CN112800483A - Block chain-based data source integrity detection method, system, device and medium - Google Patents

Block chain-based data source integrity detection method, system, device and medium Download PDF

Info

Publication number
CN112800483A
CN112800483A CN202110064520.9A CN202110064520A CN112800483A CN 112800483 A CN112800483 A CN 112800483A CN 202110064520 A CN202110064520 A CN 202110064520A CN 112800483 A CN112800483 A CN 112800483A
Authority
CN
China
Prior art keywords
data
data source
record
data record
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110064520.9A
Other languages
Chinese (zh)
Inventor
洪薇
洪健
李京昆
刘文思
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Chenweixi Chain Information Technology Co ltd
Original Assignee
Hubei Chenweixi Chain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Chenweixi Chain Information Technology Co ltd filed Critical Hubei Chenweixi Chain Information Technology Co ltd
Priority to CN202110064520.9A priority Critical patent/CN112800483A/en
Publication of CN112800483A publication Critical patent/CN112800483A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method, a system, a device and a medium for detecting the integrity of a data source based on a block chain, which relate to the field of data source integrity detection and comprise the following steps: for each first data record in the data source, extracting a field or a field set capable of uniquely identifying the first data record to obtain identification data of the first data record; storing all first data records in a data source in a block chain, wherein the identification data of each first data record is used as the identification of the record on the chain; comparing the consistency of the second data record on the block chain with the corresponding first data record in the data source, and obtaining a data source integrity detection result based on the comparison result; the invention tracks the change condition of the data source by utilizing the characteristics of non-falsification and verification traceability of the block chain technology, and can find the data integrity problem of the data source in real time with low cost, simplicity and high efficiency.

Description

Block chain-based data source integrity detection method, system, device and medium
Technical Field
The present invention relates to the field of data source integrity detection, and in particular, to a method, a system, an apparatus, and a medium for detecting data source integrity based on a block chain.
Background
The data source is the source and basis of all data processing and analysis, and the safety and the compliance of the data source directly relate to the correctness and the effectiveness of subsequent data processing and analysis. The existing methods for guaranteeing the integrity and the safety of the data source start from the aspects of improving the environmental safety level of a machine where the data source is located, increasing data backup and the like. The main problems of these methods are high cost, complex implementation means, and failure to timely monitor data misoperations and loss due to internal problems.
Disclosure of Invention
In order to solve the problems, the invention provides a data source integrity detection method, a system, a device and a medium based on a block chain.
In order to achieve the above object, the present invention provides a method for detecting integrity of a data source based on a block chain, where the method includes:
for each first data record in the data source, extracting a field or a field set capable of uniquely identifying the first data record to obtain identification data of the first data record;
storing all first data records in a data source in a block chain, wherein the identification data of each first data record is used as the identification of the record on the chain;
and comparing the consistency of the second data record on the block chain with the corresponding first data record in the data source, and obtaining the data source integrity detection result based on the comparison result.
The method includes the steps that chain storage certification is carried out on data records in a data source by utilizing the characteristics that a block chain technology cannot be tampered and authenticity verification tracing is carried out, and then the integrity of data in the data source can be judged by comparing the data records on the chain with the data records in the data source when detection is needed.
The traditional method for guaranteeing the integrity and the security of the data source starts from the aspects of improving the environmental security level of a machine where the data source is located, increasing data backup and the like. The main problems of these methods are high cost, complex implementation means, and failure to timely monitor data misoperations and loss due to internal problems. In the method, only data records in the data source need to be linked up and then compared when integrity needs to be detected, the implementation process is simple, the cost is low, and both the data linking and the data integrity detection in the method can be operated in real time, so that the method can monitor the situations of data misoperation and data loss caused by internal problems in real time and in time.
Preferably, in the method, all the first data records in the data source are stored in the block chain, which specifically includes:
sequencing all first data records in the data source to obtain a first data record sequencing result in the data source;
and sequentially processing each first data record based on the sequencing result of the first data records as follows:
calculating a hash value of a preset first data record;
combining the hash value of the preset first data record with the identification data of the preset first data record to form a second data record on a block chain;
the second data record is stored in the block chain.
When the first data record in the data source is stored in the uplink, the first data record and the corresponding identification data are combined to form the second data record on the block chain, namely the identification data is used as the data identification recorded on the chain, namely the position of the data on the chain can be uniquely positioned through the identification, so that the storage position of the corresponding data can be conveniently, quickly and accurately found from the block chain.
Preferably, the method for storing the data uplink in the method includes: calling a uplink function to store data uplink; and the period of data uplink storage in the method can be adjusted according to the data change condition of the data source. The purpose of designing the data uplink storage period to be adjustable according to the data change condition of the data source is to enable the data uplink period to meet the timely and real-time requirements of the user data complete monitoring.
Preferably, the calculating the hash value of the first data record in the method specifically includes:
respectively calculating hash values of all fields in the first data record;
performing character string connection on the hash value of each field obtained by calculation to obtain a connected character string;
and calculating the hash value of the connected character string to obtain the hash value of the first data record.
Preferably, in the method, the consistency between the second data record on the block chain and the corresponding first data record in the data source is compared, and the data source integrity detection result is obtained based on the comparison result, which specifically includes:
and aiming at each second data record on the block chain, processing as follows to obtain a data source integrity detection statistical result:
obtaining corresponding identification data from a second data record on the blockchain;
querying whether a corresponding first data record exists in the data source based on the identification data; if the corresponding first data record does not exist in the data source, the first data record is deleted, the deleted record statistic value is added with 1, and the deleted record statistic value is initially 0;
if the corresponding first data record exists in the data source, obtaining a first hash value from a second data record, calculating to obtain a second hash value of the first data record, and comparing whether the first hash value is consistent with the second hash value;
if the comparison result is consistent, the first data record is not modified, if the comparison result is inconsistent, the first data record is modified, 1 is added to the statistic value of the inconsistency of the comparison result, and the statistic value of the inconsistency of the comparison result is initially 0.
Preferably, in the method, if the record deletion statistical value in the data source integrity detection statistical result is greater than 0, it indicates that the data record of the data source is modified; and if the statistical value of the inconsistency of the comparison result in the data source integrity detection statistical result is greater than 0, indicating that the data record of the data source is deleted.
Preferably, in the method, if the ratio of the number of modified data records in the data source integrity detection result to the total number of data records in the data source is greater than a threshold, it is determined that the data source integrity has a risk; and if the ratio of the number of the deleted data records in the data source integrity detection result to the total number of the data records in the data source is greater than a threshold value, judging that the data source integrity has risk.
Corresponding to the method in the invention, the invention also provides a data source integrity detection system based on the block chain, and the system comprises:
the identification data obtaining unit is used for extracting a field or a field set which can uniquely identify each first data record in the data source to obtain the identification data of the first data record;
the uplink unit is used for storing all first data records in the data source in a block chain, wherein the identification data of each first data record is used as the identification of the first data record on the chain;
and the detection unit is used for comparing the consistency of the second data record on the block chain and the corresponding first data record in the data source and obtaining the data source integrity detection result based on the comparison result.
The invention also provides a device for detecting the integrity of the data source based on the block chain, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the method for detecting the integrity of the data source based on the block chain when executing the computer program.
The present invention also provides a computer readable storage medium, which stores a computer program that, when executed by a processor, implements the steps of the block chain based data source integrity detection method.
One or more technical schemes provided by the invention at least have the following technical effects or advantages:
the invention is beneficial to the characteristics of non-tampering and verification traceability of a block chain, realizes the low cost and simple implementation means, can monitor and find the integrity problem of the data source in real time, and particularly can completely and accurately detect the integrity risk problem of the data source caused by malicious illegal attacks from the outside and non-conformity of rules and operation flows in the inside for static data sources such as archives, judgments and the like which cannot be modified for the second time.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention;
FIG. 1 is a schematic flow chart of a block chain-based data source integrity detection method;
fig. 2 is a schematic diagram of a block chain-based data source integrity detection system.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflicting with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described and thus the scope of the present invention is not limited by the specific embodiments disclosed below.
It will be understood by those skilled in the art that in the present disclosure, the terms "longitudinal," "lateral," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like are used in an orientation or positional relationship indicated in the drawings for ease of description and simplicity of description, and do not indicate or imply that the referenced devices or components must be constructed and operated in a particular orientation and thus are not to be considered limiting.
It is understood that the terms "a" and "an" should be interpreted as meaning that a number of one element or element is one in one embodiment, while a number of other elements is one in another embodiment, and the terms "a" and "an" should not be interpreted as limiting the number.
Example one
Referring to fig. 1, fig. 1 is a schematic flowchart of a block chain-based data source integrity detection method, an embodiment of the present invention provides a block chain-based data source integrity detection method, where the method includes:
for each first data record in the data source, extracting a field or a field set capable of uniquely identifying the first data record to obtain identification data of the first data record;
storing all first data records in a data source in a block chain, wherein the identification data of each first data record is used as the identification of the record on the chain;
and comparing the consistency of the second data record on the block chain with the corresponding first data record in the data source, and obtaining the data source integrity detection result based on the comparison result.
The method in this embodiment uses the characteristics of the block chain technology that the data record in the data source cannot be tampered and the authenticity is verified, and then the integrity of the data in the data source can be judged by comparing the data record in the chain with the data record in the data source when the data record needs to be detected.
The following examples describe in detail a block chain-based data source integrity detection method in the present invention, where the method in this embodiment includes the following steps:
1. extracting key attributes or attribute sets of the data source, namely fields or field sets which can uniquely identify each record of the data source and are recorded as PK;
2. all records of the data source are subjected to uplink storage;
2.1, sequentially processing each record, and using the PK value as a data identifier of the record on the chain, namely, uniquely positioning the position of the data on the chain by the identifier;
2.2 calculating the hash value of the record, namely calculating the hash of each field of the record, then performing character string connection on the hash value of each field, and calculating the hash of the connected character string, wherein the formal expression is as follows:
setting the field sets of the data source as F1, F2 and F3;
F1_hash=SHA256(F1);
F2_hash=SHA256(F2);
F3_hash=SHA256(F3);
Record_hash=SHA256(F1_hash+F2_hash+F3_hash);
the SHA256 is a common hash function, and is used for calculating a character string to generate a character string with a fixed length; f1_ hash, F2_ hash, and F3_ hash are hash values of respective fields calculated by the hash function; (ii) a Record _ hash is the hash value of the Record; in the embodiment of the invention, other hash functions or other modes can be adopted to calculate the hash value, and the specific calculation mode of the hash value is not limited;
2.3 combine PK and hash value of record generated in step 2.2 to form a chain of data records: { PK, Record _ hash }
2.4 calling a chain loading function to carry out chain loading and certification on { PK, Record _ hash } so as to generate a block chain data Record which cannot be tampered;
2.5, returning to the step 2.1 until all current records of the data source are processed;
3. detecting data integrity of the data source using the on-chain data records of the blockchain;
3.1 processing one by one according to the data record set on the chain generated in the step 2;
3.2 taking PK of the data record on the chain, namely key attributes or attribute sets of the data source as conditions, and inquiring in the data source;
3.3 if the Record corresponding to the PK exists in the data source, extracting all fields of the Record, calculating by referring to the calculation method and process in step 2.2, comparing the result Record _ hash obtained by calculation with the Record _ hash of the Record on the chain, and if the comparison result is consistent, indicating that the Record is not modified; if the comparison result is inconsistent, the record is modified, and the calculated value CHANGED _ COUNT of the inconsistent comparison is added with 1;
3.4 if the record corresponding to the PK does not exist in the data source, indicating that the record is DELETED, adding 1 to the DELETED _ COUNT;
3.5, returning to the step 3.1 until all records of the data record set on the chain are processed;
3.6 judging whether the CHANGED _ COUNT and the DELETED _ COUNT are greater than 0, if the CHANGED _ COUNT is greater than 0, indicating that the record of the data source has the condition of being modified; if the DELETED _ COUNT is greater than 0, the record of the data source is DELETED;
3.7 set integrity alignment threshold, such as one in ten thousandth, i.e. the ratio of alignment inconsistencies. If the ratio is above the threshold, it indicates that the integrity of the data source is at risk.
Examples are as follows: setting the total number of data record sets on the chain as 1000, CASE 1, CHANGED _ COUNT as 0, DELETED _ COUNT as 0, (CHANGED _ COUNT + DELETED _ COUNT)/1000 as 0; 0 is less than one ten thousandth, which indicates that the integrity of the data source has no risk;
CASE 2, CHANGED _ COUNT is 1, DELETED _ COUNT is 0, (CHANGED _ COUNT + DELETED _ COUNT)/1000 is 0.001, 0.001 is more than one ten thousandth, which indicates that the integrity of the data source is at risk;
4. according to the data change condition of the data source, the uplink period can be set to different time values, such as 1 minute, 30 minutes, 1 hour, 1 day and the like, so as to store the newly added data uplink in the data source in time for integrity detection.
Example two
Referring to fig. 2, fig. 2 is a schematic diagram illustrating a block chain-based data source integrity detection system, an embodiment of the present invention provides a block chain-based data source integrity detection system, including:
the identification data obtaining unit is used for extracting a field or a field set which can uniquely identify each first data record in the data source to obtain the identification data of the first data record;
the uplink unit is used for storing all first data records in the data source in a block chain, wherein the identification data of each first data record is used as the identification of the first data record on the chain;
and the detection unit is used for comparing the consistency of the second data record on the block chain and the corresponding first data record in the data source and obtaining the data source integrity detection result based on the comparison result.
EXAMPLE III
The invention also provides a device for detecting the integrity of the data source based on the block chain, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the method for detecting the integrity of the data source based on the block chain when executing the computer program.
The processor may be a Central Processing Unit (CPU), or other general-purpose processor, a digital signal processor (digital signal processor), an Application Specific Integrated Circuit (Application Specific Integrated Circuit), an off-the-shelf programmable gate array (field programmable gate array) or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory can be used for storing the computer program and/or the module, and the processor can realize various functions of the block chain-based data source integrity detection device in the invention by operating or executing the data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a smart memory card, a secure digital card, a flash memory card, at least one magnetic disk storage device, a flash memory device, or other volatile solid state storage device.
Example four
The present invention also provides a computer readable storage medium, which stores a computer program that, when executed by a processor, implements the steps of the block chain based data source integrity detection method.
The block chain-based data source integrity detection device can be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, all or part of the flow in the method of implementing the embodiments of the present invention may also be stored in a computer readable storage medium through a computer program, and when the computer program is executed by a processor, the computer program may implement the steps of the above-described method embodiments. Wherein the computer program comprises computer program code, an object code form, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying said computer program code, a recording medium, a usb-disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory, a random access memory, a point carrier signal, a telecommunications signal, a software distribution medium, etc. It should be noted that the computer readable medium may contain content that is appropriately increased or decreased as required by legislation and patent practice in the jurisdiction.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. The data source integrity detection method based on the block chain is characterized by comprising the following steps:
for each first data record in the data source, extracting a field or a field set capable of uniquely identifying the first data record to obtain identification data of the first data record;
storing all first data records in a data source in a block chain, wherein the identification data of each first data record is used as the identification of the record on the chain;
and comparing the consistency of the second data record on the block chain with the corresponding first data record in the data source, and obtaining the data source integrity detection result based on the comparison result.
2. The method for detecting integrity of a data source based on a block chain as claimed in claim 1, wherein the method stores all first data records in the data source in the block chain, and specifically comprises:
sequencing all first data records in the data source to obtain a first data record sequencing result in the data source;
and sequentially processing each first data record based on the sequencing result of the first data records as follows:
calculating a hash value of a preset first data record;
combining the hash value of the preset first data record with the identification data of the preset first data record to form a second data record on a block chain;
the second data record is stored in the block chain.
3. The method of claim 1, wherein the data uplink is stored in a manner of: calling a uplink function to store data uplink; and the period of data uplink storage in the method can be adjusted according to the data change condition of the data source.
4. The method for detecting the integrity of a data source based on a blockchain according to claim 2, wherein the calculating the hash value of the first data record in the method specifically includes:
respectively calculating hash values of all fields in the first data record;
performing character string connection on the hash value of each field obtained by calculation to obtain a connected character string;
and calculating the hash value of the connected character string to obtain the hash value of the first data record.
5. The method according to claim 1, wherein the comparing consistency between the second data record in the block chain and the corresponding first data record in the data source, and obtaining the data source integrity detection result based on the comparison result specifically include:
and aiming at each second data record on the block chain, processing as follows to obtain a data source integrity detection statistical result:
obtaining corresponding identification data from a second data record on the blockchain;
querying whether a corresponding first data record exists in the data source based on the identification data; if the corresponding first data record does not exist in the data source, the first data record is deleted, the deleted record statistic value is added with 1, and the deleted record statistic value is initially 0;
if the corresponding first data record exists in the data source, obtaining a first hash value from a second data record, calculating to obtain a second hash value of the first data record, and comparing whether the first hash value is consistent with the second hash value;
if the comparison result is consistent, the first data record is not modified, if the comparison result is inconsistent, the first data record is modified, 1 is added to the statistic value of the inconsistency of the comparison result, and the statistic value of the inconsistency of the comparison result is initially 0.
6. The block chain-based data source integrity detection method according to claim 5, wherein if the deleted record statistic in the data source integrity detection statistic result is greater than 0, it indicates that the data record of the data source has been modified; and if the statistical value of the inconsistency of the comparison result in the data source integrity detection statistical result is greater than 0, indicating that the data record of the data source is deleted.
7. The block chain-based data source integrity detection method according to claim 1, wherein if a ratio of a number of modified data records in the data source integrity detection result to a total number of data records in the data source is greater than a threshold, it is determined that there is a risk in the integrity of the data source; and if the ratio of the number of the deleted data records in the data source integrity detection result to the total number of the data records in the data source is greater than a threshold value, judging that the data source integrity has risk.
8. A blockchain-based data source integrity detection system, the system comprising:
the identification data obtaining unit is used for extracting a field or a field set which can uniquely identify each first data record in the data source to obtain the identification data of the first data record;
the uplink unit is used for storing all first data records in the data source in a block chain, wherein the identification data of each first data record is used as the identification of the first data record on the chain;
and the detection unit is used for comparing the consistency of the second data record on the block chain and the corresponding first data record in the data source and obtaining the data source integrity detection result based on the comparison result.
9. A blockchain-based data source integrity detection apparatus comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the blockchain-based data source integrity detection method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the blockchain-based data source integrity detection method according to any one of claims 1 to 7.
CN202110064520.9A 2021-01-18 2021-01-18 Block chain-based data source integrity detection method, system, device and medium Pending CN112800483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110064520.9A CN112800483A (en) 2021-01-18 2021-01-18 Block chain-based data source integrity detection method, system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110064520.9A CN112800483A (en) 2021-01-18 2021-01-18 Block chain-based data source integrity detection method, system, device and medium

Publications (1)

Publication Number Publication Date
CN112800483A true CN112800483A (en) 2021-05-14

Family

ID=75810232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110064520.9A Pending CN112800483A (en) 2021-01-18 2021-01-18 Block chain-based data source integrity detection method, system, device and medium

Country Status (1)

Country Link
CN (1) CN112800483A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254502A (en) * 2021-06-07 2021-08-13 湖北央中巨石信息技术有限公司 Method, system, device and medium for filtering and valuing multi-party homogeneous data
CN113255001A (en) * 2021-06-09 2021-08-13 湖北央中巨石信息技术有限公司 Block chain-based calculation accounting method, system, device and medium
CN114463010A (en) * 2022-04-13 2022-05-10 南京金宁汇科技有限公司 Local node block data integrity detection method and system based on double-layer chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889729A (en) * 2019-11-29 2020-03-17 腾讯科技(深圳)有限公司 Data verification method and device based on block chain network
CN111414650A (en) * 2020-03-25 2020-07-14 北京创世智链信息技术研究院 Order processing method and system based on block chain storage certificate
CN111651453A (en) * 2020-04-30 2020-09-11 中国平安财产保险股份有限公司 User historical behavior query method and device, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110889729A (en) * 2019-11-29 2020-03-17 腾讯科技(深圳)有限公司 Data verification method and device based on block chain network
CN111414650A (en) * 2020-03-25 2020-07-14 北京创世智链信息技术研究院 Order processing method and system based on block chain storage certificate
CN111651453A (en) * 2020-04-30 2020-09-11 中国平安财产保险股份有限公司 User historical behavior query method and device, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113254502A (en) * 2021-06-07 2021-08-13 湖北央中巨石信息技术有限公司 Method, system, device and medium for filtering and valuing multi-party homogeneous data
CN113255001A (en) * 2021-06-09 2021-08-13 湖北央中巨石信息技术有限公司 Block chain-based calculation accounting method, system, device and medium
CN114463010A (en) * 2022-04-13 2022-05-10 南京金宁汇科技有限公司 Local node block data integrity detection method and system based on double-layer chain
CN114463010B (en) * 2022-04-13 2022-06-17 南京金宁汇科技有限公司 Local node block data integrity detection method and system based on double-layer chain

Similar Documents

Publication Publication Date Title
CN112800483A (en) Block chain-based data source integrity detection method, system, device and medium
CN109815697B (en) Method and device for processing false alarm behavior
CN104731816A (en) Method and device for processing abnormal business data
CN104778123A (en) Method and device for detecting system performance
CN109766697A (en) Vulnerability scanning method, storage medium, equipment and system applied to linux system
CN112905667A (en) Unmanned information storage and playback method, device and storage medium
CN111369354A (en) Data monitoring method and device for block chain application and storage medium
CN112988896A (en) Synchronous consensus method, system, device and medium based on block chain
CN115017485A (en) Data authority management and control method and system
CN112948355B (en) Method, system, device and medium for destroying distributed network data
CN110309064B (en) Unit test method, device, equipment and storage medium based on log record
CN112231232A (en) Method, device and equipment for determining test data model and generating test data
CN112887295B (en) Block chain-based data transmission safety detection method, system, device and medium
CN114816832B (en) Data management method, device and system of single chip microcomputer
CN112800107B (en) Data source security authentication method, system, device and medium
CN114021131A (en) Method and device for acquiring data analysis map and electronic equipment
CN112783942B (en) Block chain-based data acquisition quality verification method, system, device and medium
CN113706056A (en) Bidding unit performance identification early warning method, device, equipment and storage medium
CN114186278A (en) Database abnormal operation identification method and device and electronic equipment
CN114357458A (en) Database risk assessment system and method, electronic equipment and storage medium
CN111385342B (en) Internet of things industry identification method and device, electronic equipment and storage medium
CN112800055A (en) Data truth verification method, system, device and medium based on bloom filter
CN104331414A (en) Sensitive data filtering method and system based on data blocks
CN113486313B (en) Unified identity authentication method and system for school system personnel
CN113255001A (en) Block chain-based calculation accounting method, system, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210514