CN114065302A - Data processing method, device, equipment, medium and block chain network - Google Patents

Data processing method, device, equipment, medium and block chain network Download PDF

Info

Publication number
CN114065302A
CN114065302A CN202111383666.6A CN202111383666A CN114065302A CN 114065302 A CN114065302 A CN 114065302A CN 202111383666 A CN202111383666 A CN 202111383666A CN 114065302 A CN114065302 A CN 114065302A
Authority
CN
China
Prior art keywords
data
uplink
verification
transmission
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111383666.6A
Other languages
Chinese (zh)
Inventor
臧铖
陈嘉俊
胡贤明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Zheshang Bank Co Ltd
Original Assignee
China Zheshang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Zheshang Bank Co Ltd filed Critical China Zheshang Bank Co Ltd
Priority to CN202111383666.6A priority Critical patent/CN114065302A/en
Publication of CN114065302A publication Critical patent/CN114065302A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The embodiment of the invention discloses a data processing method, a data processing device, data processing equipment, a data processing medium and a block chain network. The method comprises the following steps: acquiring at least two pieces of data to be uplink; wherein, each data to be linked is from data transmission devices in different block chain nodes; under the condition that all data to be uplink linked are determined to be consistent, performing data logic verification on any data to be uplink linked to obtain a logic verification result of the data to be uplink linked; and obtaining logic verification results obtained in all the block chain nodes, and determining the data to be uplink linked as target uplink linked data under the condition that all the logic verification results are verified. The embodiment of the invention can ensure the reliability of the data before uplink in the block chain network and improve the data reliability of the whole block chain network.

Description

Data processing method, device, equipment, medium and block chain network
Technical Field
The embodiment of the invention relates to the technical field of block chains, in particular to a data processing method, a device, equipment, a medium and a block chain network.
Background
The block chain is an accounting technology which is commonly maintained by multiple parties, transmission and access safety is guaranteed by using cryptography, data can be stored consistently, and tampering is difficult, and the block chain is also called as a distributed account book technology. The block chain technology can effectively guarantee the authenticity of the data after the chain is linked, so that the block chain technology is widely applied to the aspects of data authority confirmation, credit management, value transfer and the like.
However, the existing blockchain technology can only ensure the non-falsification of the data after uplink in the application, and the security of the data before uplink cannot be guaranteed, so that there is a risk that the data is falsified and forged before uplink.
Disclosure of Invention
Embodiments of the present invention provide a data processing method, apparatus, device, medium, and a blockchain network, so as to ensure reliability of pre-uplink data in the blockchain network and improve data reliability of the entire blockchain network.
In a first aspect, an embodiment of the present invention provides a data processing method based on a blockchain, which is applied to a data verification apparatus in a blockchain node, and includes:
acquiring at least two pieces of data to be uplink; wherein, each data to be uplink comes from the data transmission device in different block chain nodes respectively;
under the condition that all the data to be uplink are determined to have consistency, performing data logic verification on any data to be uplink to obtain a logic verification result of the data to be uplink;
and acquiring the logic verification results obtained in all the block chain nodes, and determining the data to be uplink as target uplink data under the condition that all the logic verification results are verified.
In a second aspect, an embodiment of the present invention further provides a method, applied to a data transmission apparatus in a blockchain node, including:
receiving data to be transmitted sent by a target data acquisition device according to a preset binding relationship;
acquiring acquired signature data of the data to be transmitted;
adding transmission verification data into the data to be transmitted under the condition that the data to be transmitted is determined to be reliable according to the acquired signature data, and performing transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data;
the target transmission data are sent to data verification devices of all the block chain nodes;
wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device.
In a third aspect, an embodiment of the present invention further provides a method, applied to a data acquisition device in a block chain node, including:
acquiring target acquisition data;
according to preset configuration data, carrying out data configuration verification on the target acquisition data to obtain a configuration verification result of the target acquisition data;
under the condition that the configuration verification result is confirmed to be passed, carrying out encryption processing and signature acquisition processing on the target acquisition data to obtain data to be transmitted;
and sending the data to be transmitted to a data transmission device according to a preset binding relationship.
In a fourth aspect, an embodiment of the present invention further provides a data verification apparatus, configured at a blockchain node, including:
the data to be uplink-linked acquisition module is used for acquiring at least two data to be uplink-linked; wherein, each data to be uplink comes from the data transmission device in different block chain nodes respectively;
the data logic verification module is used for performing data logic verification on the data to be uplink-linked under the condition that all the data to be uplink-linked are determined to have consistency, so as to obtain a logic verification result of the data to be uplink-linked;
and the uplink data determining module is used for acquiring the logic verification results obtained from all the block chain nodes, and determining the data to be uplink as target uplink data under the condition that all the logic verification results are verified.
In a fifth aspect, an embodiment of the present invention further provides a data transmission apparatus, configured at a blockchain node, including:
the data receiving module to be transmitted is used for receiving the data to be transmitted sent by the target data acquisition device according to the preset binding relationship;
the acquisition signature acquisition module is used for acquiring acquisition signature data of the data to be transmitted;
the transmission data generation module is used for adding transmission verification data into the data to be transmitted under the condition that the data to be transmitted is determined to be reliable according to the acquired signature data, and performing transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data;
the transmission data sending module is used for sending the target transmission data to the data verification devices of all the block chain nodes;
wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device.
In a sixth aspect, an embodiment of the present invention further provides a data acquisition device configured at a blockchain node, including:
the acquisition module of the collected data, is used for obtaining the goal and gathering the data;
the data configuration verification module is used for performing data configuration verification on the target acquisition data according to preset configuration data to obtain a configuration verification result of the target acquisition data;
the data to be transmitted generating module is used for carrying out encryption processing and signature acquisition processing on the target acquisition data to obtain the data to be transmitted under the condition that the configuration verification result is confirmed to be verified;
and the data to be transmitted sending module is used for sending the data to be transmitted to the data transmission device according to the preset binding relationship.
In a seventh aspect, an embodiment of the present invention further provides a blockchain network, including at least two blockchain nodes; wherein:
each of the block chain nodes includes a data verification device, which is configured to implement the block chain-based data processing method according to the first aspect of the embodiment of the present invention;
at least two of the blockchain nodes comprise a data transmission device, which is used for implementing the blockchain-based data processing method according to the second aspect of the embodiment of the present invention;
at least two of the blockchain nodes include a data acquisition device, and are configured to implement the blockchain-based data processing method according to the third aspect of the embodiment of the present invention.
In an eighth aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:
one or more processors;
storage means for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement the method for processing data based on a blockchain according to any embodiment of the present invention.
In a ninth aspect, an embodiment of the present invention further provides a computer storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the data processing method based on the blockchain provided in any embodiment of the present invention.
According to the embodiment of the invention, at least two pieces of data to be uplink linked are obtained from the data transmission devices deployed in different block chain nodes through the data verification device deployed in the block chain nodes, under the condition that all the data to be uplink linked are confirmed to have consistency, the data logic verification is carried out on the data to be uplink linked to obtain the logic verification result of the data to be uplink linked, the logic verification result obtained in all the block chain nodes is obtained, and under the condition that all the logic verification results are confirmed to be verification passing, the data to be uplink linked is confirmed to be the target uplink data, so that the data uplink is carried out after the safety of the data to be uplink linked is confirmed, the risks that the data is falsified and forged before uplink is avoided in the prior art, the reliability of the data before uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved.
Drawings
Fig. 1 is a flowchart of a data processing method based on a block chain according to an embodiment of the present invention.
Fig. 2 is a flowchart of a data processing method based on a block chain according to a second embodiment of the present invention.
Fig. 3 is a flowchart of a data processing method based on a block chain according to a third embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a data verification apparatus according to a fourth embodiment of the present invention.
Fig. 5 is a schematic structural diagram of a data transmission device according to a fifth embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a data acquisition device according to a sixth embodiment of the present invention.
Fig. 7 is a schematic structural diagram of a blockchain network according to a seventh embodiment of the present invention.
Fig. 8 is a logic diagram of a block chain network workflow according to a seventh embodiment of the present invention.
Fig. 9 is a schematic structural diagram of a computer device according to an eighth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention.
It should be further noted that, for the convenience of description, only some but not all of the relevant aspects of the present invention are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Example one
Fig. 1 is a flowchart of a data processing method based on a blockchain according to an embodiment of the present invention, where the present embodiment is applicable to a case of uplink data after confirming security of data to be uplink, and the method can be performed by a data verification apparatus provided in an embodiment of the present invention, and the apparatus can be implemented by software and/or hardware, and can be generally integrated in a computer device, for example, a blockchain node. Accordingly, as shown in fig. 1, the method comprises the following operations:
s110, at least two pieces of data to be uplink are obtained.
Wherein, each data to be uplink comes from the data transmission device in different block chain nodes.
Specifically, the data verification device may be a device deployed in each blockchain node of the blockchain network, and the data verification devices in each blockchain node are independent from each other and may be used to verify whether uplink data to be acquired by the blockchain node is tampered or forged in the transmission process. The data transmission device may be a device independently deployed in any at least two blockchain nodes of the blockchain network, and the data transmission devices deployed in different blockchain nodes are independent of each other and may be used to transmit the data to be uplink to the data verification device. The data to be uplinked may be data to be verified that needs to be written to each blockchain node of the blockchain network.
Correspondingly, each block chain node of the block chain network is provided with a data verification device, part or all of the block chain nodes can be provided with a data transmission device, and the same block chain network needs at least two block chain nodes provided with data transmission devices. Each data transmission device can transmit the data to be uplink to the data verification device of each block chain node, and any data verification device can receive at least two data to be uplink transmitted by at least two data transmission devices.
In an optional embodiment of the present invention, the acquiring at least two copies of to-be-uplink data may include: receiving target transmission data sent by each data transmission device, and acquiring identification data of each data transmission device; under the condition that the identity identification data are determined to be legal, acquiring transmission signature data and transmission verification data of the target transmission data; and decrypting each piece of to-be-uplink data in each piece of target transmission data under the condition that each piece of target transmission data is determined to be reliable according to each piece of transmission signature data and each piece of transmission verification data is determined to be legal.
The target transmission data may be data transmitted from the data transmission device to the data verification device. The identification data may be data that uniquely identifies the data transfer device. The validity of the identification data can indicate that the data transmission device uniquely identified by the identification data can be used as a safe source of the data to be uplink. The transmission signature data may be a digital signature that the data transmission apparatus adds to the target transmission data before transmitting the target transmission data. The transmission verification data may be verification data that the data transmission apparatus adds to the target transmission data before transmitting the target transmission data according to negotiation with the data verification apparatus. The reliability of the target transmission data may mean that it can be determined from the transmission signature data that the target transmission data has not been tampered with. The transmission of the authentication data may be legal, which means that the transmission of the authentication data is agreed with the negotiation of the data transmission apparatus and the data authentication apparatus.
Specifically, when the data transmission device needs to transmit the data to be uplink-linked to the data verification device, the data transmission device can generate target transmission data according to the data to be uplink-linked, so that the data to be uplink-linked can be transmitted to the data verification device by sending the target transmission data to the data verification device. In order to ensure security of data during transmission between the data transmission device and the data verification device, the data transmission device may add transmission verification data to the target transmission data before sending the target transmission data. The transmission verification data may be determined by negotiation between the data transmission device and the data verification device, may be determined by negotiation between the data transmission device and the data verification device in real time before the data transmission device sends the target transmission data, or may be periodically negotiated between the data transmission device and the data verification device to periodically update the transmission verification data, which is not limited herein. The data transmission apparatus may further add transmission signature data to the target transmission data to which the transmission verification data is added, to encrypt it, before transmitting the target transmission data. The specific method for adding the transmission signature data to the target transmission data may include any available digital signature technology, and is not limited herein.
Accordingly, the data verification device may receive the target transmission data sent by the data transmission device, and the data verification device needs to establish a communication relationship with the data transmission device, so as to obtain the identification data of the data transmission device. The identity of the data transmission device can be determined through the identity identification data, so that whether the data transmission device is a data transmission device normally deployed in a blockchain node of a blockchain network can be judged. Alternatively, the identification data may include an IP (Internet Protocol Address) Address and/or a MAC (Media Access Control) Address of the data transmission device.
Further, under the condition that the identification data of the data transmission device is determined to be legal, the data transmission device sending the target transmission data can be determined to have safety, and then the data verification device can further acquire the transmission signature data and the transmission verification data of the target transmission data. Based on the digital signature technology, the data verification device can verify whether the target transmission data is sent by the data transmission device according to the transmission signature data and is not tampered in the transmission process, and if so, the target transmission data can be determined to be reliable. Based on the transmission verification data negotiated with the data transmission device in advance, the data verification device may verify whether the transmission verification data of the target transmission data is consistent with the negotiation determination, and if so, may determine that the transmission verification data is legitimate. Therefore, under the condition that the target transmission data is determined to be reliable according to the transmission signature data and the transmission verification data is determined to be legal, the target transmission data can be determined not to be tampered in the process of being sent to the data verification device by the data transmission device, and the to-be-uplink data can be further decrypted in the target transmission data. The specific method for decrypting the to-be-uplink data in the target transmission data may correspond to an encryption processing method adopted when the to-be-uplink data generates the target transmission data, and is not limited herein.
In an optional embodiment of the present invention, after acquiring at least two copies of to-be-uplink data, the method may further include: and writing the data to be uplinked into a verification partition of the blockchain node.
The verification partition may be a storage area in the block link point for storing to-be-verified uplink data.
Correspondingly, the verification partition may be a storage area previously deployed in the blockchain node, and may be accessed by the data verification apparatus for reading and writing data. After the data to be uplink is acquired, in order to avoid the risk of tampering after the data to be uplink is acquired, the data verification device can write the data to be uplink into the verification partition of the block link point through the data contract, so that the written data to be uplink can be read and further verified after the data to be uplink is written into the verification partition.
And S120, under the condition that all the data to be uplink linked are determined to have consistency, performing data logic verification on any data to be uplink linked to obtain a logic verification result of the data to be uplink linked.
Where consistency may be an attribute that describes data consistency. Data logic verification may be an operation to verify whether data satisfies logic that it has not been tampered with or forged. The logical verification result may be a result describing whether the to-be-uplink data passes the data logical verification, and may describe whether the to-be-uplink data satisfies the logic satisfied by the data that is not tampered or forged, that is, may describe whether the to-be-uplink data is not tampered or forged.
Correspondingly, the data verification device can compare the at least two acquired data to be uplink, so as to judge whether all the data to be uplink have consistency. Under the condition that it is determined that all the to-be-uplink data are consistent, it can be shown that the to-be-uplink data acquired from the data transmission devices in different blockchain nodes are consistent, and if any to-be-uplink data can mutually verify that no data change occurs in the transmission process of the to-be-uplink data in the data transmission device, no fault or tampering or counterfeiting of the to-be-uplink data occurs in any verification data transmission device.
Further, under the condition that the data to be uplink are determined to have consistency, data logic verification can be performed on any one piece of data to be uplink. Specifically, the logic that the to-be-uplink data meets without being tampered or forged may be predetermined according to the attribute of the service to which the to-be-uplink data belongs, so that the data logic verification is performed on the actually acquired to-be-uplink data according to the logic, and a further specific method for the data logic verification may be determined according to the attribute of the service to which the to-be-uplink data belongs, which is not limited herein. Under the condition that the data to be linked up is determined to meet the logic which is not tampered or forged through the data logic verification, the obtained logic verification result is verification passing; otherwise, the obtained logic verification result is verification failure.
Optionally, the to-be-uplink data may be data belonging to one or more services, and in an optional embodiment of the present invention, the to-be-uplink data may include a service identification identifier, and the data verification apparatus may obtain the to-be-uplink data corresponding to the same service according to the service identification identifier, and perform data logic verification on the part of the to-be-uplink data according to the attribute of the service. Optionally, after the data to be uplink corresponding to the same service is obtained, it may be further verified whether the data to be uplink corresponding to the same service includes all data that the service needs to acquire and store to the block chain network, and if so, data logic verification is performed on the part of the data to be uplink; otherwise, the data to be linked can be continuously acquired until all the data which need to be acquired and stored in the blockchain network of the service is completely acquired.
In an optional embodiment of the present invention, the performing data logic verification on any of the to-be-uplink data may include: acquiring mutual authentication data in the data to be uplink; acquiring preset mutual authentication logic data matched with the mutual authentication data; and performing data logic verification on the mutual verification data according to the preset mutual verification logic data.
Wherein the mutual authentication data may be at least two data that may have a specific logical relationship without being tampered or forged. The preset mutual authentication logical data may be data describing a specific logical relationship between the mutual authentication data without being tampered or falsified.
Correspondingly, according to the specific logical relationship between the to-be-uplink data determined by the service attributes under the condition that the to-be-uplink data is not tampered or forged, the mutual authentication data in the to-be-uplink data and the corresponding preset mutual authentication logical data can be predetermined, and then the mutual authentication data in the to-be-uplink data can be subjected to data logical authentication by acquiring the mutual authentication data and the preset mutual authentication logical data.
For example, in the customer information uplink service of a bank, the data to be uplink may include a pair of mutual authentication data of a birthday and an age of a customer, the corresponding preset mutual authentication logical data may be data describing a relationship between the current time and the birthday data, and the age of the customer may be calculated according to the description of the preset mutual authentication logical data and the birthday data, and compared with the obtained age data, so as to implement mutual authentication between the birthday data and the age data. The data to be linked may further include identity card information data of the client and a pair of mutual authentication data associated with the collected legal filing information data, and the corresponding preset mutual authentication logic data may be data describing a relationship between the identity card information data and the legal filing information data, and the two are compared with each other, so that mutual authentication between the data can also be achieved.
In an optional embodiment of the present invention, the performing data logic verification on any of the to-be-uplink data may include: acquiring preset evidence chain data matched with the data to be linked; and performing data logic verification on the data to be linked according to the preset evidence chain data.
The preset evidence chain data may be data of an evidence chain formed by preset data to be uplink according to the service attribute without being tampered or forged.
Correspondingly, the evidence chain formed under the condition that the data to be uplink is not tampered or forged, which is determined according to the service attribute, can predetermine the preset evidence chain data of the data to be uplink, and then the data logic verification can be performed on the data to be uplink through the description of the preset evidence chain data.
For example, in the above example of the customer information uplink service of the bank, data logic verification may be performed on to-be-uplink data generated by information recorded in a customer money-drawing scenario, specifically, the preset evidence chain data may describe an evidence chain formed by customer identity information card information, customer face information, customer signature information, protocol information and time information required in the money-drawing scenario, so that whether the to-be-uplink data meets the complete logic of the evidence chain may be verified according to the preset evidence chain data.
Optionally, under the condition that it is determined that there is no consistency between any data to be uplink, it is determined that there is a security risk in the data to be uplink, and uplink of the data is ended.
S130, obtaining the logic verification results obtained from all the block chain nodes, and determining the data to be uplink as target uplink data under the condition that all the logic verification results are verified.
The target uplink data may be data to be uplink data, and the data that can be written into each blockchain node of the blockchain network is determined after verification by the data verification device.
Correspondingly, the data verification device in each blockchain node can perform data logic verification on the data to be uplink under the condition that the consistency of all the data to be uplink is determined and obtain a logic verification result, and through the blockchain network, the data verification device in any blockchain node can obtain the logic verification result obtained by the data verification device in all the blockchain nodes. When all the logic verification results are determined to be verified, it can be shown that the data verification device passing through each blockchain node can verify that the to-be-uplink data meets the logic that the to-be-uplink data is not tampered or forged, that is, verify that the to-be-uplink data is not tampered or forged, and therefore, the to-be-uplink data can be determined as the target uplink data to be written into each blockchain node of the blockchain network.
In an optional embodiment of the present invention, after determining the data to be uplink data as target uplink data, the method may further include: and performing encapsulation and packaging processing on all target uplink data corresponding to the same service, and writing the data into each block chain node of the block chain network.
Correspondingly, for all the target uplink data of the same service, the data can be written into the blockchain node after being packaged and packaged, so that the complete data of the service is stored in the blockchain network. Any realizable method may be adopted for the packaging and packaging process, again without limitation.
Optionally, the encapsulating and packaging all the target uplink data corresponding to the same service, and writing the encapsulated and packaged target uplink data into each block chain node of the block chain network may include: and packaging all the target uplink data corresponding to the same service, and writing the data into the formal subarea in each block chain node.
The formal partition may be a storage region in the block link point for storing the target uplink data, and may be a storage region distinguishable from the verification partition. Accordingly, the formal partition may be a storage area previously deployed in the blockchain node, and may be written with data by the data verification apparatus. After all target uplink data corresponding to any service are obtained and encapsulated and packaged, the target uplink data can be written into a formal partition of a block chain node to complete uplink operation of the target uplink data.
Optionally, when the logical verification result obtained by any blockchain node is a verification failure, it is determined that the data to be uplink has a security risk, and the data uplink is ended.
The embodiment of the invention provides a data processing method based on a block chain, which obtains at least two pieces of data to be uplink from data transmission devices deployed in different block chain nodes through a data verification device deployed in a block chain node, and under the condition of determining that all the data to be uplink have consistency, performing data logic verification on the data to be uplink transmitted to obtain a logic verification result of the data to be uplink transmitted, and obtaining logic verification results obtained in all blockchain nodes, determining the data to be uplink as the target uplink data under the condition that all the logic verification results are verified, the method and the device have the advantages that the data uplink is carried out after the security of the data to be uplink is confirmed, the risks that the data are falsified and forged before the data are uplink in the prior art are avoided, the reliability of the data before the data are uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved.
Example two
Fig. 2 is a flowchart of a data processing method based on a blockchain according to a second embodiment of the present invention, where this embodiment is applicable to a case where data transmission is performed after security of data to be transmitted is confirmed, and the method may be executed by a data transmission apparatus according to a second embodiment of the present invention, where the apparatus may be implemented by software and/or hardware, and may be generally integrated in a computer device, for example, a blockchain node. Accordingly, as shown in fig. 2, the method includes the following operations:
s210, receiving data to be transmitted sent by the target data acquisition device according to the preset binding relationship.
The data acquisition devices may be devices deployed in any at least two blockchain nodes of the blockchain network, and the data acquisition devices deployed in different blockchain nodes are independent of each other. The data acquisition device and the data transmission device can be deployed at the same block chain node point or different block chain nodes, data transmission can be performed between the data acquisition device and the data transmission device, and the data acquisition device can acquire data to be transmitted and send the data to the data transmission device. The preset binding relationship may be a binding relationship between the data acquisition device and the data transmission device that is preset. The data to be transmitted may be data that needs to be transmitted to the data verification device by the data transmission device. It should be noted that the data transmission device and the data verification device in the embodiment of the present invention may respectively implement the methods implemented by the data transmission device and the data verification device in any embodiment of the present invention, and obtain corresponding beneficial effects.
Correspondingly, the data transmission devices and the data acquisition devices deployed in the same or different block link points in the same block chain network may be bound by a preset binding relationship, which may be one-to-one binding or one-to-many binding, and is not limited herein. Optionally, the binding relationship may be established through information such as an IP address and/or a MAC address. After the data acquisition device acquires the data to be transmitted, the data acquisition device can send the data to be transmitted to the data transmission device having a preset binding relationship with the data acquisition device. Therefore, the data transmission device can receive the data to be transmitted sent by the data acquisition device with the preset binding relationship according to the preset binding relationship. The data acquisition device and the data transmission device can confirm the safety of each other in the data transmission process by presetting the binding relationship, and the communication opposite terminal which does not have the preset binding relationship with the data acquisition device does not carry out any data transmission.
Optionally, the data acquisition devices and the data transmission devices deployed in the same blockchain network may have a one-to-one mapping preset binding relationship.
And S220, acquiring the acquired signature data of the data to be transmitted.
The collected signature data may be a digital signature added to the data to be transmitted by the data collection device before the data to be transmitted is sent.
Correspondingly, in order to ensure the security of the data to be transmitted in the transmission process between the data acquisition device and the data transmission device, the data acquisition device can add acquisition signature data to the data to be transmitted before sending the data to be transmitted so as to encrypt the data. The specific method for adding the collected signature data to the data to be transmitted may include any realizable digital signature technology, and is not limited herein. The acquired signature data and the data to be transmitted can be sent to the data transmission device together, the data transmission device acquires the acquired signature data of the data to be transmitted, and the acquired signature data can be verified based on the adopted digital signature technology, so that whether the data to be transmitted is tampered in the process of being sent to the data transmission device by the data acquisition device is determined according to the verification result of the acquired signature data.
And S230, adding transmission verification data into the data to be transmitted under the condition that the data to be transmitted is determined to be reliable according to the acquired signature data, and performing transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data.
Wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device. The transmission signature process may be an operation of adding transmission signature data to data.
Correspondingly, if the data transmission device can determine that the data to be transmitted is not tampered according to the acquired signature data, that is, the data to be transmitted is determined to be reliable, the data transmission device can further process the data to be transmitted so as to generate target transmission data according to the data to be transmitted and send the target transmission data to the data verification device. Specifically, according to negotiation with the data acquisition device, the data transmission device may acquire transmission verification data and add the transmission verification data to the data to be transmitted, and further, perform transmission signature processing on the data to be transmitted and the transmission verification device to generate transmission signature data that can be verified by the data verification device in the data to be transmitted, thereby obtaining target transmission data.
And S240, sending the target transmission data to data verification devices of all the block chain nodes.
Correspondingly, the data transmission device can send the target transmission data to the data verification device, so that after the data verification device receives the target transmission data, the data transmission device can verify the safety of the target transmission data in the process of sending the target transmission data to the data verification device according to the transmission signature data and the transmission verification data of the target transmission data, and after the safety of the target transmission data is determined, the data to be linked is obtained through the target transmission data.
The embodiment of the invention provides a data processing method based on a block chain, which obtains at least two pieces of data to be uplink from data transmission devices deployed in different block chain nodes through a data verification device deployed in a block chain node, and under the condition of determining that all the data to be uplink have consistency, performing data logic verification on the data to be uplink transmitted to obtain a logic verification result of the data to be uplink transmitted, and obtaining logic verification results obtained in all blockchain nodes, determining the data to be uplink as the target uplink data under the condition that all the logic verification results are verified, the method and the device have the advantages that the data uplink is carried out after the safety of the data to be uplink is confirmed, the risks that the data are falsified and forged before the data are uplink in the prior art are avoided, the reliability of the data before the data are uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved; furthermore, the data to be transmitted sent by the data acquisition device with safe identity is verified in safety through the data transmission device, and the data to be transmitted which passes the verification is encrypted again, so that the safety of the data in the process of being sent by the data acquisition device and sent to the data verification device through the data transmission device is ensured, the reliability of the data before chaining in the block chain network is further improved, and the data reliability of the whole block chain network is improved.
EXAMPLE III
Fig. 3 is a flowchart of a data processing method based on a blockchain according to a third embodiment of the present invention, where the present embodiment is applicable to a case where the acquired data is sent to a data transmission device after the security of the acquired data is confirmed, and the method may be executed by a data acquisition device according to the third embodiment of the present invention, where the data acquisition device may be implemented by software and/or hardware, and may be generally integrated in a computer device, for example, a blockchain node. Accordingly, as shown in fig. 3, the method includes the following operations:
and S310, acquiring target acquisition data.
The target collected data may be data that needs to be collected by the data collecting device. It should be noted that the data acquisition device, the data transmission device, and the data verification device in the embodiments of the present invention may respectively implement the methods implemented by the data acquisition device, the data transmission device, and the data verification device in any embodiments of the present invention, and obtain corresponding beneficial effects.
Correspondingly, the data acquisition device is deployed in the blockchain node and can be used for acquiring data, so that the acquired data is finally written into the blockchain node through verification to complete data chaining. According to the data needing to be collected and linked, the data collection device can be correspondingly configured, and then the data collection device can obtain target collection data from a data source.
Optionally, the data may be acquired according to data to be acquired, and the data acquisition device may be docked with a device in the service system and complete corresponding configuration, so that the data acquisition device may acquire data in the service system to acquire target acquisition data. Specifically, according to different service scenes and data types, the equipment for butting the data acquisition devices can be determined. In an exemplary situation of bank counter business transaction, signature information of a client is collected, and a data collection device can be connected with an electronic signature device and complete corresponding configuration; the image of the identity card information and the face image information of the client are collected, and the data collection device can be connected with a high-speed shooting instrument and complete corresponding configuration.
It should be noted that, for the same target collected data, the data can be acquired by at least two data collecting devices; meanwhile, all the target acquisition data corresponding to the same service can be acquired by the same at least two data acquisition devices, or can be acquired by cooperation of a plurality of data acquisition devices. Illustratively, for the same business entity a, including three attribute data E1, E2, and E3, the data collection devices include L1, L2, L3, L4, L5, and L6, the collection may be completed in a cooperative manner, for example, it may be that L1 and L2 collect E1, L3 and L4 collect E2, and L5 and L6 collect E3, and it is ensured that each attribute data is obtained by at least two data collection devices; the data acquisition devices L1, L2, L3, L4, L5 and L6 can also acquire three attribute data of E1, E2 and E3.
Optionally, after acquiring the target acquisition data, the method may further include: acquiring a service identification mark according to the service to which the target acquisition data belongs; and marking the target acquisition data according to the service identification mark.
Correspondingly, according to the service to which the target acquisition data belongs, the service identification mark of the service can be acquired, so that the target acquisition data is marked according to the service identification mark, and in the process of performing subsequent verification on the target acquisition data, the service to which the target acquisition data belongs can be determined according to the marked service identification mark, so that whether the data corresponding to the service is completely acquired can be verified, the attribute of the service can be acquired, and the data can be verified according to the service attribute.
S320, according to preset configuration data, carrying out data configuration verification on the target acquisition data to obtain a configuration verification result of the target acquisition data.
The preset configuration data may be data describing a configuration of the data acquisition device, and may include data describing an attribute of data that needs to be acquired by the data acquisition device. The data configuration verification may be an operation of verifying whether the target collected data satisfies the description of the preset configuration data. The configuration verification result may be a result of performing data configuration verification on the target collected data, and may describe whether the target collected data meets the description of the preset configuration data.
Correspondingly, the data acquisition device is configured according to the data to be acquired and linked, the preset configuration data of the data acquisition device can be generated, and the preset configuration data can include the description of the attribute of the data to be acquired and linked.
Optionally, the preset configuration data may be configured according to the device of the service system to which the data acquisition device is accessed, the service scenario to which the data to be acquired belongs, and the data type. Specifically, the data collection device may be configured according to at least one of attribute information, data format information, data dictionary information, data collection frequency information, data aging information, data collection mode, and data collection corresponding device information of the collected data entity.
Further, after the data acquisition device acquires the target acquisition data, the data acquisition device may perform data configuration verification on the target acquisition data according to preset configuration data, and verify whether the acquired target acquisition data meets the attribute of the data which needs to be acquired and linked, so as to obtain a configuration verification result of the target acquisition data. Under the condition that the target acquisition data is determined to meet the description of the preset configuration data, it can be shown that the target acquisition data acquired by the data acquisition device can be used as data to be acquired and linked for subsequent verification and transmission, and then the configuration verification result is determined to be passed through verification. For example, data configuration verification may be performed on the target collected data according to a preset data format, configuration data such as a data dictionary, and the like.
S330, under the condition that the configuration verification result is confirmed to be verified, encrypting the target acquisition data and acquiring a signature to obtain the data to be transmitted.
The encryption process may be an operation of encrypting the target acquisition data in any form. The acquisition signature process may be an operation of adding acquisition signature data to target acquisition data.
Correspondingly, if the configuration verification result is confirmed to be verification passing, it can be shown that the target acquired data meets the description of the preset configuration data, and the target acquired data can be used as data needing to be acquired and linked for subsequent processing. In order to ensure the safety of the target collected data in the subsequent transmission process, the data collection device can perform encryption processing and signature collection processing on the target collected data before sending the target collected data to the data transmission device. The target collected Data may be encrypted by any Data Encryption method, for example, DES (Data Encryption Algorithm), 3DES (Triple Data Encryption Algorithm), SM4 block cipher Algorithm, and the like, which is not limited herein. The specific method for performing the acquisition signature processing on the encrypted target acquisition data may include any realizable digital signature technology implementation, which is not limited herein. The collected signature data added to the target collected data by the collected signature process may be verified by the data transmission apparatus that receives the data to determine whether the data is falsified in the transmission process according to the verification result of the collected signature data.
And S340, sending the data to be transmitted to a data transmission device according to a preset binding relationship.
Correspondingly, the data acquisition device can determine a data transmission device with a preset binding relationship according to the preset binding relationship, so that the generated data to be transmitted is sent to the data transmission device, the data transmission device receives the data to be transmitted according to the preset binding relationship, the data to be transmitted is further verified, the data to be transmitted with safety determined by verification is further processed, target transmission data is generated and sent to the data verification device for further verification, the target uplink data is acquired according to the data to be uplink with safety determined by verification, and data uplink is completed.
The embodiment of the invention provides a data processing method based on a block chain, which obtains at least two pieces of data to be uplink from data transmission devices deployed in different block chain nodes through a data verification device deployed in a block chain node, and under the condition of determining that all the data to be uplink have consistency, performing data logic verification on the data to be uplink transmitted to obtain a logic verification result of the data to be uplink transmitted, and obtaining logic verification results obtained in all blockchain nodes, determining the data to be uplink as the target uplink data under the condition that all the logic verification results are verified, the method and the device have the advantages that the data uplink is carried out after the safety of the data to be uplink is confirmed, the risks that the data are falsified and forged before the data are uplink in the prior art are avoided, the reliability of the data before the data are uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved; furthermore, at least two pieces of target acquisition data are acquired through the data acquisition device, the acquired target acquisition data are verified, the target acquisition data passing verification are transmitted after being safely processed, the safety of the data in the process of being acquired by the data acquisition device and being sent to the data transmission device is ensured, the safety monitoring from data acquisition to the final uplink process is realized, the reliability of data before uplink in the block chain network is further improved, and the data reliability of the whole block chain network is improved.
Example four
Fig. 4 is a schematic structural diagram of a data verification apparatus according to a fourth embodiment of the present invention, as shown in fig. 4, the apparatus may be configured at a blockchain node, and includes: a pending uplink data acquisition module 410, a data logic verification module 420, and an uplink data determination module 430.
The to-be-uplink data obtaining module 410 is configured to obtain at least two pieces of to-be-uplink data; wherein, each data to be uplink comes from the data transmission device in different block chain nodes.
A data logic verification module 420, configured to perform data logic verification on the to-be-uplink data to obtain a logic verification result of the to-be-uplink data when it is determined that all the to-be-uplink data have consistency.
A uplink data determining module 430, configured to obtain the logical verification results obtained in all the block chain nodes, and determine the data to be uplink as target uplink data when all the logical verification results are verified.
In an optional implementation manner of the embodiment of the present invention, the to-be-uplink data obtaining module 410 may be specifically configured to: receiving target transmission data sent by each data transmission device, and acquiring identification data of each data transmission device; under the condition that the identity identification data are determined to be legal, acquiring transmission signature data and transmission verification data of the target transmission data; and decrypting each piece of to-be-uplink data in each piece of target transmission data under the condition that each piece of target transmission data is determined to be reliable according to each piece of transmission signature data and each piece of transmission verification data is determined to be legal.
The device can execute any data processing method based on the block chain provided by the first embodiment of the invention, and has corresponding functional modules and beneficial effects for executing the method.
The embodiment of the invention provides a data verification device, which obtains at least two pieces of data to be uplink from data transmission devices deployed in different block chain nodes through the data verification device deployed in the block chain nodes, and under the condition of determining that all the data to be uplink have consistency, performing data logic verification on the data to be uplink transmitted to obtain a logic verification result of the data to be uplink transmitted, and obtaining logic verification results obtained in all blockchain nodes, determining the data to be uplink as the target uplink data under the condition that all the logic verification results are verified, the method and the device have the advantages that the data uplink is carried out after the security of the data to be uplink is confirmed, the risks that the data are falsified and forged before the data are uplink in the prior art are avoided, the reliability of the data before the data are uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved.
EXAMPLE five
Fig. 5 is a schematic structural diagram of a data transmission apparatus according to a fifth embodiment of the present invention, and as shown in fig. 5, the apparatus may be configured at a blockchain node, and includes: a to-be-transmitted data receiving module 510, an acquired signature acquiring module 520, a transmission data generating module 530 and a transmission data sending module 540.
The data receiving module 510 is configured to receive data to be transmitted, which is sent by a target data acquisition device, according to a preset binding relationship.
And an acquisition signature acquiring module 520, configured to acquire acquisition signature data of the data to be transmitted.
The transmission data generating module 530 is configured to add transmission verification data to the data to be transmitted under the condition that it is determined that the data to be transmitted is reliable according to the acquired signature data, and perform transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data.
A transmission data sending module 540, configured to send the target transmission data to data verification apparatuses of all the blockchain nodes.
Wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device.
The device can execute any data processing method based on the block chain provided by the second embodiment of the invention, and has corresponding functional modules and beneficial effects for executing the method.
The embodiment of the invention provides a data verification device, which obtains at least two pieces of data to be uplink from data transmission devices deployed in different block chain nodes through the data verification device deployed in the block chain nodes, and under the condition of determining that all the data to be uplink have consistency, performing data logic verification on the data to be uplink transmitted to obtain a logic verification result of the data to be uplink transmitted, and obtaining logic verification results obtained in all blockchain nodes, determining the data to be uplink as the target uplink data under the condition that all the logic verification results are verified, the method and the device have the advantages that the data uplink is carried out after the safety of the data to be uplink is confirmed, the risks that the data are falsified and forged before the data are uplink in the prior art are avoided, the reliability of the data before the data are uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved; furthermore, the data to be transmitted sent by the data acquisition device with safe identity is verified in safety through the data transmission device, and the data to be transmitted which passes the verification is encrypted again, so that the safety of the data in the process of being sent by the data acquisition device and sent to the data verification device through the data transmission device is ensured, the reliability of the data before chaining in the block chain network is further improved, and the data reliability of the whole block chain network is improved.
EXAMPLE six
Fig. 6 is a schematic structural diagram of a data acquisition device according to a sixth embodiment of the present invention, as shown in fig. 6, the device may be configured at a blockchain node, and includes: the device comprises a collected data acquisition module 610, a data configuration verification module 620, a to-be-transmitted data generation module 630 and a to-be-transmitted data sending module 640.
The collected data acquiring module 610 is configured to acquire target collected data.
And the data configuration verification module 620 is configured to perform data configuration verification on the target acquired data according to preset configuration data to obtain a configuration verification result of the target acquired data.
And a to-be-transmitted data generating module 630, configured to, when it is determined that the configuration verification result is that verification passes, perform encryption processing and signature acquisition processing on the target acquired data to obtain to-be-transmitted data.
And a to-be-transmitted data sending module 640, configured to send the to-be-transmitted data to a data transmission apparatus according to a preset binding relationship.
The device can execute any data processing method based on the block chain provided by the third embodiment of the invention, and has corresponding functional modules and beneficial effects for executing the method.
The embodiment of the invention provides a data verification device, which obtains at least two pieces of data to be uplink from data transmission devices deployed in different block chain nodes through the data verification device deployed in the block chain nodes, and under the condition of determining that all the data to be uplink have consistency, performing data logic verification on the data to be uplink transmitted to obtain a logic verification result of the data to be uplink transmitted, and obtaining logic verification results obtained in all blockchain nodes, determining the data to be uplink as the target uplink data under the condition that all the logic verification results are verified, the method and the device have the advantages that the data uplink is carried out after the safety of the data to be uplink is confirmed, the risks that the data are falsified and forged before the data are uplink in the prior art are avoided, the reliability of the data before the data are uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved; furthermore, at least two pieces of target acquisition data are acquired through the data acquisition device, the acquired target acquisition data are verified, the target acquisition data passing verification are transmitted after being safely processed, the safety of the data in the process of being acquired by the data acquisition device and being sent to the data transmission device is ensured, the safety monitoring from data acquisition to the final uplink process is realized, the reliability of data before uplink in the block chain network is further improved, and the data reliability of the whole block chain network is improved.
EXAMPLE seven
Fig. 7 is a schematic structural diagram of a blockchain network according to a seventh embodiment of the present invention, where as shown in fig. 7, the blockchain network includes at least two blockchain nodes.
Each of the block chain nodes includes the data verification apparatus described in the fourth embodiment of the present invention, and is configured to implement any block chain-based data processing method described in the fourth embodiment of the present invention.
At least two of the blockchain nodes include the data transmission device according to the fifth embodiment of the present invention, and are used to implement any blockchain-based data processing method according to the second embodiment of the present invention.
At least two of the block chain nodes, including the data acquisition device according to the sixth embodiment of the present invention, are used to implement any block chain-based data processing method according to the third embodiment of the present invention.
Fig. 8 is a logic diagram of a work flow of a blockchain network according to a seventh embodiment of the present invention. As shown in fig. 8, the blockchain network may collect data through at least two data collection devices, and the data collection devices may verify the collected data and send the data to the data transmission device bound to the data collection devices one to one when it is determined that the collected data has security. The data transmission device can ensure the safety of the data in the process of transmitting the data to the data verification device after the data is sent by the data acquisition device. The data transmission device may send the data with security to each blockchain node of the blockchain network, where each node includes a data verification device, and may further perform verification processing on the data, and finally complete data uplink under the condition of ensuring the security of the data before uplink.
The embodiment of the invention provides a block chain network, at least two pieces of to-be-uplink data are obtained from data transmission devices deployed in different block chain nodes through a data verification device deployed in a block chain node, and under the condition that all the to-be-uplink data are determined to have consistency, performing data logic verification on the data to be uplink transmitted to obtain a logic verification result of the data to be uplink transmitted, and obtaining logic verification results obtained in all blockchain nodes, determining the data to be uplink as the target uplink data under the condition that all the logic verification results are verified, the method and the device have the advantages that the data uplink is carried out after the security of the data to be uplink is confirmed, the risks that the data are falsified and forged before the data are uplink in the prior art are avoided, the reliability of the data before the data are uplink in the block chain network is ensured, and the data reliability of the whole block chain network is improved.
Example eight
Fig. 9 is a schematic structural diagram of a computer device according to an eighth embodiment of the present invention. FIG. 9 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present invention. The computer device 12 shown in fig. 9 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present invention.
As shown in FIG. 9, computer device 12 is in the form of a general purpose computing device. The components of computer device 12 may include, but are not limited to: one or more processors 16, a memory 28, and a bus 18 that connects the various system components (including the memory 28 and the processors 16).
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 9, and commonly referred to as a "hard drive"). Although not shown in FIG. 9, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with computer device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, computer device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via network adapter 20. As shown, network adapter 20 communicates with the other modules of computer device 12 via bus 18. It should be appreciated that although not shown in FIG. 9, other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 16 executes various functional applications and data processing by running the program stored in the memory 28, so as to implement the data processing method based on the block chain provided by the embodiment of the present invention: acquiring at least two pieces of data to be uplink; wherein, each data to be uplink comes from the data transmission device in different block chain nodes respectively; under the condition that all the data to be uplink are determined to have consistency, performing data logic verification on any data to be uplink to obtain a logic verification result of the data to be uplink; and acquiring the logic verification results obtained in all the block chain nodes, and determining the data to be uplink as target uplink data under the condition that all the logic verification results are verified. Or:
receiving data to be transmitted sent by a target data acquisition device according to a preset binding relationship; acquiring acquired signature data of the data to be transmitted; adding transmission verification data into the data to be transmitted under the condition that the data to be transmitted is determined to be reliable according to the acquired signature data, and performing transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data; the target transmission data are sent to data verification devices of all the block chain nodes; wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device. Or:
acquiring target acquisition data; according to preset configuration data, carrying out data configuration verification on the target acquisition data to obtain a configuration verification result of the target acquisition data; under the condition that the configuration verification result is confirmed to be passed, carrying out encryption processing and signature acquisition processing on the target acquisition data to obtain data to be transmitted; and sending the data to be transmitted to a data transmission device according to a preset binding relationship.
Example nine
Ninth embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where when the computer program is executed by a processor, the data processing method based on a block chain according to the ninth embodiment of the present invention is implemented: acquiring at least two pieces of data to be uplink; wherein, each data to be uplink comes from the data transmission device in different block chain nodes respectively; under the condition that all the data to be uplink are determined to have consistency, performing data logic verification on any data to be uplink to obtain a logic verification result of the data to be uplink; and acquiring the logic verification results obtained in all the block chain nodes, and determining the data to be uplink as target uplink data under the condition that all the logic verification results are verified. Or:
receiving data to be transmitted sent by a target data acquisition device according to a preset binding relationship; acquiring acquired signature data of the data to be transmitted; adding transmission verification data into the data to be transmitted under the condition that the data to be transmitted is determined to be reliable according to the acquired signature data, and performing transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data; the target transmission data are sent to data verification devices of all the block chain nodes; wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device. Or:
acquiring target acquisition data; according to preset configuration data, carrying out data configuration verification on the target acquisition data to obtain a configuration verification result of the target acquisition data; under the condition that the configuration verification result is confirmed to be passed, carrying out encryption processing and signature acquisition processing on the target acquisition data to obtain data to be transmitted; and sending the data to be transmitted to a data transmission device according to a preset binding relationship.
Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or computer device. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A data processing method based on a block chain is characterized in that a data verification device applied to a block chain node comprises the following steps:
acquiring at least two pieces of data to be uplink; wherein, each data to be uplink comes from the data transmission device in different block chain nodes respectively;
under the condition that all the data to be uplink are determined to have consistency, performing data logic verification on any data to be uplink to obtain a logic verification result of the data to be uplink;
and acquiring the logic verification results obtained in all the block chain nodes, and determining the data to be uplink as target uplink data under the condition that all the logic verification results are verified.
2. The method of claim 1, wherein the obtaining at least two copies of data to be uplink comprises:
receiving target transmission data sent by each data transmission device, and acquiring identification data of each data transmission device;
under the condition that the identity identification data are determined to be legal, acquiring transmission signature data and transmission verification data of the target transmission data;
and decrypting each piece of to-be-uplink data in each piece of target transmission data under the condition that each piece of target transmission data is determined to be reliable according to each piece of transmission signature data and each piece of transmission verification data is determined to be legal.
3. A data processing method based on a block chain is characterized in that a data transmission device applied to a block chain node comprises the following steps:
receiving data to be transmitted sent by a target data acquisition device according to a preset binding relationship;
acquiring acquired signature data of the data to be transmitted;
adding transmission verification data into the data to be transmitted under the condition that the data to be transmitted is determined to be reliable according to the acquired signature data, and performing transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data;
the target transmission data are sent to data verification devices of all the block chain nodes;
wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device.
4. A data processing method based on a block chain is characterized in that a data acquisition device applied to a block chain node comprises the following steps:
acquiring target acquisition data;
according to preset configuration data, carrying out data configuration verification on the target acquisition data to obtain a configuration verification result of the target acquisition data;
under the condition that the configuration verification result is confirmed to be passed, carrying out encryption processing and signature acquisition processing on the target acquisition data to obtain data to be transmitted;
and sending the data to be transmitted to a data transmission device according to a preset binding relationship.
5. A data verification apparatus, configured at a blockchain node, comprising:
the data to be uplink-linked acquisition module is used for acquiring at least two data to be uplink-linked; wherein, each data to be uplink comes from the data transmission device in different block chain nodes respectively;
the data logic verification module is used for performing data logic verification on the data to be uplink-linked under the condition that all the data to be uplink-linked are determined to have consistency, so as to obtain a logic verification result of the data to be uplink-linked;
and the uplink data determining module is used for acquiring the logic verification results obtained from all the block chain nodes, and determining the data to be uplink as target uplink data under the condition that all the logic verification results are verified.
6. A data transmission apparatus, configured at a block chain node, comprising:
the data receiving module to be transmitted is used for receiving the data to be transmitted sent by the target data acquisition device according to the preset binding relationship;
the acquisition signature acquisition module is used for acquiring acquisition signature data of the data to be transmitted;
the transmission data generation module is used for adding transmission verification data into the data to be transmitted under the condition that the data to be transmitted is determined to be reliable according to the acquired signature data, and performing transmission signature processing on the data to be transmitted and the transmission verification data to obtain target transmission data;
the transmission data sending module is used for sending the target transmission data to the data verification devices of all the block chain nodes;
wherein the transmission verification data is obtained by the negotiation between the data transmission device and the data verification device.
7. A data acquisition device, configured at a blockchain node, comprising:
the acquisition module of the collected data, is used for obtaining the goal and gathering the data;
the data configuration verification module is used for performing data configuration verification on the target acquisition data according to preset configuration data to obtain a configuration verification result of the target acquisition data;
the data to be transmitted generating module is used for carrying out encryption processing and signature acquisition processing on the target acquisition data to obtain the data to be transmitted under the condition that the configuration verification result is confirmed to be verified;
and the data to be transmitted sending module is used for sending the data to be transmitted to the data transmission device according to the preset binding relationship.
8. A blockchain network comprising at least two blockchain nodes; wherein:
each of the blockchain nodes comprises a data verification device for implementing the blockchain-based data processing method according to claim 1 or 2;
at least two of said blockchain nodes comprising data transmission means for implementing the blockchain based data processing method of claim 3;
at least two of said blockchain nodes comprising data acquisition means for implementing the blockchain based data processing method of claim 4.
9. A computer device, characterized in that the computer device comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the blockchain-based data processing method of any one of claims 1-4.
10. A computer storage medium on which a computer program is stored which, when being executed by a processor, carries out a method of block chain based data processing according to any one of claims 1 to 4.
CN202111383666.6A 2021-11-22 2021-11-22 Data processing method, device, equipment, medium and block chain network Pending CN114065302A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111383666.6A CN114065302A (en) 2021-11-22 2021-11-22 Data processing method, device, equipment, medium and block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111383666.6A CN114065302A (en) 2021-11-22 2021-11-22 Data processing method, device, equipment, medium and block chain network

Publications (1)

Publication Number Publication Date
CN114065302A true CN114065302A (en) 2022-02-18

Family

ID=80278777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111383666.6A Pending CN114065302A (en) 2021-11-22 2021-11-22 Data processing method, device, equipment, medium and block chain network

Country Status (1)

Country Link
CN (1) CN114065302A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114218232A (en) * 2022-02-21 2022-03-22 浙商银行股份有限公司 Method and device for storing world state fragments based on increment barrel

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114218232A (en) * 2022-02-21 2022-03-22 浙商银行股份有限公司 Method and device for storing world state fragments based on increment barrel
CN114218232B (en) * 2022-02-21 2022-05-24 浙商银行股份有限公司 Method and device for storing world state fragments based on increment barrel

Similar Documents

Publication Publication Date Title
US10769628B2 (en) Transaction messaging
CN109743176B (en) POS terminal certificate updating method, server and POS terminal
CN110348853B (en) Block chain off-line transaction method and system based on identification authentication
CN111314274A (en) Vehicle-mounted terminal and center platform bidirectional authentication method and system
CN109978688A (en) The access control method and its contract generator and server of distributed common recognition system
CN107172056A (en) A kind of channel safety determines method, device, system, client and server
CN110084600B (en) Processing and verifying method, device, equipment and medium for resolution transaction request
CN112015769A (en) Data processing method and device, computer equipment and storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN113255014B (en) Data processing method based on block chain and related equipment
EP4092984A1 (en) Data processing method and apparatus, device and medium
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium
CN112261002B (en) Data interface docking method and device
CN112217636B (en) Data processing method and device based on block chain, computer equipment and medium
CN114065302A (en) Data processing method, device, equipment, medium and block chain network
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
CN110601836B (en) Key acquisition method, device, server and medium
CN115664659A (en) Method, device, equipment and medium for supervising blockchain transaction data
CN115225365A (en) Data secure transmission method, platform and system based on cryptographic algorithm
CN108390757A (en) Processing method of communication data, device, electronic equipment, program and medium
CN111753018B (en) E-letter method, system and computer equipment
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN111859351A (en) Method, system, server and storage medium for writing information into chip
CN112767147A (en) Creditor right information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination