CN112632543B - Method, device and terminal for supervising block chain information content security event - Google Patents

Method, device and terminal for supervising block chain information content security event Download PDF

Info

Publication number
CN112632543B
CN112632543B CN202011604635.4A CN202011604635A CN112632543B CN 112632543 B CN112632543 B CN 112632543B CN 202011604635 A CN202011604635 A CN 202011604635A CN 112632543 B CN112632543 B CN 112632543B
Authority
CN
China
Prior art keywords
data
detection result
security detection
consensus
uplink
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011604635.4A
Other languages
Chinese (zh)
Other versions
CN112632543A (en
Inventor
张帅
匡立中
李伟
蔡亮
邵羽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Qulian Technology Co Ltd
Original Assignee
Hangzhou Qulian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Qulian Technology Co Ltd filed Critical Hangzhou Qulian Technology Co Ltd
Priority to CN202011604635.4A priority Critical patent/CN112632543B/en
Publication of CN112632543A publication Critical patent/CN112632543A/en
Application granted granted Critical
Publication of CN112632543B publication Critical patent/CN112632543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)

Abstract

The application is applicable to the technical field of block chains, and provides a block chain-based data uplink method, a device, a terminal and a storage medium, wherein the method comprises the following steps: acquiring a first consensus request including a security detection result of data to be uplinked, the first consensus request being triggered by any node in a blockchain platform; storing the security detection result to the local according to the first consensus request; acquiring a second consensus request which is triggered by a first node and contains target data to be uplink in a block chain platform; and according to the second consensus request, judging that the locally stored security detection result comprises a target security detection result corresponding to the target data to be uplink, and storing the target data to be uplink to the local when the target data to be uplink is determined to be the security data based on the target security detection result. This scheme can avoid repetition audit, promotes management and control and handles efficiency, and detects the link leading, promotes and handles ageing.

Description

Method, device and terminal for supervising block chain information content security event
Technical Field
The application belongs to the technical field of block chains, and particularly relates to a block chain-based data uplink method, a block chain-based data uplink device, a block chain-based data terminal and a storage medium.
Background
The block chain is used as novel distributed architecture software, a consensus mechanism is used for ensuring that data form copies with final consistency at a plurality of terminals, and the data of the block cannot be modified and deleted due to the block chain structure. This feature, in the face of information content security events, becomes a factor in increasing the difficulty of supervision.
The detection and control flow of the prior art on the block chain information content security event usually occurs in the data normal consensus process of the block chain, each node for carrying out data consensus needs to audit the consensus content, is in a very back position in a link, has the condition of repeated audit, has low control and treatment efficiency, is too back in a detection link, and has poor treatment timeliness.
Disclosure of Invention
The embodiment of the application provides a data uplink method, a device, a terminal and a storage medium based on a blockchain, which are used for solving the problems that in the prior art, the detection and control links of information content security events are positioned at a very back position, the condition of repeatability audit occurs, the control and treatment efficiency is low, and the treatment timeliness is poor.
A first aspect of an embodiment of the present application provides a data uplink method based on a blockchain, including:
acquiring a first consensus request triggered by any node in a blockchain platform, wherein the first consensus request comprises the following steps: a first security detection result of the first data to be uplink;
storing the first security detection result to the local according to the first consensus request, and sending consensus feedback information to a corresponding node;
Acquiring a second consensus request triggered by a first node in the blockchain platform, wherein the second consensus request comprises target data to be uplinked;
Judging whether the locally stored first security detection result contains a target security detection result corresponding to the target data to be uplink or not according to the second consensus request;
If the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be the security data based on the target security detection result, responding to the second consensus request, and storing the target data to be uplink to the local.
A second aspect of an embodiment of the present application provides a data uplink device based on a blockchain, including:
The pre-consensus module is configured to obtain a first consensus request triggered by any node in the blockchain platform, where the first consensus request includes: a first security detection result of the first data to be uplink; storing the first security detection result to the local according to the first consensus request, and sending consensus feedback information to a corresponding node;
the formal consensus module is used for acquiring a second consensus request triggered by the first node in the blockchain platform, wherein the second consensus request contains target data to be uplinked; judging whether a locally stored first security detection result contains a target security detection result corresponding to the target data to be uplink or not according to the second consensus request; if the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be the security data based on the target security detection result, responding to the second consensus request, and storing the target data to be uplink to the local.
A third aspect of an embodiment of the present application provides a terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to the first aspect when executing the computer program.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method according to the first aspect.
A fifth aspect of the application provides a computer program product for causing a terminal to carry out the steps of the method of the first aspect described above when the computer program product is run on the terminal.
In the embodiment of the application, the first consensus request including the security detection result of the data to be uplinked triggered by any node in the blockchain platform is obtained, the security detection result is stored to the local according to the first consensus request, the second consensus request including the target data to be uplinked triggered by the first node in the blockchain platform is obtained, whether the locally stored security detection result includes the target security detection result corresponding to the target data to be uplinked or not is judged according to the second consensus request, and if the security detection result includes the target security detection result, the target data to be uplinked is stored to the local in response to the second consensus request when the target data to be uplinked is determined to be the security data based on the target security detection result. The safety detection result of the data to be uplinked is subjected to pre-consensus so as to judge the safety of the data to be uplinked in the formal consensus process based on the pre-consensus result, the information content safety is detected and controlled in advance before the data to be uplinked is subjected to consensus propagation, and the unsafe information can be timely shielded by pre-consensus the safety detection result of the data to be uplinked at other clients, so that repeated auditing is avoided, the management and control treatment efficiency is improved, the detection link is preposed, and the treatment timeliness is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a block chain based data chaining method according to an embodiment of the present application;
FIG. 2 is a second flowchart of a block chain based data chaining method according to an embodiment of the present application;
FIG. 3 is a block chain unit according to an embodiment of the present application;
FIG. 4 is a block chain based data chaining device according to an embodiment of the present application;
fig. 5 is a block diagram of a terminal according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
In particular implementations, the terminals described in embodiments of the application include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having a touch-sensitive surface (e.g., a touch screen display and/or a touch pad). It should also be appreciated that in some embodiments, the device is not a portable communication device, but a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or a touch pad).
In the following discussion, a terminal including a display and a touch sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal supports various applications, such as one or more of the following: drawing applications, presentation applications, word processing applications, website creation applications, disk burning applications, spreadsheet applications, gaming applications, telephony applications, video conferencing applications, email applications, instant messaging applications, workout support applications, photo management applications, digital camera applications, digital video camera applications, web browsing applications, digital music player applications, and/or digital video player applications.
Various applications that may be executed on the terminal may use at least one common physical user interface device such as a touch sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal may be adjusted and/or changed between applications and/or within the corresponding applications. In this way, the common physical architecture (e.g., touch-sensitive surface) of the terminal may support various applications with user interfaces that are intuitive and transparent to the user.
It should be understood that, the sequence number of each step in this embodiment does not mean the execution sequence, and the execution sequence of each process should be determined by its function and internal logic, and should not limit the implementation process of the embodiment of the present application in any way.
In order to illustrate the technical scheme of the application, the following description is made by specific examples.
Referring to fig. 1, fig. 1 is a flowchart of a data uplink method based on a blockchain according to an embodiment of the present application. As shown in fig. 1, a data uplink method based on a blockchain includes the following steps:
Step 101, a first consensus request triggered by any node in a blockchain platform is obtained.
The first consensus request includes: and a first security detection result of the first data to be uplink.
The first consensus request is sent by any node in the blockchain platform. The first consensus request is used for pre-consensus a first security detection result corresponding to the first to-be-uplink data before consensus is performed on the first to-be-uplink data.
Step 102, according to the first consensus request, storing the first security detection result locally, and sending consensus feedback information to the corresponding node.
The first consensus request can enable all nodes in the block chain platform to acquire and store the pre-judging result of the data to be uplink through the data consensus, so that when one node finds out the data with problems, the node can carry out shielding processing on the data and share the data security detection result to other nodes, and the other block chain nodes can be ensured to directly shield the information based on the security detection result, and repeated auditing is avoided through information sharing.
And accumulating the first security detection results of the first to-be-uplink data sent by different nodes after local storage to obtain a plurality of first security detection results of the first to-be-uplink data.
In this step, the node currently acquiring the consensus request can locally establish the storage content of the security detection result of each to-be-uplink data based on the first security detection result of the first to-be-uplink data carried in the consensus request, and pre-store the security detection results of a plurality of to-be-uplink data locally is realized through the security detection result sent to any node in the blockchain platform, so that when the uplink consensus request of the corresponding to-be-uplink data is acquired subsequently, the security detection result can be directly utilized, the security of the current to-be-uplink data is directly judged based on the security detection result stored locally, and the repeated detection process of a plurality of nodes in the blockchain node on the same data is avoided.
After the first consensus request is processed and the first security detection result is locally stored or the consensus is refused, the result needs to be fed back, so that a trigger node of the consensus request judges whether the first security detection result of the first data to be uplink is successful in the block link point based on feedback information.
In the process, the safety detection link occurs before information transmission, so that whether the information content safety risk exists or not can be timely detected.
Step 103, obtaining a second consensus request triggered by the first node in the blockchain platform.
The second consensus request contains target data to be uplink.
The sending node of the second consensus request and the sending node of the first consensus request may be the same node or different nodes. The target data to be uplinked may be one of a plurality of first data to be uplinked or new data to be uplinked.
If the target to-be-uplink data is one of a plurality of first to-be-uplink data, specifically, the second consensus request is obtained under the condition that the second consensus request and the first security detection result are commonly realized in the blockchain platform. When the first data to be uplink is shared, each node in the block chain platform can realize the safety judgment of the first data to be uplink based on the shared first safety detection result.
Step 104, judging whether the locally stored first security detection result contains a target security detection result corresponding to the target data to be uplink according to the second consensus request.
The first security detection result is provided with an identification code of first uplink data to be corresponding to the first security detection result; the judging whether the target security detection result is included may specifically be: and matching the identification code of the target data to be uplink with the identification code of the first data to be uplink corresponding to a plurality of first security detection results stored locally, and taking one first security detection result of the first security detection results, which is matched with the identification code of the target data to be uplink, as the target security detection result.
The process realizes the utilization of the first security detection result stored locally, compares the security detection result stored locally with the to-be-uplink data requesting consensus in the current second consensus request, and judges whether a target security detection result corresponding to the to-be-uplink data exists or not to guide the direct judgment of the security of the to-be-uplink data.
Step 105, if the first security detection result includes the target security detection result, when determining that the target data to be uplink is the security data based on the target security detection result, responding to the second consensus request, and storing the target data to be uplink to the local.
The security detection result is specifically a security determination result that the security of the data to be uplink corresponding to the security detection result is pre-determined, for example, the security detection result is provided with security or not provided with security.
The process for determining whether the target data to be uplink is the safety data based on the target safety detection result specifically comprises the following steps: and reading the content of the target security detection result, judging the target data to be uplink as safe data when the read content is safe, and judging the target data to be uplink as unsafe data when the read content is unsafe.
In the process, the security detection result stored locally is used for directly judging the security of the data to be uplink corresponding to the security detection result, and when the current data to be uplink is determined to be the security data, the second consensus request is responded, so that the current data to be uplink is subjected to consensus, and the current data to be uplink is stored locally.
After judging whether the locally stored first security detection result contains the target security detection result corresponding to the target data to be uplink according to the second consensus request, the method further comprises:
and if the first security detection result does not contain the target security detection result, sending feedback information for rejecting consensus to the corresponding node.
If the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be unsafe data based on the target security detection result, feedback information for rejecting consensus is sent to the corresponding node.
In the process, the blockchain node enters a formal consensus link, in the consensus process, firstly, whether the node locally stores a detection result related to the data to be uplinked or not is checked, if not, the consensus is refused, if so, whether the risk exists is judged according to the detection result, if not, the consensus can be continued, and otherwise, the consensus is refused.
In the embodiment of the application, a first consensus request including a security detection result of data to be uplink triggered by any node in a blockchain platform is acquired, a security detection result is stored locally according to the first consensus request, a second consensus request including target data to be uplink triggered by the first node in the blockchain platform is acquired, whether the locally stored security detection result includes a target security detection result corresponding to the target data to be uplink or not is judged according to the second consensus request, and if the security detection result includes the target security detection result, the target data to be uplink is stored locally in response to the second consensus request when the target data to be uplink is determined to be the security data based on the target security detection result. The safety detection result of the data to be uplinked is subjected to pre-consensus so as to judge the safety of the data to be uplinked in the formal consensus process based on the pre-consensus result, the information content safety is detected and controlled in advance before the data to be uplinked is subjected to consensus propagation, and the unsafe information can be timely shielded by pre-consensus the safety detection result of the data to be uplinked at other clients, so that repeated auditing is avoided, the management and control treatment efficiency is improved, the detection link is preposed, and the treatment timeliness is improved.
Different implementations of the blockchain-based data uplink method are also provided in the embodiments of the present application.
Referring to fig. 2, fig. 2 is a flowchart second of a data uplink method based on a blockchain according to an embodiment of the present application. As shown in fig. 2, a blockchain-based data chaining method includes the steps of:
step 201, a first consensus request triggered by any node in a blockchain platform is obtained.
The first consensus request includes: and a first security detection result of the first data to be uplink.
The implementation process of this step is the same as that of step 101 in the foregoing embodiment, and will not be described here again.
Step 202, according to the first consensus request, storing the first security detection result locally, and sending consensus feedback information to the corresponding node.
The implementation process of this step is the same as that of step 102 in the foregoing embodiment, and will not be described here again.
Step 203, a second consensus request triggered by the first node in the blockchain platform is obtained.
The second consensus request contains target data to be uplink.
The implementation process of this step is the same as that of step 103 in the foregoing embodiment, and will not be described here again.
Step 204, according to the second consensus request, it is determined whether the locally stored first security detection result includes a target security detection result corresponding to the target data to be uplink.
The implementation process of this step is the same as that of step 104 in the foregoing embodiment, and will not be described here again.
Step 205, if the first security detection result includes the target security detection result, when determining that the target data to be uplink is the security data based on the target security detection result, responding to the second consensus request, and storing the target data to be uplink to the local.
The implementation procedure of this step is the same as that of step 105 in the foregoing embodiment, and will not be described here again.
In steps 201 to 205, the current node in the blockchain platform, which is the main execution body of the method in the embodiment of the application, realizes that the security detection result obtained by the consensus of other nodes in the blockchain platform is stored locally, and based on the security detection result stored locally, realizes the data processing process of directly judging the security of the data to be uplink obtained by the consensus of other nodes and avoiding repeated detection of the data security.
In the subsequent steps 206 to 208, the method corresponds to the steps that when the current node serving as the method execution subject in the embodiment of the present application obtains the data uplink request sent by the client, the security detection result of the data to be uplink carried in the data uplink request is identified to other nodes in the blockchain platform based on the data uplink request, and after the security detection result identification is completed, the data to be uplink is identified to other nodes, so as to implement data uplink, and avoid the processing procedure of repeated detection of data security.
Step 206, obtaining a data uplink request, wherein the data uplink request comprises second data to be uplink;
step 207, performing security detection on the second data to be uplink to obtain a second security detection result;
The second data to be uplink is specifically the data carried in the data uplink request sent by the client or other terminals. The first to-be-uplink data is sent by other nodes in the blockchain platform. The second to-be-uplink data is different from the first to-be-uplink data in the previous step.
In this process, as shown in connection with fig. 3, the data-uplink request may be a trigger by a certain client. Before the data to be uplinked is consensus among the block chain nodes, the data to be uplinked needs to be subjected to security detection analysis through a preprocessing module and a pre-consensus module, and security detection results are pre-consensus among the block chain nodes.
Each block chain node is correspondingly provided with a preprocessing module and a pre-consensus module. The block chain node, the preprocessing module and the pre-consensus module together form a block chain unit.
The preprocessing module corresponds to a transaction information filtering link and is responsible for preprocessing information and judging whether information content security risks exist or not; the pre-consensus module corresponds to a block consensus link and is responsible for pre-consensus on the pre-processing result, and the security detection result of the pre-processing module is synchronized from the block chain unit to the pre-consensus module in other block chain units to be used as a certificate for detecting and controlling the information content security risk.
And realizing the pre-consensus of the security detection result of the data to be uplinked among different block chain nodes through a pre-consensus module.
In the step, the second data to be uplink is subjected to security detection through the preprocessing module, and a second security detection result is obtained.
And step 208, generating a third consensus request according to the second security detection result, and sending the third consensus request to other nodes in the blockchain platform.
The third consensus request includes: and a second security detection result.
In the step, the preprocessing module is processed to obtain a second security detection result through the pre-consensus module, and consensus transmission is carried out in each node.
The order of steps 206 to 208 and steps 201 to 205 may be changed, but is not limited thereto.
In the specific implementation process, the specific detection control flow is as follows:
1) The client sends a request for uplink information;
2) The preprocessing module receives the request and obtains the information to be uplink;
3) The preprocessing module detects the security of the information to be uplink and judges whether the information has information content security risk or not. The preprocessing module generates a security detection result after detection and transmits the security detection result to the pre-consensus module;
4) The pre-consensus module synchronizes the security detection result among the nodes, records the information to be uplink in a storage medium corresponding to the local pre-consensus module, and synchronizes the detection result to the pre-consensus module corresponding to all other block chain nodes in the block chain network until all the pre-consensus modules corresponding to the block chain link points store the security detection result.
5) In the consensus process, firstly checking whether a safety detection result related to the block exists in a pre-consensus module, if not, rejecting the consensus, and if so, directly judging whether safety risks exist according to the safety detection result: if the security risk is not found, continuing the consensus, otherwise rejecting the consensus;
6) And the block link point completes the consensus processing of the data to be uplink and returns a consensus result to the client.
In the above steps, by setting two different functional modules for assisting in data consensus of the blockchain nodes, each blockchain node can perform direct security judgment on the data to be uplinked based on the security detection results of the consensus of other nodes, and can perform security detection pretreatment on the data to be uplinked in the node, and the security detection results obtained by the pretreatment are commonly known to other nodes, so that the other nodes can realize direct judgment on the security of the data to be uplinked based on the security detection results of the consensus of the node.
In the process, the detection link occurs before information transmission, and whether the information content security risk exists can be timely detected; on the other hand, the detection result is synchronized once in advance due to the newly added pre-consensus module, so that the situation that multiple audits occur when different nodes perform consensus on uplink data can be avoided, and the method in the embodiment can improve the overall data processing efficiency through sharing the result. In addition, the detection and control flow occurs before the block chain formal consensus, and is positioned very far ahead in the data processing link, so that the content can be flexibly and timely preprocessed once, and whether the pre-consensus is performed once can be checked in the block chain formal consensus link, and the timeliness of the data security treatment is effectively ensured.
Still further, after sending the third consensus request to other nodes in the blockchain platform, further comprising:
receiving consensus feedback information of other nodes for a third consensus request; and when the second security detection result is determined to realize consensus in the blockchain platform based on the consensus feedback information, sending a fourth consensus request to other nodes in the blockchain platform, wherein the fourth consensus request comprises second data to be uplinked.
After the security detection result of the data to be uplink is sent by the consensus request, a formal consensus stage of the data to be uplink can be entered when the second security detection result is determined to realize consensus in the blockchain platform based on the consensus feedback information.
Correspondingly, after the security detection is performed on the second data to be uplink to obtain a second security detection result, the method further comprises:
storing the second security detection result to the local; and when the second data to be uplink is determined to be the safety data based on the second safety detection result, storing the second data to be uplink to the local.
In the process, after the local node performs local preprocessing on the data to be uplink to obtain a security detection result, the data to be uplink data determined to be secure can be stored locally in response to a data uplink request so as to realize uplink consensus of the data to be uplink on a blockchain platform in cooperation with other nodes.
In the process, the information with the information content security risk can be detected and managed in advance, so that the situation that the information with the content security cannot be deleted due to the fact that the information is stored after consensus is completed on a blockchain is avoided.
Referring to fig. 4, fig. 4 is a block chain-based data uplink device according to an embodiment of the present application, and only a portion related to the embodiment of the present application is shown for convenience of explanation.
The blockchain-based data chaining device 400 includes:
The pre-consensus module 401 is configured to obtain a first consensus request triggered by any node in the blockchain platform, where the first consensus request includes: a first security detection result of the first data to be uplink; storing the first security detection result to the local according to the first consensus request, and sending consensus feedback information to a corresponding node;
A formal consensus module 402, configured to obtain a second consensus request triggered by a first node in the blockchain platform, where the second consensus request includes target data to be uplinked; judging whether a locally stored first security detection result contains a target security detection result corresponding to the target data to be uplink or not according to the second consensus request; if the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be the security data based on the target security detection result, responding to the second consensus request, and storing the target data to be uplink to the local.
Wherein the apparatus further comprises:
The preprocessing module is used for acquiring a data uplink request, wherein the data uplink request comprises second data to be uplink; performing security detection on the second data to be uplink to obtain a second security detection result;
The pre-consensus module is further configured to generate a third consensus request according to the second security detection result, and send the third consensus request to other nodes in the blockchain platform, where the third consensus request includes: and the second security detection result.
In the device, the formal consensus module is further used for:
receiving consensus feedback information of the other nodes for the third consensus request;
And when the second security detection result is determined to realize consensus in the blockchain platform based on the consensus feedback information, sending a fourth consensus request to other nodes in the blockchain platform, wherein the fourth consensus request comprises the second data to be uplinked.
In the device, the pre-consensus module is further used for: storing the second security detection result to a local place;
the formal consensus module is further used for: and when the second data to be uplink is determined to be the safety data based on the second safety detection result, storing the second data to be uplink to the local.
In the device, the formal consensus module is further used for:
And if the first security detection result does not contain the target security detection result, sending feedback information for rejecting consensus to the corresponding node.
In the device, the formal consensus module is further used for:
And if the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be unsafe data based on the target security detection result, sending feedback information for rejecting the consensus to the corresponding node.
The data uplink device based on the block chain provided by the embodiment of the application can realize each process of the embodiment of the data uplink method based on the block chain, can achieve the same technical effect, and is not repeated here for avoiding repetition.
Fig. 5 is a block diagram of a terminal according to an embodiment of the present application. As shown in the figure, the terminal 5 of this embodiment includes: at least one processor 50 (only one is shown in fig. 5), a memory 51 and a computer program 52 stored in the memory 51 and executable on the at least one processor 50, the processor 50 implementing the steps in any of the various method embodiments described above when executing the computer program 52.
The terminal 5 may be a computing device such as a desktop computer, a notebook computer, a palm computer, a cloud server, etc. The terminal 5 may include, but is not limited to, a processor 50, a memory 51. It will be appreciated by those skilled in the art that fig. 5 is merely an example of the terminal 5 and is not limiting of the terminal 5, and may include more or fewer components than shown, or may combine some components, or different components, e.g., the terminal may further include input and output devices, network access devices, buses, etc.
The Processor 50 may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 51 may be an internal storage unit of the terminal 5, such as a hard disk or a memory of the terminal 5. The memory 51 may also be an external storage device of the terminal 5, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the terminal 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the terminal 5. The memory 51 is used for storing the computer program as well as other programs and data required by the terminal. The memory 51 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal and method may be implemented in other manners. For example, the apparatus/terminal embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
The present application may also be implemented as a computer program product for implementing all or part of the procedures of the methods of the above embodiments, which when run on a terminal causes the terminal to perform the steps of the method embodiments described above.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (10)

1. A blockchain-based data chaining method, comprising:
acquiring a first consensus request triggered by any node in a blockchain platform, wherein the first consensus request comprises the following steps: a first security detection result of the first data to be uplink;
storing the first security detection result to the local according to the first consensus request, and sending consensus feedback information to a corresponding node;
Acquiring a second consensus request triggered by a first node in the blockchain platform, wherein the second consensus request comprises target data to be uplinked;
Judging whether the locally stored first security detection result contains a target security detection result corresponding to the target data to be uplink or not according to the second consensus request;
If the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be the security data based on the target security detection result, responding to the second consensus request, and storing the target data to be uplink to the local.
2. The data chaining method of claim 1, further comprising:
Acquiring a data uplink request, wherein the data uplink request comprises second data to be uplink;
Performing security detection on the second data to be uplink to obtain a second security detection result;
generating a third consensus request according to the second security detection result, and sending the third consensus request to other nodes in the blockchain platform, wherein the third consensus request comprises: and the second security detection result.
3. The method of data chaining according to claim 2, further comprising, after the sending the third consensus request to other nodes in the blockchain platform:
receiving consensus feedback information of the other nodes for the third consensus request;
And when the second security detection result is determined to realize consensus in the blockchain platform based on the consensus feedback information, sending a fourth consensus request to other nodes in the blockchain platform, wherein the fourth consensus request comprises the second data to be uplinked.
4. The method for data uplink according to claim 2, wherein after the security detection is performed on the second data to be uplink to obtain a second security detection result, further comprising:
storing the second security detection result to a local place;
And when the second data to be uplink is determined to be the safety data based on the second safety detection result, storing the second data to be uplink to the local.
5. The method of claim 1, wherein after determining, according to the second consensus request, whether the locally stored first security detection result includes a target security detection result corresponding to the target data to be uplink, further comprising:
And if the first security detection result does not contain the target security detection result, sending feedback information for rejecting consensus to the corresponding node.
6. The method of claim 1, wherein after determining, according to the second consensus request, whether the locally stored first security detection result includes a target security detection result corresponding to the target data to be uplink, further comprising:
And if the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be unsafe data based on the target security detection result, sending feedback information for rejecting the consensus to the corresponding node.
7. A blockchain-based data chaining device, comprising:
The pre-consensus module is configured to obtain a first consensus request triggered by any node in the blockchain platform, where the first consensus request includes: a first security detection result of the first data to be uplink; storing the first security detection result to the local according to the first consensus request, and sending consensus feedback information to a corresponding node;
The formal consensus module is used for acquiring a second consensus request triggered by the first node in the blockchain platform, wherein the second consensus request contains target data to be uplinked; judging whether the locally stored first security detection result contains a target security detection result corresponding to the target data to be uplink or not according to the second consensus request; if the first security detection result is judged to contain the target security detection result, when the target data to be uplink is determined to be the security data based on the target security detection result, responding to the second consensus request, and storing the target data to be uplink to the local.
8. The data chaining device of claim 7, further comprising:
The preprocessing module is used for acquiring a data uplink request, wherein the data uplink request comprises second data to be uplink; performing security detection on the second data to be uplink to obtain a second security detection result;
The pre-consensus module is further configured to generate a third consensus request according to the second security detection result, and send the third consensus request to other nodes in the blockchain platform, where the third consensus request includes: and the second security detection result.
9. A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 6 when the computer program is executed.
10. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 6.
CN202011604635.4A 2020-12-29 2020-12-29 Method, device and terminal for supervising block chain information content security event Active CN112632543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011604635.4A CN112632543B (en) 2020-12-29 2020-12-29 Method, device and terminal for supervising block chain information content security event

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011604635.4A CN112632543B (en) 2020-12-29 2020-12-29 Method, device and terminal for supervising block chain information content security event

Publications (2)

Publication Number Publication Date
CN112632543A CN112632543A (en) 2021-04-09
CN112632543B true CN112632543B (en) 2024-06-25

Family

ID=75286760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011604635.4A Active CN112632543B (en) 2020-12-29 2020-12-29 Method, device and terminal for supervising block chain information content security event

Country Status (1)

Country Link
CN (1) CN112632543B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109313752A (en) * 2016-05-24 2019-02-05 万事达卡国际股份有限公司 Guarantee the method and system of the efficient common recognition mechanism of block chain of the formation for being licensed using audit

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395665B (en) * 2017-05-22 2020-04-24 创新先进技术有限公司 Block chain service acceptance and service consensus method and device
CN110321384B (en) * 2019-06-04 2023-07-28 创新先进技术有限公司 Block chain-based data recording method and device and electronic equipment
CN110378692A (en) * 2019-07-09 2019-10-25 西安纸贵互联网科技有限公司 Data safety processing method and device based on block chain
CN110995790B (en) * 2019-11-14 2021-05-18 北京联合天成价值网络科技有限公司 Method for solving block chain network consensus uncertainty
CN111198763B (en) * 2019-12-25 2024-07-05 平安壹钱包电子商务有限公司 Method for detecting reuse of resources, terminal and computer-readable storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109313752A (en) * 2016-05-24 2019-02-05 万事达卡国际股份有限公司 Guarantee the method and system of the efficient common recognition mechanism of block chain of the formation for being licensed using audit

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的科学数据标识技术创新应用模式;王姝;晏敏;刘佳;周启惠;郭志斌;王雅哲;周园春;;数据与计算发展前沿;20191231(第06期);全文 *

Also Published As

Publication number Publication date
CN112632543A (en) 2021-04-09

Similar Documents

Publication Publication Date Title
US8955153B2 (en) Privacy control in a social network
CN110225104B (en) Data acquisition method and device and terminal equipment
CN108400868B (en) Seed key storage method and device and mobile terminal
CN108038112B (en) File processing method, mobile terminal and computer readable storage medium
CN111556059A (en) Abnormity detection method, abnormity detection device and terminal equipment
CN110244963B (en) Data updating method and device and terminal equipment
CN110708335A (en) Access authentication method and device and terminal equipment
CN112055064A (en) Data synchronization method, device, equipment and storage medium
CN113989058A (en) Service generation method and device
CN113132400A (en) Business processing method, device, computer system and storage medium
CN112632543B (en) Method, device and terminal for supervising block chain information content security event
CN116015840B (en) Data operation auditing method, system, equipment and storage medium
CN109324843B (en) Fingerprint processing system and method and fingerprint equipment
WO2023065985A1 (en) Risk prediction method and apparatus for water heater flue, computer device, and medium
CN107609119B (en) File processing method, mobile terminal and computer readable storage medium
WO2022141060A1 (en) Blockchain-based data on-chain method and apparatus, terminal, and storage medium
CN110245016B (en) Data processing method, system, device and terminal equipment
CN107316197A (en) A kind of payment protection method, mobile terminal and computer-readable recording medium
CN113434069A (en) Menu configuration method, device, equipment and storage medium
CN108804713B (en) Image output method, electronic device, and computer-readable medium
CN112968876A (en) Content sharing method and device, electronic equipment and storage medium
CN111786936A (en) Method and device for authentication
CN109561146A (en) Document down loading method, device, terminal device
CN110162479B (en) Abnormal application detection method and device and terminal equipment
CN114070659B (en) Equipment locking method and device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant