CN118245458B - Shared data processing method, system, equipment and product based on block chain - Google Patents
Shared data processing method, system, equipment and product based on block chain Download PDFInfo
- Publication number
- CN118245458B CN118245458B CN202410675756.XA CN202410675756A CN118245458B CN 118245458 B CN118245458 B CN 118245458B CN 202410675756 A CN202410675756 A CN 202410675756A CN 118245458 B CN118245458 B CN 118245458B
- Authority
- CN
- China
- Prior art keywords
- data
- verification
- model
- preset
- target processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 38
- 238000012795 verification Methods 0.000 claims abstract description 402
- 238000012545 processing Methods 0.000 claims abstract description 247
- 238000001914 filtration Methods 0.000 claims abstract description 66
- 238000000034 method Methods 0.000 claims abstract description 55
- 238000007781 pre-processing Methods 0.000 claims abstract description 41
- 238000013524 data verification Methods 0.000 claims abstract description 40
- 238000007726 management method Methods 0.000 claims description 51
- 238000004590 computer program Methods 0.000 claims description 26
- 230000008569 process Effects 0.000 claims description 26
- 238000012552 review Methods 0.000 claims description 26
- 238000003860 storage Methods 0.000 claims description 16
- 238000010200 validation analysis Methods 0.000 claims description 10
- 238000012216 screening Methods 0.000 claims description 6
- 238000013473 artificial intelligence Methods 0.000 claims description 5
- 238000012360 testing method Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 9
- 238000012549 training Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 206010000117 Abnormal behaviour Diseases 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 3
- 238000012550 audit Methods 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013502 data validation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the disclosure relates to the technical field of computers, in particular to a shared data processing method based on a blockchain, which is applied to a verification terminal, wherein an account space of a blockchain network comprises a preprocessing space and a working space, and the processing method comprises the following steps: the method comprises the steps of obtaining data credentials to be verified from a preprocessing space, verifying the data credentials according to a preset credential processing program, obtaining shared data when the data credentials pass verification, determining a corresponding target processing model and a corresponding target processing mode according to the shared data and preset verification requirement data, inputting the shared data into the target processing model, performing cross-filtering processing on an output result of the target processing model according to the target processing mode, issuing the data credentials when the cross-filtering processing result meets preset data verification conditions, and writing the issued data credential information into a working space. By adopting the method, the verification accuracy of the shared data can be improved, and the verification cost can be saved.
Description
Technical Field
The present disclosure relates to the field of computer technology, and in particular, to a blockchain-based shared data processing method, system, computer device, computer program product, and storage medium.
Background
In the information-based society, data are regarded as resources and assets, and multiparty subjects (such as enterprises or multiparty subject trusted third party institutions) participating in sharing the data can realize data sharing in a data sharing mode, so that the data utilization value is improved, and the development of digital economy and sharing economy can be promoted.
The current data sharing mode generally constructs a unified data sharing platform for data sharing on the basis of an internal information system of each main body, and for sharing mass data, each main body needs to upload shared data through the data sharing platform for other main bodies to acquire and use. In order to ensure that the data uploaded to the sharing platform does not leak personal information, business confidentiality, or involve unfavorable disclosure of special property data, the data properties such as security, legitimacy and the like of the shared data are usually required to be verified, namely, the data are subjected to supervision and audit.
However, at present, for the verification mode of the shared data, manual verification is mostly adopted, and the uploaded shared data is manually consulted and verified one by one through a verifier, so that the problems of low verification accuracy and high verification cost exist.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a blockchain-based shared data processing method, system, computer device, computer program product, and storage medium that can improve the accuracy of shared data verification and reduce the verification cost.
In a first aspect, an embodiment of the present disclosure provides a blockchain-based shared data processing method applied to an authentication end, where an account space of a blockchain network includes a preprocessing space for access by the authentication end and a credential server, and a working space for access by any user end; the processing method comprises the following steps:
and acquiring the data certificate to be verified from the preprocessing space, wherein the data certificate is a data abstract certificate created by the certificate server according to the shared data application submitted by the data providing end.
And verifying the data certificate according to a preset certificate processing program.
And when the verification of the data certificate is passed, acquiring the shared data.
And determining a corresponding target processing model and a corresponding target processing mode according to the shared data and the preset verification requirement data, wherein the target processing model is managed and stored based on the block chain.
And inputting the shared data into a target processing model, and performing cross filtering processing on the output result of the target processing model according to the target processing mode.
When the result of the cross filtering processing accords with the preset data verification condition, issuing a data certificate, and writing the issued data certificate information into a working space so that the data request terminal can acquire shared data according to the issued data certificate information.
In some embodiments, the target processing model comprises a plurality of validation models, and the cross-filtering process comprises performing an AND operation, an OR operation, a NOT operation, or an XOR operation.
Cross filtering processing is carried out on the output result of the target processing model according to the target processing mode, and the cross filtering processing comprises the following steps: and performing AND operation, OR operation, non-operation or exclusive OR operation on the output results of the verification models according to the target processing mode so as to adaptively adjust the output results of the target processing models according to preset verification requirement data.
In some embodiments, the cross-filtering process includes a screening filtering process.
Cross filtering processing is carried out on the output result of the target processing model according to the target processing mode, and the cross filtering processing comprises the following steps: and screening and filtering the output result of the target processing model according to the target processing mode and the preset range value corresponding to the target processing mode.
In some embodiments, the data credential includes credential DID and credential declaration content, and verifying the data credential according to a preset credential handler may include: and verifying the credential declaration content according to a preset credential processing program.
The credential declaration content comprises summary information of the shared data, wherein the summary information comprises at least one of catalog information, introduction information and data table information of a database to which the shared data belongs.
In some embodiments, determining the corresponding target processing model and the corresponding target processing mode according to the shared data and the preset verification requirement data may include: according to the data type of the shared data, determining a target processing model from a plurality of preset verification models, and according to preset verification requirement data, determining a target processing mode for processing an output result of the target processing model from a plurality of preset processing modes.
In some embodiments, determining the corresponding target processing model according to the shared data and the preset verification requirement data includes: according to the data type of the shared data, determining a target initial verification model from a plurality of preset initial verification models, determining model verification parameters according to preset verification requirement data, and adjusting the parameters of the target initial verification model according to the model verification parameters to obtain a target processing model.
In some embodiments, the shared data is managed and stored by a database at the data provider. The processing method further comprises the following steps: and calling a preset data verification program, wherein the preset data verification program runs on a verification end or a data providing end.
The preset data verification program is used for: the method comprises the steps of determining a database according to data credentials, obtaining shared data from the database, determining a corresponding target processing model and a corresponding target processing mode according to the shared data and preset verification demand data, wherein the target processing model is managed and stored based on a blockchain, inputting the shared data into the target processing model, and performing cross filtering processing on an output result of the target processing model according to the target processing mode, wherein a preset data verification program runs at a verification end or a data providing end.
In some embodiments, the issued data credential information includes: the vouchers DID, vouchers declaration content, vouchers applicant DID, and issuers DID.
In some embodiments, the processing method may further include: and when the data certificate verification fails or the result of the cross filtering processing does not accord with the preset data verification condition, writing verification information into the working space for the data providing end or the data requesting end to acquire. Wherein the verification information comprises a certificate DID and a verification result description.
In some embodiments, the processing method may further include: the data acquisition providing end performs rechecking on the data credentials or shared data corresponding to the verification result description based on the rechecking request submitted by the verification result description to obtain a rechecking result, and writes the rechecking result into the working space for the data providing end to acquire.
The checking of the data credentials or shared data corresponding to the verification result description comprises the following steps: outputting corresponding data credentials or shared data for manual review, and obtaining a manual review result; or rechecking the data credentials or shared data corresponding to the verification result description according to a preset rechecking program to obtain a rechecking result.
In some embodiments, the preprocessing space is further used for being accessed by a data sharing management end, and the processing method further comprises: and acquiring the intelligent contract uploaded by the data sharing management end from the preprocessing space, verifying the intelligent contract, and deploying the intelligent contract into the working space when the verification of the intelligent contract is passed.
In a second aspect, embodiments of the present disclosure provide a blockchain-based data sharing system, wherein a ledger space of a blockchain network includes a preprocessing space for access by a validation side and a credential server side and a workspace for access by any user side, the system may include: the system comprises a data providing module, a credential service module, a verification module and a data request module.
The data providing module is used for the data providing end to submit the shared data application.
And the credential service module is used for the credential service end to create a data summary credential according to the shared data application submitted by the data providing end.
And the verification module is used for executing the steps of the processing method provided in any embodiment of the first aspect of the disclosure by the verification terminal.
The data request module is used for the data request terminal to acquire the shared data according to the issued data credential information.
In some embodiments, the preprocessing space is further for access by a data sharing manager, and the system further comprises a data sharing manager module for the data sharing manager to deploy the intelligent contract in the blockchain.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to perform uplink processing on a plurality of preset verification models according to the intelligent contract, so that the verification end or the data providing end can obtain the verification models from the blockchain. Wherein the plurality of verification models are artificial intelligence models.
In some embodiments, the data sharing management module is further configured to store, by the data sharing management end, a plurality of model files corresponding to a plurality of preset verification models into the blockchain according to the intelligent contract, or store, by the data sharing management end, access links and model file information of a plurality of model files corresponding to a plurality of preset verification models into the blockchain according to the intelligent contract.
The model file is model parameter data obtained after model training is verified, and the model file information comprises hash values, model version numbers, model names and/or model numbers of the model file.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to perform uplink processing on a preset multi-class processing manner according to the intelligent contract, so that the verification end or the data providing end can obtain the data from the blockchain.
The processing mode comprises setting a target output threshold value for the output result of any verification model and/or carrying out collective operation on the output results of a plurality of verification models.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to perform uplink processing on a plurality of preset verification policies according to the intelligent contract, so that the verification end or the data providing end can obtain the verification policies from the blockchain.
Any verification policy comprises a corresponding target processing model and a corresponding target processing mode, and corresponds to the data type of the shared data and preset verification requirement data.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to modify, compile and/or test the smart contract in the preprocessing space when the verification of the smart contract is not passed.
In a third aspect, embodiments of the present disclosure provide a blockchain-based shared data verification device, where a ledger space of a blockchain network includes a preprocessing space for access by a verification end and a credential server, and a workspace for access by any user end, the verification device may include: the system comprises a credential acquisition unit, a credential verification unit, a shared data acquisition unit, a shared data verification unit and a data credential issuing unit.
And the credential acquisition unit is used for acquiring the data credential to be verified from the preprocessing space. The data certificate is a data summary certificate created by the certificate server according to the shared data application submitted by the data provider, and comprises a certificate DID and a certificate declaration content.
And the certificate verification unit is used for verifying the data certificate according to a preset certificate processing program.
And the shared data acquisition unit is used for acquiring the shared data when the verification of the data certificate is passed.
The shared data verification unit is used for determining a corresponding target processing model and a corresponding target processing mode according to the shared data and preset verification requirement data, and verifying the shared data according to the target processing model and the target processing mode.
And the data credential issuing unit is used for issuing the data credential when the shared data passes the verification, and writing the issued data credential information into the working space so that the data request end can acquire the shared data according to the issued data credential information.
In a fourth aspect, embodiments of the present disclosure provide a computer program product comprising a computer program which, when executed by a processor, implements the steps of the processing method provided in any of the embodiments of the first aspect of the present disclosure.
In a fifth aspect, embodiments of the present disclosure provide a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the processing method provided in any of the embodiments of the first aspect of the present disclosure when the computer program is executed.
In a sixth aspect, embodiments of the present disclosure provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the processing method provided in any of the embodiments of the first aspect of the present disclosure.
According to the block chain-based shared data processing method, system, computer equipment, computer program product and storage medium, after the data credentials corresponding to the shared data pass through verification, the verification end determines a corresponding target processing model and a corresponding target processing mode according to the shared data and preset verification requirement data, the shared data is input into the target processing model, the output result of the target processing model is subjected to cross filtering processing according to the target processing mode, when the result of the cross filtering processing meets preset data verification conditions, the data credentials are issued, and the issued data credential information is written into a working space for the data request end to acquire the shared data according to the issued data credential information. By means of the two-level verification, the data credentials corresponding to the shared data and the shared data are verified successively, accuracy of a shared data verification result can be improved, the data verification is performed by using the model without manual one-by-one reference, verification efficiency and verification accuracy are improved, and verification cost is reduced. And the data certificate verification is preferentially carried out, so that compared with the mode of directly acquiring mass data for verification, the data transmission resource can be reduced.
In the process of verifying the shared data, the verification terminal determines a corresponding verification model and a corresponding processing mode to verify the data according to the shared data and preset verification requirement data, so that scenes of various types of shared data and various types of verification requirement data can be covered, and applicability of the verification terminal to the verification of the shared data is improved.
In addition, by setting the pre-processing space and the working space with different access rights in the account book space of the blockchain network, the data credentials to be verified are stored in the pre-processing space, after verification is passed, the issued data credential information is written into the working space, so that the data credentials to be verified can be prevented from being directly stored in the working space disclosed to all the user sides, unsafe data which are not verified or are not suitable for disclosure due to special properties are disclosed, and the safety of data sharing is improved.
Drawings
FIG. 1 is an application environment diagram of a processing method in some embodiments;
FIG. 2 is a flow chart of a processing method in some embodiments;
FIG. 3 is a flow diagram of steps involved in determining a model of target processing and a manner of target processing in some embodiments;
FIG. 4 is a flow diagram of steps involved in determining a target process model in some embodiments;
FIG. 5 is a flow diagram of a verification step involving review of requested data in some embodiments;
FIG. 6 is a flow diagram of a validation step involving a smart contract in some embodiments;
FIG. 7 is a block diagram of the architecture of a data sharing system in some embodiments;
FIG. 8 is a block diagram of an authentication device in some embodiments;
fig. 9 is an internal block diagram of a computer device in some embodiments.
Detailed Description
In order to make the technical scheme and advantages of the present disclosure more apparent, the embodiments of the present disclosure and related technical contents are further described in detail below with reference to the accompanying drawings and the description. It should be understood that the following description is only for illustrating the technical solutions of the embodiments of the present disclosure, and is not intended to limit more possible implementations of the present disclosure.
It is noted that the relational terms such as "first," "second," and the like, herein may be used solely to distinguish one from another article, state, or action without necessarily indicating, implying a relative importance or order relationship. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that the object that is included may not be limited to the objects listed herein. The term "plurality" or other variants are used to denote a number of objects of two or more.
In a first aspect, embodiments of the present disclosure provide a shared data processing method based on a blockchain. The method may be applied in an application environment as shown in fig. 1. The application environment may be a data sharing platform. The application environment includes a data provider 101, a credential server 102, a verifier 103, a blockchain network 104, and a data requester 105. The blockchain network 104 includes a plurality of blockchain nodes, and the data providing end 101, the credential service end 102, the verification end 103 and the data requesting end may be respectively connected to the blockchain nodes in the blockchain network 104 in a network manner, and perform data interaction. The credential server 102 is respectively connected to the data provider 101 and the verifier 103 via a network, and performs data interaction. The data provider 101, credential server 102, verifier 103, and data requester 105 may each be one or more computer devices.
The data provider 101 may be a device deployed or operated by a subject that performs data production or collection and provides data sharing, such as a device that may be deployed in a hospital for providing medical data. The data provider 101 includes a database for storing shared data, where the database is used to organize, store and manage data, and typically uses database software to provide services such as adding, deleting, modifying, or querying data, where a database may simultaneously create, manage, and maintain multiple database instances, where each database instance may include one or more data tables, where a structure of a data table is formed by a set of data elements, and where each data table may insert multiple data records.
The data requesting end 105 may be various types of devices that acquire or apply shared data, such as devices operated by individuals, organizations, institutions, etc.
The data provider 101 and the data requester 105 are each deployed with a data sharing agent (an application) through which data interaction with blockchain nodes in the blockchain network and with credential servers is achieved. The data sharing agent program is connected with one block chain node (access node) in the block chain network, and can perform data interaction with the access node through a set of intelligent contract interfaces which are designed and implemented in advance. The data sharing agent may interact with the credential server through an application access interface.
The credential service side 102 may include one or more credential service nodes for providing credential services, and in particular may be devices deployed or operated by a principal providing the credential services, which may be accessed by the data provider 101 and the verifier 103 to obtain the credential services.
The verification terminal 103 may be a device deployed or operated by a third party principal performing shared data verification, which is typically a principal commonly trusted by the parties performing the data sharing, for example, a device operated by a third party organization or organization commonly designated by the parties sharing the data. The verification terminal 103 performs verification on the shared data, specifically, may perform audit verification on the shared data, and determines whether the data to be verified (for example, credential data or shared data) meets the verification standard of the verification terminal.
Blockchain network 104 is a blockchain peer-to-peer network of distributed nodes, and blockchain network 104 includes a plurality of blockchain nodes for providing distributed storage and computing power, each node maintaining a ledger together through a common mechanism. The blockchain network 104 uses the alliance chain technology, specifically, the installation and deployment of the blockchain network can be completed by using an open source alliance chain FISCO BCOS (a blockchain bottom layer platform), then an open source component WeBASE (WeBank Blockchain Application Software Extension, a set of general components built between the blockchain application and FISCO BCOS nodes) is deployed, the intelligent contract program realized by design is compiled and deployed through a visual interface provided by WeBASE, and the data sharing agent program deployed at the data providing end 101 or the data requesting end 105 can complete the data interaction with the blockchain ledger through a contract calling interface provided by WeBASE.
The data provider 101, the credential server 102, the verifier 103, and the data requester 105 may each include one or more terminals, which may be, but are not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices.
It should be noted that the above-mentioned data providing end, data requesting end and verifying end are named according to the data operation performed by each user end in the application environment. When a user performs a data sharing operation by using a certain device, the device is regarded as a data providing end at the moment; when the device is used to perform shared data acquisition and use, at that point in time the device is considered a data requesting end; when this device is used to perform data verification operations, at this point in time, the device is considered the verification end. For example, a worker in a hospital can use a computer for data sharing, can acquire and use shared data, and can perform data verification. That is, the device corresponding to each user terminal in the application environment may be a data providing terminal, a data requesting terminal or a verification terminal.
Taking the example of the processing method applied to the validation side in fig. 1 as an example, in some embodiments, the ledger space of the blockchain network may include a preprocessing space for access by the validation side and the credential server, and a workspace for access by either user side. As shown in fig. 2, the blockchain-based shared data processing method includes steps S201 to S206 that the verification terminal can execute.
Step S201: and acquiring the data credentials to be verified.
Specifically, the verification terminal acquires a data credential to be verified from the preprocessing space.
The data certificate is a data abstract certificate created by the certificate server according to the shared data application submitted by the data provider.
As shown in fig. 2, the data providing terminal 101 performs step S211: and submitting a shared data application. The credential server 102 performs step S221 and step S222. Step S221: and creating a data summary credential according to the shared data application. Step S222: the data credentials are written to the preprocessing space.
The shared data application may include summary information of the shared data. The summary information may be mirrored summary information of the shared data database. The shared data may be data that is disclosed by the data providing end to other user ends and is acquired and used by other user ends, and the data type of the shared data may be text, picture, audio, video, etc., and there is no particular limitation on the data type, data content and data format of the shared data.
The data credentials may include credential DID and credential declaration content. The credential declaration content may include summary information of the shared data that the current issuing status of the credential is not issued. The credential DID may be a unique identity of the shared data, and in some cases, the summary information included in the credential declaration content may be a database name, database description information, a data table directory, a data table structure, a data storage amount, and the like of a database to which the shared data belongs.
In some specific embodiments, the credential server may provide DID (distributed digital identity) and VC (trusted credential) services, where the DID services may include identity DID registration, identity verification, identity query and update, etc., the VC services may include credential template services and credential services, the credential template services include registration, update and query of credential templates, and the credential services may include credential issuance and verification, issuance and verification of verifiable expressions supporting selective disclosure, etc. Specifically, the credential server encapsulates the shared data application information submitted by the data provider into a specific credential form by using a preset credential template through the credential template service, and generates credential declaration content, wherein the credential declaration content comprises abstract information of the shared data.
In yet other specific embodiments, the credential server may employ different credential templates to create data credentials for different types of shared data.
The data providing end and the information of the shared data application provided by the data providing end can be associated in a data credential mode, so that the true credibility of the shared data is improved.
Specifically, after creating the data credentials, the credential server writes the data credentials into the preprocessing space, and the verification end acquires the data credentials to be verified from the preprocessing space. In some examples, the credential server may also send the credential DID to the data provider for the data provider to query the credential verification progress and verification result based on the credential DID.
Step S202: and verifying the data certificate according to a preset certificate processing program.
The preset credential processing program may be an application program running on the verification end.
After the verification terminal obtains the data certificate, the certificate declaration content in the data certificate is verified through a preset certificate processing program, specifically, whether the content of abstract information in the data certificate is suitable for disclosure or not is verified, and a data certificate verification result is obtained.
Step S203: and when the verification of the data certificate is passed, acquiring the shared data.
And when the data credential verification result indicates that verification passes, the verification end acquires the shared data. In some embodiments, the shared data acquired by the verification terminal may be mirror image data of the shared data database.
Specifically, the data credential may include an address, identification information, or an access interface of the database, and the verification terminal may access the database storing the shared data according to the address, the identification information, or the access interface, so as to obtain the shared data.
Step S204: and determining a corresponding target processing model and a corresponding target processing mode according to the shared data and the preset verification requirement data.
The target processing model is managed and stored based on the blockchain, and the preset verification requirement data can be set by the verification terminal according to actual verification requirements. The target processing model may be a data validation model for validation review of data.
In some particular embodiments, the target processing model may include a multi-class verification model for verification review of data, which may include, for example, a data security review model, a special property data review model, and an abnormal behavior review model. Wherein the data security audit class model is used to verify whether the shared data violates personal information, user rights, business secrets, and the like. The special property data review model is used to review whether the shared data contains special property data, such as: preset proprietary data, protected health information, data that is not suitable for disclosure, etc. The abnormal behavior review model is used to review whether the shared data relates to preset unsafe behavior data, such as code that causes a system attack, or code data that links to an unsafe platform.
In some specific embodiments, the target processing model may be one or more verification models, and in a scenario where the target processing model is a plurality of verification models, the plurality of models may be a plurality of verification models of the same class (e.g., a plurality of data security censoring class models or a plurality of special property data censoring class models or a plurality of abnormal behavior censoring class models), or may be a plurality of verification models of different classes.
In some scenarios, different verification ends may have different verification requirement data for the same class of verification requirements of the same shared data. In some specific examples, different verification terminals may set verification requirement data according to respective verification criteria, for example, when the shared data is picture data and the verification requirement is verification of special property information, the verification criteria of the verification terminal a may be identified as a special property picture when the similarity with the target special property picture is greater than 80%, and the verification criteria of the verification terminal B may be identified as a special property picture when the similarity with the target special property picture is greater than 90%.
The verification model may be an artificial intelligence model for verifying the shared data, and the processing mode may be a mode of processing a result output by the verification model.
In some specific embodiments, the verification terminal may determine, according to a preset policy adaptation rule, a corresponding target processing model and a corresponding target processing mode according to the policy adaptation rule corresponding to the shared data and the preset verification requirement data.
In some specific embodiments, the target processing model may be determined according to the shared data, and the corresponding target processing mode may be determined according to the preset verification requirement data.
Step S205: and inputting the shared data into a target processing model, and performing cross filtering processing on the output result of the target processing model according to the target processing mode.
The verification terminal inputs the obtained shared data into a target processing model to obtain an output result of the target processing model, and further, cross-filtering processing is carried out on the output result according to a target processing mode. Cross-filtering results are obtained.
The cross-filtering process may include performing a cross-over or filtering operation on the results of a plurality of verification models, and may also include performing a filtering operation on the results of one verification model.
Step S206: and when the result of the cross filtering processing accords with a preset data verification condition, issuing a data certificate.
The preset data verification condition can be determined by the verification terminal in advance according to verification requirement data or other verification standard data, when the result of the cross filtering processing accords with the preset data verification condition, the shared data verification can be determined to pass, and the verification terminal issues the data certificate, namely, the data certificate endorsement.
Step S207: writing the issued data credential information into the workspace.
The issued data credential information may include a credential DID, credential declaration content, an applicant DID, and an issuer DID, and the verification side writes the issued data credential information into the workspace, so that the data request side obtains shared data according to the issued data credential information. Correspondingly, the issued data credential information can comprise an address, identification information or an access interface of the database, and the data request terminal can access the database storing the shared data according to the address, the identification information or the access interface so as to acquire the shared data.
In the above-mentioned shared data processing method based on the blockchain, after the verification end verifies the data credential corresponding to the shared data, then according to the shared data and the preset verification requirement data, determine the corresponding target processing model and the corresponding target processing mode, and verify the shared data according to the target processing model and the target processing mode, when the data credential is verified and the shared data is verified, issue the data credential, and write the issued data credential information into the working space, so that the data request end obtains the shared data according to the issued data credential information. By means of the two-stage verification, the data credentials corresponding to the shared data and the shared data are verified successively, accuracy of a shared data verification result can be improved, the data verification mode is utilized, manual one-by-one checking verification is not needed, verification efficiency and verification accuracy are improved, and verification cost is reduced. And the data certificate verification is preferentially carried out, so that compared with the mode of directly acquiring mass data for verification, the data transmission resource can be reduced.
In the process of verifying the shared data, the verification terminal determines a corresponding model and a corresponding processing mode for verification according to the shared data and preset verification requirement data to verify the data, so that scenes of various types of shared data and various types of verification requirement data can be covered, and the applicability of the verification terminal to the verification of the shared data is improved.
By performing cross filtering processing on the output result of the target processing model according to the target processing mode, when whether the shared data is safe or suitable for disclosure is judged by multi-model verification, the multi-model result can be subjected to cross filtering processing, so that the accuracy of the verification result is further improved, meanwhile, the verification result can cover multiple types of verification requirements, the verification result is comprehensively obtained more comprehensively, the safety of the shared data is improved, and the shared data is ensured to not comprise unsuitable disclosure.
In addition, by setting the pre-processing space and the working space with different access rights in the account book space of the blockchain network, the data credentials to be verified are stored in the pre-processing space, after verification is passed, the issued data credential information is written into the working space, so that the data credentials to be verified can be prevented from being directly stored in the working space disclosed to all the user sides, unsafe data which are not verified or are unsuitable for disclosure due to special properties are disclosed, and the safety of data sharing is improved.
Meanwhile, the block chain technology is utilized to verify the shared data, the uplink data has non-alterability, and the true credibility of the shared data can be improved.
In some specific embodiments, the target processing model is an artificial intelligence model. The data verification is performed by adopting the artificial intelligent model, so that the method is applicable to business scenes with large data volume or high concurrency rate, and meanwhile, the method has the advantages of high verification efficiency, difficulty in avoiding verification rules, high accuracy and the like through the artificial intelligent model verification.
In some specific embodiments, different access rights of the preprocessing space and the working space can be realized by using encryption technology, an access key is set in the preprocessing space, and key management is performed by a user side allowing access to obtain the access rights. The data node where the user terminal allowing access is located can be added into the network or the group by creating a specific network or the group in the blockchain network, so that the specific user terminal (such as a verification terminal and a credential service terminal) can access the preprocessing space.
In some embodiments, the target processing model comprises a plurality of validation models, and the cross-filtering process comprises performing an AND operation, an OR operation, a NOT operation, or an XOR operation.
Cross filtering processing is carried out on the output result of the target processing model according to the target processing mode, and the cross filtering processing comprises the following steps: and performing AND operation, OR operation, non-operation or exclusive OR operation on the output results of the verification models according to the target processing mode so as to adaptively adjust the output results of the target processing model according to the preset verification requirement data.
In particular, the target processing model may include a plurality of verification models, which may be homogeneous models or heterogeneous models, and the cross-filtering process may include performing logical operation operations on the output results of the verification models, such as and operations, or operations, non-operations, and exclusive or operations.
By further performing logical operation on the output result of the verification model, the suitability and flexibility between the output result of the model and preset verification requirement data can be improved.
In some specific scenarios, the validation requirements for shared data include both data security reviews and special property data reviews, and accordingly, the target processing model includes an a model for data security reviews and a B model for special property data reviews. The target processing mode is to perform AND operation on the output result of the model. At this time, after the shared data is input into the model a and the model B, the model a output result and the model B output result are obtained, respectively, and then the model a output result and the model B output result are subjected to and operation, so as to obtain the result of the cross filtering process. In some examples, the model output is considered to be 1 when it is empty, i.e., 1 when it is not empty, and 0 when it is verified by the model. Because the preset verification requirement data indicates that the A model and the B model are required to pass verification, correspondingly, the preset data verification condition is that the cross filtering processing result is 1. At this time, if the model a output result is 1, the model B output result is 0, and the result after the operation is 0, the result of the cross filtering processing does not conform to the preset data verification condition, and the verification is failed, if the model a output result is 1, the model B output result is 1, and the result after the operation is 1, the verification is passed.
In yet other specific scenarios, the verification of shared data needs to include only data security reviews, the data security class review models managed in the blockchain include multiple (e.g., a C model, a D model, and an E model), and the verification requirement data indicates that the verification can be considered to pass when the requirements of one of the data security class review models are met. Accordingly, the target processing model may include a C model, a D model, and an E model, and the target processing mode is to perform an or operation on an output result of the model. At this time, after the shared data are respectively input into the model C, the model D, and the model E, output results of the three models are respectively obtained, and then or operation is performed on the output result of the model a and the output result of the model B, so as to obtain a result of the cross filtering process. In some examples, the model output is considered to be 1 when it is empty, i.e., 1 when it is not empty, and 0 when it is verified by the model. At this time, if the output result of one of the models C, D, and E is 1, and correspondingly, or the result after the operation is 1, the result of the cross filtering process meets the preset data verification condition, and the verification is passed.
In some embodiments, the cross-filtering process includes a screening filtering process.
Cross filtering processing is carried out on the output result of the target processing model according to the target processing mode, and the cross filtering processing comprises the following steps: and screening and filtering the output result of the target processing model according to the target processing mode and the preset range value corresponding to the target processing mode.
Specifically, the target processing model may include 1 verification model, and the cross-filtering process may include filtering the output results of the verification models.
In some specific scenarios, the verification requirement on the shared data is that the picture data in the shared data cannot contain pictures with the similarity to the special character portrait of more than or equal to 90%, at this time, the target processing model may be used for identifying whether the picture sharing data relates to the special character portrait picture in the special property data inspection model, and the target processing mode filters the output result with the similarity of less than 90%. The target processing model defaults to take a picture with the similarity of more than 60 percent with a special character portrait picture as an output result of the model. After the shared data is input into the target processing model, a plurality of pictures with the similarity being more than or equal to 60% can be obtained, and further, the pictures with the similarity being less than 90% are filtered according to the target processing mode, so that a cross filtering processing result is obtained. Because the verification requirement is that pictures with the similarity being more than or equal to 90% cannot be contained, when the result of the cross filtering processing is an empty set, the preset data verification condition is met, and the verification is passed.
In some specific scenarios, the filtering may also output a plurality of top-ranked results after the model output results are ordered according to a specific rule.
In some embodiments, the data vouchers include vouchers DID and vouchers declaration content, step S202 may include: and verifying the credential declaration content according to a preset credential processing program. The credential declaration content may include summary information of the shared data, the summary information including at least one of catalog information, introduction information, and data sheet information of a database to which the shared data belongs.
The abstract information is used for introducing the basic situation of the shared data, so that other user sides can grasp the basic situation of the shared data based on the abstract information. The directory information of the database may be a directory indicating data included in the database, or may be a directory of data tables included in the database, the introduction information may be a database name, description information of the database, and the data table information may be a directory of data table names, data table record data, introduction information, structure information of each data table, data number of each data table record, and the like.
Specifically, the preset credential processing program can be run at the verification end, and the verification end inputs the credential declaration content into the preset verification program, so that the verification result of the data credential can be obtained.
In some specific embodiments, the preset credential processing program may include a credential verification model, and the credential declaration content is verified by using the preset credential verification model to obtain a verification result of the data credential.
By verifying the credential declaration content according to a preset credential handler, it can be ensured that the data credential written into the blockchain is secure and properly disclosed.
In some embodiments, as shown in fig. 3, step S204 may include step S301 and step S302.
Step S301: and determining a target processing model from a plurality of preset verification models according to the data type of the shared data.
The data types of the shared data may include text, pictures, audio and video, and further, the text data may also include types of words, numbers, symbols and the like. The preset verification models can be stored locally at the verification end, can be stored in the cloud end and can be stored in the blockchain network. The preset verification models correspond to the data types of the shared data. For example, for the shared data of the text type, a verification model for text recognition is preset accordingly, and for the shared data of the picture type, a verification model for performing the picture recognition and analysis functions is preset. The target processing model may include one or more verification models.
Specifically, the verification terminal may determine, from a plurality of preset verification models, a verification model corresponding to the data type of the shared data according to the data type of the shared data, and use the corresponding verification model as the target processing model.
Step S302: and determining a target processing mode for processing the output result of the target processing model from the preset multi-class processing modes according to the preset verification requirement data.
The preset verification requirement data can be set by the verification terminal according to the actual verification requirement, and the processing mode refers to a mode of processing a result output by the verification model, and can also be a mode of processing the verification model. In general, the verification terminal has a set of verification requirements based on the data content to be verified, and correspondingly, the verification terminal can set preset verification requirement data based on the verification requirements, and multiple types of processing modes matched with different verification requirement data exist for different verification requirement data.
Specifically, the verification terminal may determine, according to preset verification requirement data, a target processing mode for processing the target processing model from preset multiple processing modes.
In some embodiments, as shown in fig. 4, determining the corresponding target processing model according to the shared data and the preset verification requirement data may include steps S401 to S402.
Step S401: and determining a target initial verification model from a plurality of preset initial verification models according to the data type of the shared data.
Step S402: and determining model verification parameters according to preset verification requirement data.
Step S403: and adjusting the parameters of the target initial verification model according to the model verification parameters to obtain a target processing model.
In some particular embodiments, the initial verification model may be a blockchain historically stored verification model whose output does not necessarily match the current verification requirements. At this time, the target initial verification model may be determined from a plurality of preset initial verification models according to the data type of the shared data, for example, if the shared data is picture data, the initial verification model is a verification model of a picture recognition analysis class. The default output probability threshold parameter of the initial model is 70%, and the output probability threshold parameter corresponding to the current verification requirement data is 90%, so that the parameters of the initial verification model need to be adjusted. The verification terminal determines the verification model parameter as 90 according to the preset verification requirement data, and further adjusts the output probability threshold parameter of the initial verification model from 70% to 90%, and the adjusted initial verification model is the target processing model.
In some specific embodiments, the parameters of the target initial verification model are adjusted according to the model verification parameters, and the weight values of the matrix in the initial verification model can also be adjusted.
The target processing model is obtained according to the parameters of the initial verification model, the existing verification model can be matched with the current verification requirement, the development cost of the model is saved, the latest verification requirement can be met, and the postponement of the verification rule is avoided.
In some embodiments, the issued data credential information includes: the vouchers DID, vouchers declaration content, vouchers applicant DID, and issuers DID.
In some embodiments, the shared data is managed and stored by a database at the data provider.
The processing method further comprises the following steps: and calling a preset data verification program, wherein the preset data verification program runs on a verification end or a data providing end.
The preset data verification program is used for: the method comprises the steps of determining a database according to data credentials, obtaining shared data from the database, determining a corresponding target processing model and a corresponding target processing mode according to the shared data and preset verification demand data, wherein the target processing model is managed and stored based on a blockchain, inputting the shared data into the target processing model, and performing cross filtering processing on an output result of the target processing model according to the target processing mode, wherein a preset data verification program runs at a verification end or a data providing end.
Wherein the database is a database of the data providing end. In some specific embodiments, the credential declaration content may include introduction information of the shared database, for example, may include an address, identification information, an access interface, and the like of the shared database, and the verification end may determine, according to the credential declaration content, the database to which the shared data belongs, and further obtain the shared data from the database. In some particular embodiments, the database may be a local database of the data provider.
Specifically, the preset data verification program may be an application program running on the verification side or the data providing side in the form of a functional module.
When the data verification program runs on the verification terminal, the verification terminal remotely acquires the shared data from the data providing terminal to verify, and when the data verification program runs on the data providing terminal, the shared data in the database can be directly read to verify.
In some embodiments, the data verification program runs in the data sharing agent program of the data providing end, and the data sharing agent program reads the shared data and then verifies the shared data. Accordingly, the data verification program can acquire a target processing model and a target processing mode which are uplink in advance from the blockchain network, and then verify the shared data according to the target processing model and the target processing mode.
By setting the data verification program at the data providing end, the risk of data leakage existing in shared data can be avoided from being remotely called by the verification end, the computing power resource of the verification end can be saved, and the verification speed is improved.
In some embodiments, the processing method further includes writing verification information into the workspace for the data provider or the data requester to obtain when the data credential verification fails or the result of the cross-filtering process does not meet the preset data verification condition; wherein the verification information comprises a certificate DID and a verification result description.
Specifically, when the data credential is not verified, the verification result includes a detailed description of the data credential not verified, such as the failed data content, the failed basis, the failed description, and the like. When the result of the cross filtering process does not meet the preset data verification condition, that is, the verification of the shared data fails, the verification result may include detailed descriptions of the failed verification of the shared data, such as failed data content, failed basis, failed description, and the like.
In some embodiments, as shown in fig. 5, the processing method may further include steps S501 to S503.
Step S501: the acquired data provider specifies the submitted review request based on the validation result.
Specifically, after the data providing end obtains the verification result of the data credentials or the shared data from the working space, if the verification result is not recognized, a rechecking request can be initiated. In some examples, the data provider may apply for the review request through a blockchain smart contract interface.
Step S502: and rechecking the data credentials or shared data corresponding to the verification result description to obtain a rechecking result.
In some specific embodiments, step S502 may include outputting the corresponding data credentials or shared data for manual review, and obtaining a manual review result.
Step S502 may further include rechecking the data credentials or shared data corresponding to the verification result description according to a preset rechecking program, so as to obtain a rechecking result.
The preset rechecking program can be an automatic verification program for rechecking the data certificate or the shared data for the second time.
Step S503: writing the rechecking result into the working space for the data providing end to acquire.
The verification end rechecks the data credentials or the shared data corresponding to the verification result description, and writes the rechecked result into the working space through the intelligent contract interface of the blockchain after obtaining the rechecked result.
Accordingly, in the working space of the blockchain network, an intelligent contract for processing the data credentials is preset, a corresponding contract interface is defined, and the verification end can at least execute the following operations through the contract interface: (1) Writing the issued data certificate, wherein the written parameters comprise the issued data certificate information; (2) Writing data credentials to verify failed data, wherein the written parameters comprise credentials DID and verification result description; (3) Writing in the rechecking result, wherein the parameters comprise a certificate DID, a verification result description and a rechecking result. The data provider can apply for a rechecking request through the intelligent contract interface, and the written parameters comprise a certificate DID and rechecking reasons.
When the checking result is passed, the verification result of the original data certificate or the shared data is cancelled, and if the checking result is not passed, the verification result of the original data certificate or the shared data is reserved and the checking result is also written into the working space.
By executing the processing method of the rechecking request aiming at the verification result, the verification end is allowed to recheck the verification result for the second time, so that the verification error correction function is realized, and the accuracy of the shared data verification is improved.
In some embodiments, the preprocessing space is further used for being accessed by a data sharing management end, and the processing method further includes steps S601 to S603.
Step S601: and acquiring the intelligent contract uploaded by the data sharing management end from the preprocessing space.
Step S602: and verifying the intelligent contract.
Step S603: when the verification of the smart contract is passed, the smart contract is deployed into the workspace.
The data sharing management end uploads the intelligent contract to the preprocessing space, the intelligent contract is acquired and verified by the verification end, and the intelligent contract is deployed to the working space when the verification passes. In particular, the verification of the smart contract may be verification of a code of the smart contract. Before the intelligent contracts are deployed to the working space, safety and qualification verification are carried out, unsafe or unqualified intelligent contract codes can be limited in the preprocessing space, the safety of the intelligent contracts is improved, and the fact that unsuitable disclosure contents do not exist in the intelligent contracts is ensured.
Meanwhile, in the preprocessing space, the data sharing management end can execute the operations of modification, test, analysis and the like of the intelligent contract.
It should be understood that, although the steps in the flowcharts of fig. 2 to 6 are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps illustrated in fig. 2-6, as well as the steps involved in other embodiments, are not strictly limited to the order of execution unless explicitly stated herein, and may be performed in other orders. Moreover, at least some of the steps of the foregoing embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
In a second aspect, embodiments of the present disclosure provide a blockchain-based data sharing system, where a ledger space of a blockchain network includes a preprocessing space for access by an authentication end and a credential service end and a workspace for access by any user end, as shown in fig. 7, a data sharing system 700 may include a data providing module 701, a credential service module 702, an authentication module 703, and a data requesting module 704.
The data providing module 701 is configured to provide the data provider with a shared data application.
The credential service module 702 is configured to provide a credential for a credential server to create a data summary credential according to a shared data application submitted by a data provider.
A verification module 703, configured to enable the verification terminal to perform the steps of the processing method in any embodiment of the first aspect.
The data request module 704 is configured to enable the data request terminal to obtain the shared data according to the issued data credential information.
The specific limitation of the verification module 703 may be referred to the processing method in any embodiment of the first aspect, which is not described herein.
In some embodiments, the preprocessing space is further used for being accessed by a data sharing management end, and the data sharing system further comprises a data sharing management module. The data sharing management module is used for the data sharing management end to deploy intelligent contracts in the blockchain.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to perform uplink processing on a plurality of preset verification models according to the intelligent contract, so that the verification end or the data providing end can obtain the verification models from the blockchain. Wherein the plurality of verification models are artificial intelligence models.
In some specific embodiments, the uplink processing is performed on the preset multiple verification models according to the intelligent contract, which may be that multiple model files corresponding to the preset multiple verification models are stored in the blockchain, or that access links and model file information of the multiple model files corresponding to the preset multiple verification models are stored in the blockchain.
When the preset data verification program performs shared data verification, a verification model can be obtained for data verification by obtaining a model file from a blockchain.
The verification model can be a model for detecting and identifying shared data of certain data, and can be an intelligent model obtained by utilizing an intelligent detection algorithm and performing iterative training through a marked data set. The generation of the verification model may include a training phase, an reasoning phase, and a verification phase. The model training stage refers to that the model uses a training data set, and model parameters are adjusted through an optimization algorithm to minimize the gap between the predicted value and the real label. The inference phase refers to the process of recognition or classification using a trained model. The verification phase is a process during model training that uses a verification set to monitor model performance and avoid overfitting.
Accordingly, each verification model can be trained to obtain a model file, and the model file can contain information such as model annotation, data type, layer description, tensor description and the like. In the case where an update of the verification model is required, this can be achieved by updating the model file.
In some embodiments, the data sharing management module may be further configured to store, by the data sharing management end, a plurality of model files corresponding to a plurality of preset verification models into the blockchain according to the intelligent contract. And the method can also be used for the data sharing management end to store access links and model file information of a plurality of model files corresponding to a plurality of preset verification models into the blockchain according to the intelligent contract. The model file is model parameter data obtained after model training is verified, and the model file information comprises hash values, model version numbers, model names and/or model numbers of the model file. Specifically, the hash value of the model file may be a unique hash value obtained after hashing the model file, and the hash value is used as a unique digital fingerprint of the model file to verify the authenticity and integrity of the model file.
In some specific embodiments, to implement model file uplink through smart contracts, a specific contract interface may be defined, through which the data sharing manager may perform at least the following operations: (1) Creating a verification model, wherein parameters of the verification model can comprise model names, descriptions, model IDs and the like; (2) The model file is uploaded, and parameters of the model file comprise a model file or model file access URL, a version number, a model ID and the like. The verification terminal may perform query and read operations of the verification model through the contract interface, for example: (1) querying model version information, the parameters including model ID; (2) reading a model file of a specified version: the parameters include a model ID.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to perform uplink processing on a preset multi-class processing manner according to the intelligent contract, so that the verification end or the data providing end can obtain the data from the blockchain.
The processing mode may include setting a target output threshold for an output result of any one verification model, and may further include performing a collective operation on output results of a plurality of verification models.
In some specific embodiments, to implement the multi-class processing mode to be uplink, a specific contract interface may be defined, through which the data sharing management end may at least perform the following operations: (1) Creating a processing mode, wherein parameters of the processing mode comprise processing mode description, ID information and the like; (2) The specified processing mode information is written, and the parameters of the specified processing mode information comprise an ID information and a description of how to process the output result of the model.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to perform uplink processing on a plurality of preset verification policies according to the intelligent contract, so that the verification end or the data providing end can obtain the verification policies from the blockchain.
Any verification policy comprises a corresponding target processing model and a corresponding target processing mode, and corresponds to the data type of the shared data and preset verification requirement data.
Accordingly, the uplink of multiple sets of verification policies may be implemented by defining a contract interface.
In some specific embodiments, the multiple sets of verification policies may be further implemented by the smart contract program, and when the verification policies need to be modified, the multiple sets of verification policies may be implemented by updating the smart contract code. Accordingly, version number mark information can be added to the updated intelligent contract name, and updating of the contract code can be prompted through updating version information corresponding to the intelligent contract program. So that the user side obtains the latest version number of the intelligent contract before calling the contract interface, and designates the version number of the contract program when calling the contract interface.
In some embodiments, the data sharing management module is further configured to enable the data sharing management end to modify, compile and/or test the smart contract in the preprocessing space when the verification of the smart contract is not passed.
In a third aspect, embodiments of the present disclosure provide a blockchain-based shared data verification device, where a ledger space of a blockchain network includes a preprocessing space for access by a verification end and a credential server, and a workspace for access by any user end, as shown in fig. 8, the verification device 800 may include: a credential acquisition unit 801, a credential verification unit 802, a shared data acquisition unit 803, a shared data verification unit 804, and a data credential issuance unit 805.
A credential acquisition unit 801, configured to acquire a data credential to be verified from the preprocessing space. The data certificate is a data abstract certificate created by the certificate server according to the shared data application submitted by the data provider.
The credential verification unit 802 is configured to verify the data credential according to a preset credential processing procedure.
The shared data obtaining unit 803 is configured to obtain shared data when the verification of the data credential is passed.
The shared data verification unit 804 is configured to determine, according to the shared data and preset verification requirement data, a corresponding target processing model and a corresponding target processing mode, where the target processing model is managed and stored based on a blockchain. And inputting the shared data into a target processing model, and performing cross filtering processing on the output result of the target processing model according to the target processing mode.
The data credential issuing unit 805 is configured to issue a data credential when a result of the cross-filtering process meets a preset data verification condition, and write the issued data credential information into the workspace, so that the data request terminal obtains the shared data according to the issued data credential information.
In some embodiments, the data vouchers include vouchers DID and vouchers statement content, and the vouchers verification unit 802 is further configured to verify the vouchers statement content according to a preset vouchers handler. Wherein, the voucher declares the summary information of the content sharing data, and the summary information can include at least one of catalog information, introduction information and data sheet information of a database to which the sharing data belongs.
In some embodiments, the target processing model includes a plurality of verification models, the cross filtering process includes performing an and operation, an or operation, a non-operation, or an exclusive-or operation, and the shared data verification unit 804 is further configured to perform the and operation, the or operation, the non-operation, or the exclusive-or operation on the output results of the plurality of verification models according to the target processing manner, so as to adaptively adjust the output results of the target processing model according to preset verification requirement data.
In some embodiments, the cross-filtering process includes a filtering process, and the shared data verification unit 804 is further configured to perform filtering on the output result of the target processing model according to a preset range value corresponding to the target processing mode according to the target processing mode.
In some embodiments, the shared data verification unit 804 is further configured to determine a target processing mode from a preset plurality of verification modes according to a data type of the shared data, and determine a target processing mode for processing an output result of the target processing mode from a preset multi-class processing mode according to preset verification requirement data.
In some embodiments, the shared data verification unit 804 is further configured to determine a target initial verification model from a preset plurality of initial verification models according to a data type of the shared data. And determining model verification parameters according to preset verification requirement data. And adjusting the parameters of the target initial verification model according to the model verification parameters to obtain a target processing model.
In some embodiments, the shared data is managed and stored by a database of the data provider, and the apparatus further includes a data verification program calling unit for calling a preset data verification program. The preset data verification program runs on a verification end or a data providing end.
The preset data verification program is used for: the method comprises the steps of determining a database according to data credentials, obtaining shared data from the database, determining a corresponding target processing model and a corresponding target processing mode according to the shared data and preset verification demand data, wherein the target processing model is managed and stored based on a blockchain, inputting the shared data into the target processing model, and performing cross filtering processing on an output result of the target processing model according to the target processing mode, wherein a preset data verification program runs at a verification end or a data providing end.
In some embodiments, the verification device further includes a verification information writing unit, configured to write verification information into the working space for the data provider or the data requester to obtain when the result of the data credential passing through or the cross filtering process does not meet the preset data verification condition. Wherein the verification information comprises a certificate DID and a verification result description.
In some embodiments, the verification device further includes a rechecking unit, configured to obtain a rechecking request submitted by the data provider based on the verification result description, recheck the data credential or the shared data corresponding to the verification result description, obtain a rechecking result, and write the rechecking result into the working space for the data provider to obtain.
In some embodiments, the rechecking unit is further configured to output corresponding data credentials or shared data for manual rechecking, to obtain a manual rechecking result, or recheck the data credentials or shared data corresponding to the verification result description according to a preset rechecking program, to obtain a rechecking result.
In some embodiments, the verification device further includes an intelligent contract verification unit, configured to obtain the intelligent contract uploaded by the data sharing management end from the preprocessing space, verify the intelligent contract, and deploy the intelligent contract into the working space when the verification of the intelligent contract is passed.
For more specific limitations on the verification device, reference may be made to the above definition of the processing method, and the verification device may also be used to perform more steps of the processing method in embodiments of the present disclosure, which are not described in detail herein. The respective modules in the above-described authentication apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In a fourth aspect, the disclosed embodiments provide a computer program product comprising a computer program stored in a computer readable storage medium. The computer program may be read from a computer readable storage medium by a processor of a computing device, the processor executing the computer program to cause the computing device to perform the steps of the processing method provided in any embodiment of the first aspect of the disclosure.
In a fifth aspect, embodiments of the present disclosure provide a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the processing method provided in any of the embodiments of the present disclosure of the first aspect when the computer program is executed.
In some embodiments, the computer device may be a terminal, the internal structure of which may be as shown in fig. 9. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement the processing method of any of the embodiments of the first aspect herein. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 9 is merely a block diagram of a portion of the structure associated with an embodiment of the present disclosure and is not limiting of the computer device to which an embodiment of the present disclosure applies, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In a sixth aspect, embodiments of the present disclosure provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the processing method provided in any of the embodiments of the first aspect of the present disclosure.
The computer readable storage medium may be the computer readable storage medium in the computer device shown in fig. 9.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments of the present disclosure may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (Synchnonous Link) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the disclosure.
The foregoing examples merely represent embodiments of the present disclosure, which are described in more detail and detail, but are not to be construed as limiting the scope of the present disclosure. It should be noted that variations and modifications can be made by those skilled in the art without departing from the spirit of the disclosure, which are within the scope of the disclosure. Accordingly, the scope of the present disclosure should be determined from the following claims.
Claims (20)
1. The shared data processing method based on the blockchain is applied to a verification terminal and is characterized in that an account space of a blockchain network comprises a preprocessing space for the verification terminal and a credential server to access and a working space for any user terminal to access; the method comprises the following steps:
Acquiring a data credential to be verified from the preprocessing space, wherein the data credential is a data abstract credential created by the credential server according to a shared data application submitted by a data providing end;
Verifying the data certificate according to a preset certificate processing program;
when the verification of the data certificate is passed, the shared data is obtained;
determining a corresponding target processing model and a corresponding target processing mode according to the shared data and preset verification demand data, wherein the target processing model is managed and stored based on the blockchain;
inputting the shared data into the target processing model, and performing cross filtering processing on an output result of the target processing model according to the target processing mode, wherein the cross filtering processing comprises logic operation processing or screening filtering processing;
When the result of the cross filtering processing accords with a preset data verification condition, issuing the data certificate, and writing the issued data certificate information into the working space so that a data request end can acquire the shared data according to the issued data certificate information.
2. The method of claim 1, wherein the logical operation processing includes performing an and operation, an or operation, a non-operation, or an exclusive-or operation;
When the target processing model comprises a plurality of verification models, the cross filtering processing is performed on the output result of the target processing model according to the target processing mode, and the cross filtering processing comprises the following steps: and performing AND operation, OR operation, non-operation or exclusive OR operation on the output results of the verification models according to the target processing mode so as to adaptively adjust the output results of the target processing model according to the preset verification requirement data.
3. The method according to claim 1, wherein the cross-filtering the output result of the target processing model according to the target processing mode includes: and screening and filtering the output result of the target processing model according to the target processing mode and a preset range value corresponding to the target processing mode.
4. The method of claim 1, wherein the data vouchers include vouchers DID and vouchers declaration content, the verifying the data vouchers according to a preset vouchers handler comprising:
Verifying the credential declaration content according to a preset credential processing program; wherein the credential declaration content includes summary information of the shared data, the summary information including at least one of catalog information, introduction information, and data sheet information of a database to which the summary information belongs.
5. The method of claim 1, wherein determining the corresponding target processing model and the corresponding target processing mode according to the shared data and the preset verification requirement data comprises:
Determining the target processing model from a plurality of preset verification models according to the data type of the shared data;
And determining the target processing mode for processing the output result of the target processing model from preset multi-class processing modes according to the preset verification requirement data.
6. The method of claim 1, wherein determining the corresponding target process model based on the shared data and the preset verification requirement data comprises:
determining a target initial verification model from a plurality of preset initial verification models according to the data type of the shared data;
determining model verification parameters according to the preset verification demand data;
and adjusting the parameters of the initial verification model according to the model verification parameters to obtain the target processing model.
7. The method of claim 1, wherein the shared data is managed and stored by a database of the data provider; the method further comprises the steps of:
Calling a preset data verification program, wherein the preset data verification program runs on the verification end or the data providing end;
the preset data verification program is used for:
determining the database according to the data certificate, and acquiring the shared data from the database;
Determining a corresponding target processing model and a corresponding target processing mode according to the shared data and the preset verification demand data, wherein the target processing model is managed and stored based on the blockchain;
and inputting the shared data into the target processing model, and performing cross filtering processing on an output result of the target processing model according to the target processing mode, wherein the preset data verification program runs on the verification end or the data providing end.
8. The method according to claim 1, wherein the method further comprises:
When the data certificate verification is not passed or the result of the cross filtering processing does not accord with the preset data verification condition, writing verification information into the working space for the data providing end or the data requesting end to acquire; the verification information comprises a certificate DID and a verification result description.
9. The method of claim 8, wherein the method further comprises:
Acquiring a review request submitted by the data providing end based on the verification result description;
Rechecking the data credentials or shared data corresponding to the verification result description to obtain a rechecking result;
writing the rechecking result into the working space for the data providing end to acquire;
The rechecking the data credentials or shared data corresponding to the verification result description comprises the following steps: outputting the corresponding data credentials or shared data for manual review, and obtaining a manual review result; or rechecking the data credentials or shared data corresponding to the verification result description according to a preset rechecking program to obtain a rechecking result.
10. The method of claim 1, wherein the preprocessing space is further used for access by a data sharing manager, the method further comprising:
acquiring an intelligent contract uploaded by the data sharing management end from the preprocessing space;
verifying the intelligent contract;
and deploying the intelligent contract into the working space when the intelligent contract passes verification.
11. A blockchain-based data sharing system, wherein a ledger space of a blockchain network includes a preprocessing space for access by a validation side and a credential server and a workspace for access by any user side, the system comprising: the system comprises a data providing module, a credential service module, a verification module and a data request module;
The data providing module is used for the data providing end to submit a shared data application;
The credential service module is used for the credential service end to create a data summary credential according to the shared data application submitted by the data providing end;
The verification module is configured to enable the verification terminal to perform the steps of the processing method according to any one of claims 1 to 10;
The data request module is used for the data request terminal to acquire the shared data according to the issued data credential information.
12. The system of claim 11, wherein the preprocessing space is further used for access by a data sharing management end, and the system further comprises a data sharing management module;
the data sharing management module is used for the data sharing management end to deploy intelligent contracts in the blockchain.
13. The system of claim 12, wherein the data sharing management module is further configured to: the data sharing management end carries out uplink processing on a plurality of preset verification models according to the intelligent contract so as to obtain the verification end or the data providing end from the block chain; wherein the plurality of verification models are artificial intelligence models.
14. The system of claim 13, wherein the data sharing management module is further configured to:
The data sharing management end stores a plurality of model files corresponding to the preset verification models into the blockchain according to the intelligent contract; or alternatively, the first and second heat exchangers may be,
The data sharing management end stores access links and model file information of a plurality of model files corresponding to the preset verification models into the blockchain according to the intelligent contract;
The model file is model parameter data obtained after the verification model is trained, and the model file information comprises a hash value, a model version number, a model name and/or a model number of the model file.
15. The system of claim 13, wherein the data sharing management module is further configured to: the data sharing management end performs uplink processing on a preset multi-class processing mode according to the intelligent contract so as to obtain the verification end or the data providing end from the block chain;
the processing mode comprises setting a target output threshold value for an output result of any verification model; and/or performing a collective operation on the output results of the plurality of verification models.
16. The system of claim 15, wherein the data sharing management module is further configured to: the data sharing management end performs uplink processing on a plurality of preset verification strategies according to the intelligent contract so as to obtain the verification end or the data providing end from the blockchain;
Any one of the verification strategies comprises a corresponding verification model and a corresponding processing mode, and corresponds to the data type of the shared data and preset verification requirement data.
17. The system of claim 12, wherein the data sharing management module is further configured to: and when the verification of the intelligent contract is not passed, the data sharing management end modifies, compiles and/or tests the intelligent contract in the preprocessing space.
18. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the method of any one of claims 1 to 10.
19. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 10 when the computer program is executed by the processor.
20. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410675756.XA CN118245458B (en) | 2024-05-29 | 2024-05-29 | Shared data processing method, system, equipment and product based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410675756.XA CN118245458B (en) | 2024-05-29 | 2024-05-29 | Shared data processing method, system, equipment and product based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN118245458A CN118245458A (en) | 2024-06-25 |
CN118245458B true CN118245458B (en) | 2024-08-09 |
Family
ID=91562844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410675756.XA Active CN118245458B (en) | 2024-05-29 | 2024-05-29 | Shared data processing method, system, equipment and product based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118245458B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115514762A (en) * | 2021-06-03 | 2022-12-23 | 普天信息技术有限公司 | Data credible sharing method, edge server, terminal and system |
CN115664759A (en) * | 2022-10-19 | 2023-01-31 | 中钞信用卡产业发展有限公司 | User data sharing method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101893729B1 (en) * | 2018-03-28 | 2018-10-04 | 주식회사 마크로젠 | Data sharing method based on multiple block-chains |
US11829351B2 (en) * | 2018-11-26 | 2023-11-28 | Akamai Technologies, Inc. | High performance distributed system of record with hosted origin services |
CN117993017B (en) * | 2024-03-29 | 2024-06-07 | 苏州元脑智能科技有限公司 | Data sharing system, method, device, computer equipment and storage medium |
-
2024
- 2024-05-29 CN CN202410675756.XA patent/CN118245458B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115514762A (en) * | 2021-06-03 | 2022-12-23 | 普天信息技术有限公司 | Data credible sharing method, edge server, terminal and system |
CN115664759A (en) * | 2022-10-19 | 2023-01-31 | 中钞信用卡产业发展有限公司 | User data sharing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN118245458A (en) | 2024-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tandon et al. | Blockchain in healthcare: A systematic literature review, synthesizing framework and future research agenda | |
Ocheja et al. | Managing lifelong learning records through blockchain | |
US11895223B2 (en) | Cross-chain validation | |
US11200260B2 (en) | Database asset fulfillment chaincode deployment | |
CN110599357B (en) | Insurance business data processing method and device based on block chain and storage medium | |
JP2021525931A (en) | Efficient verification for blockchain | |
US20190303867A1 (en) | Blockchain based crowdsourcing medical billing for medical insurance claims processing | |
US11755998B2 (en) | Smart data annotation in blockchain networks | |
US11489663B2 (en) | Correlation-based hash tree verification | |
US11645268B2 (en) | Database world state performance improvement | |
US11379472B2 (en) | Schema-based pruning of blockchain data | |
US11347885B2 (en) | Verified templates | |
CN111709860A (en) | Homote advice processing method, device, equipment and storage medium | |
US12039494B2 (en) | Glue-contracts for digital corollaries in blockchain networks | |
CN118245458B (en) | Shared data processing method, system, equipment and product based on block chain | |
US12079283B2 (en) | Behavior driven graph expansion | |
JP2023511886A (en) | Conflict-free version control | |
US20230412402A1 (en) | Endorsement policy consolidation in blockchain networks | |
CN113591162B (en) | Block chain evidence storing method and device and computer equipment | |
US11563558B2 (en) | Behavior driven graph expansion | |
EP4439327A1 (en) | Method and system for identifying an experiment related to a dataset | |
Taylor et al. | A Way Forward for the MDCG 2019-16 Medical Device Security Guidance | |
KR102610078B1 (en) | Blockchain-based research note management system | |
CN112307087B (en) | Service data routing relation matching method and device based on decision tree | |
US11556517B2 (en) | Blockchain maintenance |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |