is used for detecting whether each block of the block chain has sensitive data or not based on the supervision filtering rule;
and the tertiary primary block generation module is used for determining other data except the sensitive data in any block if the sensitive data exist in the block, and generating the tertiary primary block of the block according to the other data.
In a third aspect, an embodiment of the present application provides an electronic device, including:
one or more processors;
a memory for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement a blockchain-based data processing method according to any of the embodiments of the present application.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which when executed by a processor implements a blockchain-based data processing method according to any of the embodiments of the present application.
According to the technical scheme, whether the block in the block chain has sensitive data or not is detected, the sensitive data in the block are filtered to obtain other data of the block, and a tertiary primary block of the block is generated according to the other data. The block chain network enables the data in the block chain network to be safer through the legal data filtered in the tertiary primary block storage block.
Drawings
FIG. 1 is a flowchart of a data processing method based on a blockchain according to an embodiment of the present application;
FIG. 2A is a flowchart of a data processing method based on a blockchain according to a second embodiment of the present application;
fig. 2B is a schematic structural diagram of a block connection according to a second embodiment of the present application;
fig. 2C is a schematic structural diagram of a block connection according to a second embodiment of the present application;
FIG. 3 is a flowchart of a data processing method based on a blockchain according to a third embodiment of the present application;
FIG. 4 is a schematic diagram of a block chain based data processing apparatus according to a fourth embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the embodiments of the application and are not limiting of the application. It should be further noted that, for convenience of description, only some, but not all of the structures related to the embodiments of the present application are shown in the drawings.
Example 1
Fig. 1 is a flowchart of a data processing method based on a blockchain according to an embodiment of the present application, where the embodiment is applicable to a data processing situation, and is particularly applicable to a blockchain-based data processing situation, so as to solve the problems of unsafe data, low query efficiency, and the like in a blockchain network in the prior art. The method may be performed by a blockchain-based data processing apparatus provided by an embodiment of the present application, where the apparatus may be implemented in hardware and/or software, and may be integrated into an electronic device, such as a server device, that carries blockchain-based data processing functions. Referring to fig. 1, the method may specifically include:
s110, detecting whether sensitive data exist in each block of the block chain based on the supervision filtering rule.
In this embodiment, the supervision and filtering rule refers to a rule for filtering out non-compliant data in the blockchain network, and may be generated and updated by a supervision node in any data format, where the supervision node refers to a node that performs supervision and maintenance on the blockchain network; blocks are constituent units of a block chain for storing data, each block being generated on the basis of previous block data; sensitive data refers to data in a blockchain network that is not compliant, and typically affects the security of the blockchain network.
In this embodiment, a protocol is built at a contract layer of the blockchain network, and the protocol is used for detecting each block in the blockchain based on the supervision and filtration rule in the blockchain network, which is called a rule engine, and further a program carrying the function of the rule engine is called a rule engine module. For blockchain networks with smart contracts, a rule engine module is integrated into the smart contract engine, and then through the smart contract engine, whether sensitive data exists in each block of the blockchain is detected based on supervision filtering rules. Wherein the smart contract is a computer protocol that is intended to propagate, verify, or execute contracts in an informative manner, existing at the contract level in the blockchain network. Smart contracts allow data logging without third parties, which log data is traceable and irreversible. An intelligent contract engine refers to a program code that implements intelligent contracts in a blockchain.
Further, for blockchain networks without intelligent contracts, the blockchain can be detected for the presence of sensitive data by a rules engine interface service, that is, integrating the rules engine as part of the logic of the interface service into the interface service based on regulatory filtering rules. The interface service refers to a communication rule between different functional layers of the same computer, and in this embodiment refers to a communication rule between different functional layers in the blockchain network.
And S120, if the sensitive data exists in any block, determining other data except the sensitive data in the block, and generating a tertiary primary block of the block according to the other data.
In this embodiment, in the blockchain network, since the speed of the ethernet-generated blocks is faster than that of the bitcoin-generated blocks, there are blocks that are compliant but not added to the main blockchain, and are called tertiary blocks. Where the master blockchain refers to a blockchain used to record user traffic data. The Ethernet is an open-source blockchain public platform capable of freely developing intelligent contracts.
In this embodiment, if sensitive data exists in any block, the sensitive data is filtered based on the supervision and filtration rule, other data except the sensitive data in the block are determined, and further hash calculation is performed on the other data, so as to generate a new block, that is, a tertiary primary block of the block.
Further, if no sensitive data is detected in any block, no tertiary primary block of that block needs to be generated.
According to the technical scheme, whether each block of the block chain has sensitive data or not is detected based on the supervision filtering rule, if the sensitive data exists in any block, other data except the sensitive data in the block are determined, a tertiary primary block of the block is generated according to the other data, and the filtered data is stored through the tertiary primary block, so that the data in the block chain network is safer.
On the basis of the embodiment, in order to keep the data security in the blockchain network in real time, as an alternative way of the embodiment of the application, when the update of the supervision filtering rule is detected, the detection operation of the sensitive data in the block is triggered to be executed.
In this embodiment, the update of the supervision filtering rule is performed by the supervision node in the blockchain system, and when the supervision concern rule needs to be updated, the supervision node initiates a supervision filtering rule update transaction request to other nodes in the blockchain network, where the supervision filtering rule update transaction request refers to that when the filtering rule needs to be updated, the filtering rule to be updated, the public key of the supervision node, signature data and the like may be included. The signature data is obtained by signing the message data by using a private key of the supervision node after the supervision node performs hash calculation on the message data to generate a data digest.
Further, the other nodes in the blockchain network respond to the rule update transaction request acquired from the supervision node to verify the identity of the supervision node, which may specifically be: other nodes in the blockchain network acquire public keys of the supervision nodes from the update transaction request to perform signature decoding on the signature data to obtain a signed data abstract, and whether the signed data abstract is consistent with the data abstract before signature or not is compared, if so, the identity verification of the supervision nodes is passed; if the identity verification of the supervision nodes is inconsistent, the identity verification of the supervision nodes is not passed. Further, in the event that the identity verification passes, the supervision filter rule is written into the blockchain, and the supervision filter rule is synchronized to other nodes in the blockchain network based on the consensus mechanism verification. The consensus mechanism is an algorithm that each node in the blockchain network performs consensus on the sequence of the transactions in the blockchain within a certain period of time, and may be, for example, proof of Work (PoW), proof of equity (PoS), proxy rights certification (Delegated Proof of Stake, DPoS), practical bayer fault tolerance (Practical Byzantine Fault Tolerance, PBFT), and the like.
And when other nodes in the blockchain network synchronize the supervision and filtration rule, namely the supervision and filtration rule is detected to be updated, detecting the sensitive data in the block.
It can be understood that the sensitive data in the block is detected whenever the supervision filtering rule is updated, so that the real-time safety of the data in the block chain network is ensured, and the safety and reliability of the data queried by the user are further ensured.
Example two
FIG. 2A is a flowchart of a data processing method based on a blockchain according to a second embodiment of the present application; on the basis of the above embodiment, "if sensitive data exists in any block, determining other data except the sensitive data in the block, and generating a tertiary primary block of the block according to the other data" is optimized, so as to perfect the generation mechanism of the tertiary primary block.
Referring to the method shown in fig. 2A, the method may specifically include:
s210, detecting whether sensitive data exists in each block of the block chain based on the supervision filtering rule.
And S220, if the sensitive data exists in any block, determining other data except the sensitive data in the block, and generating a tertiary primary block of the block according to the other data.
In this embodiment, if sensitive data exists in any block, other data except the sensitive data in the block is determined, and a tertiary primary block of the block is generated according to the other data. For a tertiary primary block that generates this block from other data, it may be: if the block does not have a tertiary primary block, then a hash of the block is added to the generated tertiary primary block to join the generated tertiary primary block with the block.
Specifically, the rule engine module in the blockchain network may determine whether the block has a tertiary primary block, and if the block has no tertiary primary block, add the hash of the block to the generated tertiary primary block to connect the generated tertiary primary block with the block. For example, referring to fig. 2B, a1, B1, C1 are any block in the blockchain network, if the presence of sensitive data in the B1 block is detected, other data except the sensitive data in the B1 block is determined, a tertiary primary block B2 of the B1 block is generated according to the other data, and a hash of the block B1 is added to the generated tertiary primary block B2 to connect the generated tertiary primary block B2 and the block B1.
Further, for the tertiary primary block that generates the block from other data, it may also be: if the block has other tertiary primary blocks, adding the hash of the tail tertiary primary block in the other tertiary primary blocks to the generated tertiary primary block so as to connect the generated tertiary primary block with the tail tertiary primary block.
Specifically, the rule engine module in the blockchain network may determine whether the block has a tertiary primary block, and if the block has a tertiary primary block, adding a hash of a tail tertiary primary block in other tertiary primary blocks to the generated tertiary primary block, so as to connect the generated tertiary primary block with the tail tertiary primary block. For example, referring to fig. 2C, a1, B1, and C1 are any block in a blockchain network, a tertiary primary block B2 is connected to the block B1, and is a tail tertiary primary block for distinguishing the block B1, if sensitive data is detected in the block B1, other data except the sensitive data in the block B1 is determined, a tertiary primary block B3 of the block B1 is generated according to the other data, and a hash of the tail tertiary primary block B2 is added to the generated tertiary primary block B3, so as to connect the generated tertiary primary block B3 and the tail tertiary primary block B2.
Optionally, the tertiary primary block of the block is generated according to other data, and may also be: generating a sensitive mark for sensitive data of the block; based on the other data and the sensitive label, a tertiary primary block of the block is generated.
In this embodiment, the sensitive flag is a flag for indicating whether the block has sensitive data, which may be a flag with or without sensitive data, and is exemplified by a flag of 1 if there is sensitive data and a flag of 0 if there is no sensitive data; the service transaction number in the block, namely an ID number; but also the version number of the block; etc.
In this embodiment, the rule engine module in the blockchain network generates a sensitive tag for the sensitive data of the block, and performs encryption calculation on other data and the sensitive tag to generate a tertiary primary block of the block. The encryption may be performed by a hash algorithm. If the block does not have a tertiary primary block, then a hash of the block is added to the generated tertiary primary block to join the generated tertiary primary block with the block. If the block has other tertiary primary blocks, adding the hash of the tail tertiary primary block in the other tertiary primary blocks to the generated tertiary primary block so as to connect the generated tertiary primary block with the tail tertiary primary block.
According to the technical scheme, if sensitive data exist in any block, a tertiary primary block of the block is generated under different conditions, namely under the condition that any block in a block chain network has the tertiary primary block and under the condition that any block in the block chain network does not have the tertiary primary block; furthermore, a sensitive mark is generated for the sensitive data, and then a tertiary primary block of the block is generated, so that the chain structure in the block chain system is not influenced, only the filtered data is recorded, the incremental data in the block chain network is less, and the burden of nodes in the block chain network is reduced.
Example III
FIG. 3 is a flowchart of a data processing method based on a blockchain according to a third embodiment of the present application; based on the above embodiment, the operation of data query in the blockchain network with tertiary primary blocks is further added.
Referring to the method of fig. 3, the method may specifically include:
s310, responding to a data query transaction request acquired from a user node, and determining a target block to be queried.
Wherein the user node is a common user in the blockchain network; the data query transaction request refers to a request for data query transaction initiated by a user node to a blockchain network, and can comprise a transaction ID; the target block is a block where the data to be queried by the user node is located.
In this embodiment, a user node initiates a data query transaction request to a blockchain network; other nodes in the blockchain network respond to the data query transaction request acquired from the user node, and determine a target block to be queried according to the data query transaction request. For example, other nodes in the blockchain network may determine the target block to query based on the transaction ID in the data query transaction request.
Further, whether the target block is connected with the tertiary primary block is determined, if not, a data query structure is obtained from the target block, and a data query result is fed back to the user node.
And S320, if the target block is connected with the tertiary primary block, acquiring a data query result from the tertiary primary block, and feeding back the data query result to the user node.
In this embodiment, if the target block is connected with the tertiary primary block, it is indicated that there is sensitive data in the target block, and data query is performed without the target block, a data query result is obtained from the tertiary primary block of the target block, if the data query result is fed back to the user node, and if the data is queried, the queried data is fed back to the user node; if no data is queried, feeding back the result without query to the user node. With continued reference to fig. 2B, for example, the target block to be queried is B1, and the block B1 has a tertiary primary block B2, and the data query result is obtained from the tertiary primary block B2.
Further, if the target block chain is connected with at least two tertiary primary blocks, a data query result is obtained from the tail tertiary primary block, and the data query result is fed back to the user node.
In this embodiment, if the target block is connected with at least two tertiary primary blocks, it is indicated that the blocks in the blockchain network are filtered for multiple times, each time the regulatory filtering rule is updated, the blocks in the blockchain network are detected correspondingly, tertiary primary blocks are generated, each generated tertiary primary block is connected in turn, and the data in the latest generated tertiary primary block, that is, the tail tertiary primary block, is not sensitive data, so that a data query result is obtained from the tail tertiary primary block, and the result is safe and accurate. If the data is queried, the queried data is fed back to the user node; if no data is queried, feeding back the result without query to the user node. With continued reference to fig. 2C, for example, the target block to be queried is B1, where the block B1 has two tertiary primary blocks B2 and B3, and the data query result is obtained from the tail tertiary primary block B3.
Optionally, if the target block is connected to the tertiary primary block, a sensitive label is included in the tertiary primary block, and the data query result and the sensitive label are fed back to the user node together.
According to the technical scheme, when data query is carried out in the blockchain network, whether the target block to be queried has the tertiary primary block is judged, and then the data query result is obtained from the tertiary primary block, and the data query service is provided for the user through the tertiary primary block, so that data filtering is not needed in the data query process, sensitive data transmission can be avoided, and the data query efficiency can be improved.
Example IV
Fig. 4 is a schematic structural diagram of a data processing device based on a blockchain according to a fourth embodiment of the present application, where the present embodiment is applicable to a data processing situation, and is particularly applicable to a blockchain-based data processing situation to solve the problems of unsafe data and low query efficiency in a blockchain network in the prior art. The apparatus may be implemented in hardware and/or software and may be integrated into an electronic device, such as a server device, etc., that carries blockchain-based data processing functions.
The blockchain-based data processing device as shown in fig. 4, includes a sensitive data detection module 410 and a tertiary-primary block generation module 420, wherein,
a sensitive data detection module 410, configured to detect whether sensitive data exists in each block of the blockchain based on a supervision filtering rule;
the tertiary primary block generating module 420 is configured to determine other data except for the sensitive data in any block if the sensitive data exists in the block, and generate the tertiary primary block of the block according to the other data.
According to the technical scheme, whether each block of the block chain has sensitive data or not is detected based on the supervision filtering rule, if the sensitive data exists in any block, other data except the sensitive data in the block are determined, a tertiary primary block of the block is generated according to the other data, and the filtered data is stored through the tertiary primary block, so that the data in the block chain network is safer.
Further, the device also comprises a detection operation triggering module, which is used for detecting the operation triggering module,
and triggering to execute the detection operation of the sensitive data in the block when the update of the supervision filtering rule is detected.
Further, the tertiary-primary-block generation module 420 is specifically configured to,
if the block does not have a tertiary primary block, adding a hash of the block to the generated tertiary primary block to connect the generated tertiary primary block with the block;
if the block has other tertiary primary blocks, adding the hash of the tail tertiary primary block in the other tertiary primary blocks to the generated tertiary primary block so as to connect the generated tertiary primary block with the tail tertiary primary block.
Further, the tertiary primary block generation module 420 includes a sensitivity label generation unit and a tertiary primary block generation unit, wherein,
the sensitive mark generation unit is used for generating a sensitive mark for sensitive data of the block;
and the tertiary primary block generating unit is used for generating the tertiary primary block of the block according to other data and the sensitive marks.
Further, the device also comprises a target block determining module and a query result obtaining module, wherein,
the target block determining module is used for determining a target block to be queried in response to a data query transaction request acquired from a user node;
and the query result acquisition module is used for acquiring a data query result from the tertiary primary block if the target block is connected with the tertiary primary block, and feeding back the data query result to the user node.
Further, the query result acquisition module is specifically configured to,
if the target block chain is connected with at least two tertiary primary blocks, acquiring a data query result from the tail tertiary primary blocks, and feeding back the data query result to the user node.
The data processing device based on the block chain provided in the above embodiment can execute the data processing method based on the block chain provided in any embodiment of the present application, and has the corresponding functional modules and beneficial effects of executing the method.
Example five
Fig. 5 is a schematic structural diagram of an electronic device provided in a fifth embodiment of the present application, and fig. 5 shows a block diagram of an exemplary device suitable for implementing an embodiment of the present application. The device shown in fig. 5 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the application.
As shown in fig. 5, device 12 is in the form of a general purpose computing device. Components of device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, a bus 18 that connects the various system components, including the system memory 28 and the processing units 16.
Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, micro channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Device 12 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 30 and/or cache memory 32. Device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, commonly referred to as a "hard disk drive"). Although not shown in fig. 5, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be coupled to bus 18 through one or more data medium interfaces. The system memory 28 may include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the application.
A program/utility 40 having a set (at least one) of program modules 42 may be stored in, for example, system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 42 generally perform the functions and/or methods of the embodiments described herein.
Device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), one or more devices that enable a user to interact with device 12, and/or any devices (e.g., network card, modem, etc.) that enable device 12 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 22. Also, device 12 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet, via network adapter 20. As shown, network adapter 20 communicates with other modules of device 12 over bus 18. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with device 12, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
The processing unit 16 executes various functional applications and data processing by running programs stored in the system memory 28, such as implementing the blockchain-based data processing method provided by embodiments of the present application.
Example six
The sixth embodiment of the present application further provides a computer readable storage medium having stored thereon a computer program (or referred to as computer executable instructions), which when executed by a processor, is configured to perform the blockchain-based data processing method provided by the embodiment of the present application, including:
detecting whether sensitive data exists in each block of a block chain based on a supervision filtering rule;
if the sensitive data exists in any block, other data except the sensitive data in the block are determined, and a tertiary primary block of the block is generated according to the other data.
The computer storage media of embodiments of the application may take the form of any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for embodiments of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the embodiments of the present application have been described in connection with the above embodiments, the embodiments of the present application are not limited to the above embodiments, but may include many other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.

Claims (9)

1. A method of blockchain-based data processing, comprising:
detecting whether sensitive data exists in each block of a block chain based on a supervision filtering rule;
if the sensitive data exists in any block, determining other data except the sensitive data in the block, and generating a tertiary primary block of the block according to the other data;
wherein the generating the tertiary primary block of the block from the other data comprises:
generating a sensitive mark for sensitive data of the block;
generating a tertiary primary block of the block according to the other data and the sensitive marks;
the supervision filtering rules are generated and updated by a supervision node and are used for filtering out non-compliant data in the blockchain block, and the sensitive marks are used for representing whether sensitive data exist in the block.
2. The method according to claim 1, wherein the method further comprises:
and triggering to execute the detection operation of the sensitive data in the block when the update of the supervision filtering rule is detected.
3. The method of claim 1, wherein generating the tertiary primary block of the block from the other data comprises:
if the block does not have a tertiary primary block, adding a hash of the block to the generated tertiary primary block to connect the generated tertiary primary block with the block;
if the block has other tertiary primary blocks, adding the hash of the tail tertiary primary block in the other tertiary primary blocks to the generated tertiary primary block so as to connect the generated tertiary primary block with the tail tertiary primary block.
4. A method according to any one of claims 1-3, further comprising:
determining a target block to be queried in response to a data query transaction request acquired from a user node;
if the target block is connected with a tertiary primary block, a data query result is obtained from the tertiary primary block, and the data query result is fed back to the user node.
5. The method of claim 4, wherein if the target block is connected to a tertiary primary block, obtaining a data query result from the tertiary primary block, and feeding back the data query result to the user node, comprising:
and if the target block chain is connected with at least two tertiary primary blocks, acquiring a data query result from the tail tertiary primary block, and feeding back the data query result to the user node.
6. A blockchain-based data processing device, comprising:
the sensitive data detection module is used for detecting whether each block of the block chain has sensitive data or not based on the supervision filtering rule;
the tertiary primary block generation module is used for determining other data except the sensitive data in any block if the sensitive data exist in the block, and generating the tertiary primary block of the block according to the other data;
wherein, tertiary primary block generation module still includes:
the sensitive mark generation unit is used for generating a sensitive mark for sensitive data of the block;
the tertiary primary block generation unit is used for generating a tertiary primary block of the block according to other data and the sensitive mark;
the supervision filtering rules are generated and updated by a supervision node and are used for filtering out non-compliant data in the blockchain block, and the sensitive marks are used for representing whether sensitive data exist in the block.
7. The apparatus of claim 6, wherein the apparatus further comprises:
the target block determining module is used for determining a target block to be queried in response to a data query transaction request acquired from a user node;
and the query result acquisition module is used for acquiring a data query result from the tertiary primary block if the target block is connected with the tertiary primary block, and feeding back the data query result to the user node.
8. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the blockchain-based data processing method of any of claims 1-5.
9. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements a blockchain based data processing method as claimed in any of claims 1-5.
CN202011410831.8A 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium Active CN112583805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011410831.8A CN112583805B (en) 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011410831.8A CN112583805B (en) 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112583805A CN112583805A (en) 2021-03-30
CN112583805B true CN112583805B (en) 2023-08-15

Family

ID=75127349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011410831.8A Active CN112583805B (en) 2020-12-03 2020-12-03 Block chain-based data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112583805B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672989A (en) * 2021-07-30 2021-11-19 广东浪潮智慧计算技术有限公司 Block chain key information detection method, system, device and readable storage medium
CN114826790B (en) * 2022-06-30 2022-11-15 浪潮电子信息产业股份有限公司 Block chain monitoring method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
CN110851536A (en) * 2019-11-19 2020-02-28 南昌航空大学 Block chain construction method with master and slave blocks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190320037A1 (en) * 2018-04-17 2019-10-17 Paypal, Inc. Content linking and aggregation

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222052A (en) * 2019-05-20 2019-09-10 重庆金融资产交易所有限责任公司 Block chain data processing method, device, computer equipment and storage medium
CN110851536A (en) * 2019-11-19 2020-02-28 南昌航空大学 Block chain construction method with master and slave blocks

Also Published As

Publication number Publication date
CN112583805A (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN110414268B (en) Access control method, device, equipment and storage medium
KR102575120B1 (en) Computer-implemented systems and methods for linking a blockchain to a set of digital twins
US10387684B2 (en) Interlocked blockchains to increase blockchain security
CN112583805B (en) Block chain-based data processing method and device, electronic equipment and storage medium
CN112560078B (en) Block chain data processing method, device, equipment and medium
CN111291339B (en) Method, device, equipment and storage medium for processing blockchain data
EP3742321A1 (en) Storage of measurement datasets and distributed databases
CN112134956A (en) Distributed Internet of things instruction management method and system based on block chain
US20110296177A1 (en) Method and system for microlocking web content
CN110324416B (en) Download path tracking method, device, server, terminal and medium
CN109409882A (en) A kind of credit accreditation storage method and device based on block chain
CN111835808B (en) Data storage method and device, data reading method and device, and storage medium
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
US10719454B2 (en) Synchronizing requests to access computing resources
CN112416981A (en) Data processing method and device based on block chain, electronic equipment and storage medium
CN115130114A (en) Gateway safety starting method and device, electronic equipment and storage medium
US11295031B2 (en) Event log tamper resistance
CN114205156A (en) Message detection method and device for tangent plane technology, electronic equipment and medium
CN112016336A (en) Method, device, equipment and storage medium for detecting copy card
US11163909B2 (en) Using multiple signatures on a signed log
CN113627938B (en) Data deleting method, device and equipment of block chain and storage medium
CN111859313A (en) Verification method and device
CN113312510A (en) Monitoring data processing method and device, storage medium and electronic equipment
CN116975059A (en) Power plant data management method, system, equipment and storage medium
Ma et al. When Top-down Meets Bottom-up: Detecting and Exploiting Use-After-Cleanup Bugs in Linux Kernel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220121

Address after: Room 231, block C, No. 28, Xinjiekou Wai Street, Xicheng District, Beijing 100032

Applicant after: UNION MOBILE PAY Co.,Ltd.

Address before: 100088 510, block B, 28 xinjiekouwai street, Xicheng District, Beijing

Applicant before: Joint digital technology (Beijing) Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant