WO2019019853A1 - 处理数据的方法、终端设备和网络设备 - Google Patents

处理数据的方法、终端设备和网络设备 Download PDF

Info

Publication number
WO2019019853A1
WO2019019853A1 PCT/CN2018/092967 CN2018092967W WO2019019853A1 WO 2019019853 A1 WO2019019853 A1 WO 2019019853A1 CN 2018092967 W CN2018092967 W CN 2018092967W WO 2019019853 A1 WO2019019853 A1 WO 2019019853A1
Authority
WO
WIPO (PCT)
Prior art keywords
network
information
data
control information
storage
Prior art date
Application number
PCT/CN2018/092967
Other languages
English (en)
French (fr)
Inventor
常俊仁
冯淑兰
张亮亮
张臣雄
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019019853A1 publication Critical patent/WO2019019853A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Definitions

  • the present application relates to the field of communications, and more particularly to a method, a terminal device and a network device for processing data.
  • a data center (the center that stores data) is a traditional network data storage system that typically contains multiple storage servers. These storage servers generally have their own interfaces and protocols, and are connected to the host computer through coaxial cable, network cable, optical fiber, etc. to provide storage services for the computer host.
  • the data center can centrally store and manage network data.
  • centralized storage and management of network data poses security issues. For example, once a data center is attacked or data stored in a data center is tampered with, network data may be lost.
  • the application provides a method for processing data, a terminal device and a network device to improve storage security of network data.
  • the first aspect provides a method for processing data, including: receiving, by a network device, a data packet that is sent by a terminal device and including data to be stored; and the network device storing the data packet to a first network data storage system, and The control information of the data packet is stored to the second network data storage system, wherein the control information is used to indicate a transmission format of the data packet, the first network data storage system and the second network data storage system
  • At least one network data storage system is a blockchain network.
  • the second network data storage system is a blockchain network
  • the network device stores the control information of the data packet to the second network data storage system, including:
  • the blockchain network performs consensus confirmation and storage on the control information.
  • the first network data storage system can be a data center.
  • the control information with relatively small amount of data is stored in the blockchain network, and the data packet with relatively large amount of data is stored in the data center, which can improve the security of the network data storage and reduce the network in the blockchain network. Storage pressure of each node.
  • the network device performs consensus confirmation and storage on the control information by using the blockchain network, including: the network device dividing the control information into at least two information blocks; And the network device performs consensus confirmation on the at least two information blocks by using the blockchain network, and stores the at least two information blocks by using the blockchain network to at least two of the blockchain networks In the block.
  • the control information is divided into at least two information blocks, and the at least two information blocks are stored in different blocks of the blockchain network, which can improve the difficulty of tampering or deciphering the control information, thereby further improving the storage security of the network data. Sex.
  • the method further includes: the network device determining key information of the data to be stored; and the network device encrypting the key information by using a public key of the terminal device to obtain The encrypted key information; the network device performs consensus confirmation and storage on the encrypted key information through the blockchain network.
  • the key information of the data to be stored is also stored in the blockchain network, which can further reduce the amount of storage required by the terminal device locally and reduce the local storage pressure.
  • the network device stores the data packet to the first network data storage system, and stores the control information of the data packet to the second network data storage system, including: the network device pair Parsing the data packet; if the data packet is successfully parsed, the network device stores the data packet to the first network data storage system, and stores the control information to the second Network data storage system.
  • the above solution ensures that the data stored in the first network data storage system is valid data that can be parsed.
  • the network device stores the control information of the data packet to the second network data storage system, including: the network device uses the public key of the terminal device or the terminal device and another The shared key of the terminal device encrypts the control information to obtain the encrypted control information; the network device stores the encrypted control information to the second network data storage system.
  • control information Before the control information is stored in the second network data storage system, the control information is encrypted, and the storage security of the control information can be further improved.
  • the method further includes: the network device sending, to the terminal device, first storage information and second storage information, where the first storage information is used to indicate that the data packet is in a first network a storage location in the data storage system, the second storage information being used to indicate a storage location of control information of the data packet in the second network data storage system.
  • the first storage information and the second storage information are fed back to the terminal device to facilitate subsequent access by the terminal device to the data in the data packet.
  • a second aspect, a method for processing data includes: a terminal device sends a data packet including data to be stored to a network device; and the terminal device receives first storage information and second storage information sent by the network device, where The first storage information is used to indicate a storage location of the data packet in the first network data storage system, and the second storage information is used to indicate a storage location of the control information in the second network data storage system.
  • At least one network data storage system of the first network data storage system and the second network data storage system is a blockchain network, the control information is used to indicate a transmission format of the data packet; and the terminal device stores The first storage information and the second storage information.
  • control information includes at least two information blocks
  • second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network, wherein At least two pieces of information are respectively stored in at least two blocks of the blockchain network.
  • control information is divided into at least two information blocks, and the at least two information blocks are stored in different blocks of the blockchain network, thereby improving the difficulty of tampering or deciphering the control information, thereby Further improve the storage security of network data.
  • the method before the terminal device receives the first storage information and the second storage information sent by the network device, the method further includes: the terminal device encrypting the control information; And transmitting, by the terminal device, the encrypted control information to the network device, instructing the network device to store the encrypted control information to the second network data storage system.
  • control information Before the control information is stored in the second network data storage system, the control information is encrypted, and the storage security of the control information can be further improved.
  • the terminal device encrypts the control information, including: the terminal device uses a public key of the terminal device or a shared key pair of the terminal device and another terminal device Control information is encrypted.
  • a third aspect provides a method for processing data, comprising: receiving, by a network device, a data read request sent by a terminal device, the data read request being used to request to read target data stored in a network, the data read request And including the first storage information and the second storage information, where the first storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system, and the second storage information is used to indicate the location a storage location of the control information of the data packet in the second network data storage system, the control information is used to indicate a transmission format of the data packet, the first network data storage system and the second network data storage system At least one of the network data storage systems is a blockchain network; the network device acquires the data packet from the first network data storage system according to the first storage information, and according to the second storage information Acquiring the control information in the second network data storage system; the network device sends the data read to the terminal device Reading requested data in response to said data read response including the data packet and the control information.
  • control information includes at least two information blocks
  • the second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network, wherein The at least two information blocks are respectively stored in at least two blocks of the blockchain network, and the network device acquires the control information from the second network data storage system according to the second storage information, including The network device acquires the at least two information blocks from the at least two blocks according to the second storage information.
  • the control information is divided into at least two information blocks, and the at least two information blocks are stored in different blocks of the blockchain network, which can improve the difficulty of tampering or deciphering the control information, thereby further improving the storage security of the network data. Sex.
  • a fourth aspect provides a method for processing data, comprising: a terminal device transmitting a data read request to a network device, the data read request being used to request to read target data stored in a network, where the data read request includes a first storage information and a second storage information, the first storage information being used to indicate a storage location of the data packet including the target data in the first network data storage system, the second storage information being used to indicate the a storage location of the control information of the data packet in the second network data storage system, the control information being used to indicate a transmission format of the data packet, the first network data storage system and the second network data storage system
  • At least one network data storage system is a blockchain network; the terminal device receives a data read response sent by the network device for the data read request, and the data read response includes the data packet and the Determining control information; the terminal device parses the data packet according to the control information to obtain the target data.
  • the target data is data stored by another terminal device into the network
  • the control information is obtained by using a shared key of the terminal device and the another terminal device to obtain Controlling information
  • the method further includes: the terminal device acquiring the first storage information and the second storage information from the another terminal device
  • the terminal device parses the data packet according to the control information, including: the terminal device decrypts the control information by using the shared key to obtain decrypted control information; and the terminal device uses the decrypted device
  • the control information is described, and the data packet is parsed.
  • the control information is encrypted by the shared key, and data sharing between the terminal devices can be realized.
  • control information includes at least two information blocks
  • second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network, wherein At least two pieces of information are respectively stored in at least two blocks of the blockchain network.
  • the control information is divided into at least two information blocks, and the at least two information blocks are stored in different blocks of the blockchain network, which can improve the difficulty of tampering or deciphering the control information, thereby further improving the storage security of the network data. Sex.
  • a network device including a receiver and a memory.
  • the receiver is configured to receive a data packet that is sent by the terminal device and includes data to be stored.
  • the memory is configured to store the data packet received by the receiver to a first network data storage system, and store control information of the data packet to a second network data storage system.
  • the control information is used to indicate a transmission format of the data packet, and at least one of the first network data storage system and the second network data storage system is a blockchain network.
  • a terminal device including a transmitter, a receiver, and a memory.
  • the transmitter is configured to send a data packet including data to be stored to the network device.
  • the receiver is configured to receive first storage information and second storage information that are sent by the network device.
  • the first storage information is used to indicate a storage location of the data packet sent by the sender in the first network data storage system.
  • the second storage information is used to indicate a storage location of the control information in the second network data storage system.
  • At least one of the first network data storage system and the second network data storage system is a blockchain network.
  • the control information is used to indicate a transmission format of the data packet.
  • the memory is configured to store the first storage information and the second storage information.
  • a network device including a receiver, a processor, and a transmitter.
  • the receiver is configured to receive a data read request sent by the terminal device, where the data read request is used to request to read target data stored in the network, where the data read request includes the first storage information and the second storage information.
  • the first storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system
  • the second storage information is used to indicate that the control information of the data packet is in the second network data.
  • a storage location in the storage system the control information is used to indicate a transmission format of the data packet, and at least one of the first network data storage system and the second network data storage system is a block Chain network.
  • the processor is configured to acquire the data packet from the first network data storage system according to the first storage information received by the receiver, and store data from the second network according to the second storage information.
  • the control information is obtained in the system.
  • the transmitter is configured to send a data read response to the data read request to the terminal device, where the data read response includes the data packet and the control information acquired by the processor.
  • a terminal device including a transmitter, a receiver, and a processor.
  • the transmitter is configured to send a data read request to the network device, where the data read request is used to request to read target data stored in the network, where the data read request includes the first storage information and the second storage information.
  • the first storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system
  • the second storage information is used to indicate that the control information of the data packet is in the second network data storage.
  • a storage location in the system the control information is used to indicate a transmission format of the data packet, and at least one network data storage system in the first network data storage system and the second network data storage system is a blockchain The internet.
  • the receiver is configured to receive a data read response sent by the network device for the data read request, where the data read response includes the data packet and the control information.
  • the processor 1430 is configured to parse the data packet according to the control information to obtain the target data.
  • a network device including a memory, a processor, and a transceiver.
  • the memory is for storing computer instructions for executing computer instructions stored in the memory to perform the method of the first aspect or the third aspect by the transceiver.
  • a terminal device including a memory, a processor, and a transceiver.
  • the memory is for storing computer instructions for executing computer instructions stored in the memory to perform the method of the second or fourth aspect by the transceiver.
  • a chip comprising a memory for storing computer instructions, and a processor for executing computer instructions stored in the memory to perform the above described aspects by a transceiver method.
  • a computer readable storage medium stores instructions that, when run on a network device, cause the network device to perform the method of the first aspect or the third aspect .
  • a computer readable storage medium stores instructions, when executed on the terminal device, causing the terminal device to perform the method of the second aspect or the fourth aspect .
  • a computer program product comprising instructions, when run on a network device, causes the network device to perform the method of the first aspect or the third aspect.
  • a computer program product comprising instructions, when run on a terminal device, causes the terminal device to perform the method of the second aspect or the fourth aspect.
  • a network device comprising means for performing the method of the first aspect or the third aspect.
  • a terminal device comprising means for performing the method of the second aspect or the fourth aspect.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block and/or a storage location of the control information in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • control information includes at least one of the following information: information indicating a modulation mode of the data packet; information indicating a coding mode of the data packet; Information about a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • the present application separates and stores user plane data (corresponding to the data packet above) and control panel data (corresponding to the above control information), which can reduce the possibility of network data being attacked or falsified.
  • control panel data corresponding to the above control information
  • FIG. 1 is a method of processing data provided by an embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a method for processing data according to another embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a data processing method according to another embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a method for processing data according to another embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a network device according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a network device according to another embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of a network device according to another embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a network device according to another embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
  • the terminal device referred to in this application refers to any device that has data storage requirements and is capable of storing data to a network data storage system through a certain network device in the network.
  • the terminal device may be a fixed terminal device or a mobile terminal device.
  • the terminal device mentioned in this application may be a low-capacity, low-power terminal device, which is limited by its own capabilities and may not be able to directly access the network data storage system, but Local data can be stored indirectly to a network data storage system through a network device.
  • the terminal device mentioned in the present application may include, but is not limited to, a desktop computer, a smart meter, a mobile station (MS), a mobile terminal, a mobile telephone, and a user equipment. , UE), mobile devices, portable equipment, and radio frequency identification (RFID) terminal equipment for logistics.
  • a desktop computer a smart meter
  • MS mobile station
  • UE mobile devices
  • portable equipment a mobile terminal
  • RFID radio frequency identification
  • the network device mentioned in the present application may be any network device capable of receiving data to be stored transmitted by the terminal device and storing the data to be stored to the network data storage system.
  • the network device can include, but is not limited to, a switch, a router, a base station, a relay node, a server in a network, and the like.
  • the network device can be a node in a network data storage system.
  • the network device can be a node in a data center and/or a node in a blockchain network.
  • the network device can also be a node that is external to the network data storage system and capable of communicating with nodes in the network data storage system.
  • the network device can be installed with a client of the network data storage system and can obtain a data storage service of the network data storage system through the client.
  • the terminal device and the network device are connected through a network, and can perform communication and data forwarding through the network.
  • the embodiment of the present application does not specifically limit the type of the network, and may be a wired network or a wireless network.
  • the terminal device and the network device can be connected through a wired network, for example, the terminal device and the network device can be connected by a coaxial cable, a network cable, or an optical fiber.
  • the terminal device and the network device can be connected through a wireless network.
  • the wireless network may be, for example, a wireless local area network (WLAN), a global system for mobile communication (GSM) system, a code division multiple access (CDMA) system, and a wideband code division multiple access.
  • WCDMA wideband code division multiple access
  • GPRS general packet radio service
  • LTE long term evolution
  • LTE-A advanced long term evolution
  • UMTS Universal mobile telecommunication system
  • NR new radio
  • the terminal device and the network device can be connected through an internet of thing (IoT).
  • IoT internet of thing
  • the Internet of Things realizes information exchange and communication by applying computer technologies such as intelligent sensing, recognition technology and pervasive computing.
  • the terminal device (or the Internet of Things terminal device) in the Internet of Things can be, for example, a smart meter, an RFID terminal device, etc., and the Internet of Things terminal device generally has weak capabilities, and may not directly access the network data storage system, and needs to pass a strong capability.
  • the network device indirectly accesses the network data storage system.
  • the network data storage system referred to herein may include a data center and/or a blockchain network.
  • the data center and blockchain networks are described below.
  • a data center is a network data storage system that can centrally store and manage network data.
  • a data center can include many nodes that can store data. These nodes may for example be storage servers. Nodes in the data center can be connected to each other through low-latency, high-throughput networks (such as Fibre Channel, 10G Ethernet) to form a cluster to provide data storage services.
  • the storage medium for storing data in the nodes in the data center may be, for example, a magnetic disk, a solid state drives (SSD), or the like.
  • Blockchain network also known as blockchain, is a new type of distributed network data storage system. Compared with traditional network data storage systems (such as data centers), blockchain provides more secure network data storage. reliable. The related concepts of the blockchain are described in detail below.
  • blockchain uses blockchain data structures to store data, uses distributed node consensus mechanisms to validate data, uses cryptography to ensure data transmission and access security, and utilizes intelligence composed of automated script code.
  • blockchain networks are increasingly used in other data storage areas, not just storage account information.
  • a blockchain can be understood as a decentralized, trusted database that is collectively maintained by distributed nodes.
  • a distributed network is the infrastructure of a blockchain network. Data generated on each node in a distributed network can be broadcast to other nodes through a distributed network, so that each node in the blockchain network can obtain a complete Database copy. Other nodes can verify the authenticity of the data through some consensus mechanism.
  • the consensus mechanism can be, for example, a workload proof mechanism or an equity proof mechanism.
  • the blockchain network technology unless more than 51% of nodes in the entire blockchain network can be controlled at the same time, the modification of the database by a single node is invalid, and the data stored on other nodes cannot be affected.
  • the number of nodes participating in the blockchain network is very large, and the possibility of controlling more than 51% of nodes is negligible. Therefore, the blockchain network is considered to be a highly reliable network data storage system.
  • the types of blockchains include public blockchains, alliance blockchains, and private blockchains.
  • the blockchain referred to in this application may be any of a public blockchain, a federated blockchain, and a private blockchain.
  • the nodes in the blockchain network may be any nodes in the network, such as a mobile phone, a personal digital assistant (PDA), a wireless handheld device, a tablet computer, a personal computer (PC).
  • Terminal devices such as wearable devices may also be nodes such as application servers and network servers.
  • the terminal device when the terminal device wants to store local data (such as photos, videos, documents, power data of the electric meter, etc.) to the network data storage system located in the cloud, the terminal device can encapsulate the data to be stored into a data packet, and then The data packet is sent to a network device capable of acquiring a data storage service provided by the network data storage system. After receiving the data packet sent by the terminal device, the network device may parse the data packet, obtain the data to be stored, and store the data to be stored in the data center.
  • local data such as photos, videos, documents, power data of the electric meter, etc.
  • the data center can centrally store and manage network data.
  • centralized storage and management of data can cause security issues, such as data loss if data centers are attacked or data stored in the data center is tampered with.
  • the embodiment of the present application does not store the data to be stored directly into the data center, but divides the data to be stored into unresolved data packets (user plane data) and control information of the data packet (Control surface data), and separate and store user plane data and control plane data, and at least one of user plane data and control plane data is stored in the blockchain network, thereby serving user plane data and/or Control plane data provides a more secure and reliable data storage service.
  • FIG. 1 is a schematic flowchart of a method for processing data provided by an embodiment of the present application.
  • the method of FIG. 1 may include steps 110-150, and the steps of FIG. 1 are described in detail below.
  • step 110 the network device receives a data packet that is sent by the terminal device and includes data to be stored.
  • the data to be stored may be data that the terminal device wishes to store into the network, such as video, photos, files, meter data, RFID data, and the like.
  • the terminal device can transmit data packets through certain uplink transmission resources.
  • the manner of obtaining the uplink transmission resource is not specifically limited in this embodiment of the present application.
  • the terminal device may acquire the uplink transmission resource under the scheduling of the network device. For example, before the network device receives the data packet sent by the terminal device, the network device may first send the uplink scheduling information to the terminal device. To indicate the uplink transmission resource used to transmit the data packet.
  • the terminal device may acquire uplink transmission resources autonomously. For example, the terminal device may acquire an unlicensed uplink transmission resource based on a contention mechanism.
  • the terminal device Before step 110, the terminal device needs to encapsulate the data to be stored into a data packet according to a certain transmission format.
  • the method for determining the transmission format of the data packet is not specifically limited in the embodiment of the present application.
  • the network device may first send uplink scheduling information to the terminal device, where the uplink scheduling information may include control information of the data packet, where the control information may be Indicates a transport format of the data packet, for example, a transport format corresponding to the L1 layer and/or a transport format corresponding to the L2 layer, where the L1 layer may refer to a physical layer, and the L2 layer may refer to a media access control (MAC) layer.
  • MAC media access control
  • the control information of the data packet may include at least one of the following information: information indicating a modulation mode of the data packet; information indicating a coding mode of the data packet; information indicating a manner of dividing the data packet ; and information to indicate the cascading mode of the packet.
  • the terminal device may complete the encapsulation of the data packet according to a pre-negotiated or protocol-prescribed transmission format between the network device and the terminal device.
  • the network device stores the data packet to the first network data storage system, and stores the control information of the data packet to the second network data storage system, wherein the control information is used to indicate the transmission format of the data packet (or The control information is used to indicate a parsing manner of the data packet.
  • At least one of the first network data storage system and the second network data storage system is a blockchain network.
  • step 120 may be performed first, or step 130 may be performed first, or step 120 and step 130 may be performed at the same time.
  • the method of FIG. 1 may further include: the network device parses the data packet; and if the data packet parsing succeeds, the network device stores the data packet to the first network.
  • the data storage system stores the control information to the second network data storage system, so as to ensure that the data stored in the first network data storage system is valid data that can be parsed.
  • the network device may send, to the terminal device, feedback information indicating that the data packet is successfully transmitted, and the feedback information may be, for example, ACK information.
  • the network device may not send feedback information to the terminal device, or send feedback information indicating that the data packet transmission fails to the terminal device, and the feedback information may be, for example, NACK information.
  • the network device may directly perform step 120 and step 130 without parsing the data packet, which may simplify the processing flow of the network device.
  • the network device may be any node capable of acquiring a data storage service provided by the first network data storage system.
  • the network device can be a node in the first network data storage system (ie, the network device can be a member of the first network data storage system).
  • the network device can be a node that is external to the first network data storage system but is capable of acquiring a data storage service provided by the first network data storage system.
  • the data packet described in step 120 is an unresolved data packet.
  • a packet unresolved can mean that the packet is completely unresolved, or that the packet portion is unresolved.
  • the unresolved data packet may mean that the L1 layer data and the L2 layer data of the data packet are not parsed.
  • the control information of the data packet may include the data for parsing the L1 layer data.
  • Control information and control information for parsing L2 layer data may indicate that the L1 layer data of the data packet has been parsed, but the L2 layer data is not parsed.
  • the control information of the data packet may include control information for parsing the L2 layer data, and is not included for Analyze the control information of the L1 layer data.
  • the embodiment of the present application separately stores user plane data (corresponding to the unresolved data packet in the above) and control panel data (corresponding to the above control information), which can reduce the possibility that the network data is attacked or falsified.
  • control panel data corresponding to the above control information
  • the second network data storage system is a blockchain network
  • the network device storing the control information of the data packet to the second network data storage system may include: the network device passing the blockchain network Consensus confirmation (or consensus authentication) and storage of control information.
  • the blockchain network uses the consensus mechanism to confirm the stored information to verify the authenticity of the information.
  • the information to be stored is confirmed by consensus, it can be stored in the zone.
  • the blockchain network and the use of the consensus mechanism can effectively improve the storage security of network data.
  • the consensus mechanism can be, for example, a workload proof mechanism or an equity proof mechanism.
  • the first network data storage system and the second network data storage system are both blockchain networks, so that the storage reliability of the user plane data and the control plane data are relatively high.
  • the first network data storage system may be a data center
  • the second network data storage system may be a blockchain network.
  • each node in the blockchain network gets a complete copy of the blockchain network database.
  • each node in the blockchain network stores the complete data of the blockchain network. Therefore, the embodiment of the present application stores the control information with a relatively small amount of data in the blockchain network, and stores the data packet with a relatively large amount of data in the data center, thereby improving the security of the network data storage and reducing the security.
  • the storage pressure of each node in the blockchain network is a relatively small amount of data in the blockchain network.
  • the network device may be any node capable of acquiring a data storage service of the second network data storage system.
  • the network device can be a node in the second network data storage system (ie, the network device can be a member of the second network data storage system).
  • the network device can be a node located outside of the second network data storage system and capable of acquiring a data storage service provided by the second network data storage system.
  • control information described above may be unencrypted control information or encrypted control information.
  • the control information is encrypted, and the storage security of the control information can be further improved.
  • the embodiment of the present application does not specifically limit the encryption method of the control information, and may perform encryption by using a symmetric encryption method or by using an asymmetric encryption method (such as a public-private key-based encryption method).
  • the embodiment of the present application does not specifically limit the encryptor of the control information, and may be encrypted by the network device or encrypted by the terminal device.
  • storing the control information of the data packet to the second network data storage system may include: the public key of the network device using the terminal device or the shared key of the terminal device and another terminal device
  • the control information is encrypted to obtain encrypted control information; the network device stores the encrypted control information to the second network data storage system.
  • the embodiment of the present application does not specifically limit the storage manner of the control information in the blockchain network, and may be stored in the same block of the blockchain network, or may be Stored in different blocks of the blockchain network.
  • the network device may divide the control information into at least two information blocks; the network device performs consensus confirmation on the at least two information blocks through the blockchain network, and at least two pieces of information through the blockchain network.
  • the blocks are stored separately in at least two blocks in the blockchain network.
  • the network device may first store the first information block into the blockchain network, and then, after a period of time, store the second information block to In the blockchain network, since the blocks in the blockchain network are generally connected in chronological order, the longer the time interval between the storage time of the first information block and the storage time of the second information block, the first information block The greater the probability that the second information block is stored in two different blocks.
  • the control information is divided into at least two information blocks, and the at least two information blocks are stored in different blocks of the blockchain network, which can improve the difficulty of tampering or deciphering the control information, thereby further improving the storage security of the network data. Sex.
  • Each block in the blockchain network has its own neighboring block, and adjacent blocks of the blockchain network may, for example, be directed to (or linked to) the previous block of the block, and/or the zone The next block pointed to (or linked to) by the block.
  • the network device may separately store the at least two pieces of information in the at least two blocks that are not adjacent to each other in the blockchain network. Storing different information blocks in the control information into mutually non-adjacent blocks in the blockchain network can further improve the difficulty of tampering or deciphering the control information, thereby further improving the storage security of the network data.
  • control information may be divided according to functions, or the control information may be divided according to a fixed size.
  • control information can be separated into L1 layer related information blocks and L2 layer related information blocks.
  • control information may be divided into K bits (where K ⁇ M), so that T information blocks, where K, M, and T are positive integers not less than one. And the result of T equal to M/K is rounded up.
  • the method of FIG. 1 may further include: the network device determines key information of the data to be stored; and the network device uses the public key of the terminal device to encrypt the key The key information is encrypted to obtain the encrypted key information; the network device performs consensus confirmation and storage on the encrypted key information through the blockchain network.
  • the data to be stored may be image data that has been encrypted, and the network device may perform consensus confirmation and storage on the encrypted password of the image data through the blockchain network.
  • the manner in which the network device determines the key information of the data to be stored is not specifically limited.
  • the network device and the terminal device may pre-negotiate the generation rule of the key information, and generate the rule key information according to the same, and then perform consensus confirmation and storage on the encrypted key information through the blockchain network.
  • network devices and terminal devices can also interact with key information in a more secure manner.
  • the key information of the data to be stored is also stored in the blockchain network, so that the storage amount required locally by the terminal device can be further reduced, and the local storage pressure is alleviated.
  • the network device may not feed back the storage information of the data packet to the terminal device (hereinafter the storage information is referred to as the first storage).
  • the first storage information may be used to indicate a storage location of the data packet in the first network data storage system) and storage information of the control information of the data packet (hereinafter the storage information is referred to as second storage information, and the second storage information is available Instructing the storage location of the control information in the second network data storage system).
  • the terminal device is a smart meter
  • the smart meter can store the power data to the network data storage system according to a certain period, and the power data can be called by other charging nodes in the network, but the smart meter itself does not need to access the stored data again. Power data to the network data storage system.
  • the network device does not need to feed back the first storage information and the second storage information to the smart meter.
  • the network device may send the first storage information and the second storage information to the terminal device.
  • the terminal device may reacquire the data according to the first storage information and the second storage information.
  • the network device can feed back the first storage information and the second storage information to the terminal device, which is not specifically limited in this embodiment of the present application.
  • the form of the first storage information and/or the second storage information is not specifically limited in the embodiment of the present application.
  • the first/second network data storage system is a data center
  • the first/second storage information may be a storage location or a storage index of the data packet.
  • the first/second storage information may be a storage address of the data packet in the second network data storage system.
  • the first/second network data storage system is a blockchain network
  • the first/second storage information may be an identification of a block in which the data packet is stored and/or an index of the data packet in the block.
  • the identity of the block can be a hash value (or a cryptographic hash value) of the block.
  • a block can be uniquely identified by the hash value of the block.
  • the hash value of the block may be a data fingerprint obtained by hashing the block header of the block by using a secure hash algorithm (SHA) 256.
  • SHA secure hash algorithm
  • the specific form of the hash value of the block may be, for example, 0000000kjakldsakljgklajg8239013490acjlkjlkajg910wit0qetsh.
  • the identifier of the block may also be the block height of the block.
  • the height of the block can indicate the location of the block throughout the blockchain. Taking a blockchain containing 1000 blocks as an example, the height of the first block of the block chain is generally 0, the height of the second block is 1, and so on. Using the block height as the identifier of the block allows you to quickly locate the block's position in the blockchain.
  • a block can store one or more packets.
  • the second storage information may further include an index of the data packet in the block, the index may be used to indicate a relative storage location of the data packet in the block, and the index may be used to The location of the packet in the block is quickly located to speed up the packet lookup process.
  • the terminal device receives the first storage information and the second storage information sent by the network device, where the first storage information is used to indicate a storage location of the data packet in the first network data storage system, and the second storage information is used to indicate Controlling a storage location in the second network data storage system, at least one of the first network data storage system and the second network data storage system is a blockchain network, and the control information is used to indicate the transmission of the data packet format;
  • step 150 the terminal device stores the first storage information and the second storage information.
  • the network device stores the data content corresponding to the data to be stored of the terminal device to the data center. Then, the terminal device can acquire, by the network device, storage information indicating the storage location of the data content in the data center. When the terminal device wants to read the data content again, the data content can be downloaded to the local device according to the storage information.
  • the data packet and the control information are separately stored and stored in the embodiment of the present application. Therefore, the terminal device obtains two different storage information, and one storage information (corresponding to the first storage information in the foregoing) indicates the data packet. In the storage location in the first network data storage system, another storage information (corresponding to the second storage information in the above) indicates a storage location of the data packet in the second network data storage system.
  • the terminal device may obtain the data packet according to the first storage information, obtain the control information according to the second storage information, and then parse the data packet with the control information, thereby obtaining the to-be-stored The data content in the data.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the method of FIG. 1 may further include: the terminal device encrypts the control information; the terminal device sends the encrypted control information to the network device, and instructs the network device to store the encrypted control information to the first Two network data storage systems.
  • the foregoing terminal device encrypting the control information may include: the terminal device encrypts the control information by using a public key of the terminal device or a shared key of the terminal device and another terminal device.
  • the terminal device may encrypt the control information by using the shared key of the terminal device and another terminal device, and store the encrypted control information to the second device through the network device.
  • the method for generating a shared key is not specifically limited in the embodiment of the present application.
  • a DH (Diffie-Hellman) algorithm may be used to enable two terminal devices to securely generate and exchange a shared key.
  • the another terminal device may first obtain an unresolved data packet from the first network data storage system, and obtain a shared secret from the second network data storage system. Key encryption control information; then, the other terminal device can decrypt the control information by using the shared key, and parse the data packet by using the decrypted control information, thereby obtaining the data content of the data packet.
  • FIG. 2 is a schematic flowchart of a method for processing data according to another embodiment of the present application.
  • the method of Figure 2 includes steps 210-250, which are described separately below.
  • the network device receives a data read request sent by the terminal device, where the data read request is used to request to read target data stored in the network, where the data read request includes the first stored information and the second stored information, first The storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system, and the second storage information is used to indicate the storage location of the control information of the data packet in the second network data storage system, and the control information is used for the control information.
  • the first network data storage system and the second network data storage system is a blockchain network.
  • the target data may be data stored in the network before the terminal device; or the target data is data stored in the network before the other terminal device.
  • the control information in the above may be control information obtained by encrypting using the shared key of the terminal device and another terminal device.
  • the network device may directly send the data packet and control information previously stored by the other terminal device to the terminal device, or verify the legitimacy of the terminal device.
  • the manner in which the network device verifies the legitimacy of the terminal device may be various.
  • the network device may acquire, from the other terminal device, an identifier set of the shared terminal device that can share data with the other terminal device.
  • the identifier set may be, for example, a public key set of the shared terminal device, if the terminal device that sends the data read request belongs to a certain terminal device identified by the identifier set, the subsequent steps may be continued; if the terminal device that sends the data read request does not belong to A terminal device identified by the identifier set may not perform subsequent steps.
  • the network device acquires the data packet from the first network data storage system according to the first storage information, and acquires the control information from the second network data storage system according to the second storage information.
  • Step 220 may be performed first, or step 230 may be performed first, or step 220 and step 230 may be performed at the same time.
  • step 240 the network device sends a data read response to the data read request to the terminal device, the data read response including the data packet and the control information.
  • the terminal device may store the target data to the network data storage system through a certain network device.
  • the network device used to store the target data may be the same network device as the network device described in FIG. 2, or may be a different network device.
  • the terminal device can implement storage and reading of target data through the same network device, and can also store and read target data through different network devices.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block and/or an index of a storage location of the control information in the target block, where the target A block is a block in a blockchain network for storing control information.
  • the identification of the target block is a hash value of the target block or a block height of the target block.
  • control information includes at least two information blocks
  • second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network, where at least two information blocks are respectively stored.
  • step 230 may include the network device acquiring at least two information blocks from the at least two blocks according to the second storage information.
  • control information may include at least one of the following information: information indicating a modulation mode of the data packet; information indicating a coding mode of the data packet; and indicating the data packet. Information about the split mode; and information indicating the cascading mode of the data packet.
  • step 250 the terminal device parses the data packet according to the control information to obtain target data.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the target data is data stored by another terminal device into the network
  • the control information is control information obtained by using a shared key of the terminal device and another terminal device, at the terminal device.
  • the method of FIG. 2 may further include: the terminal device acquiring the first storage information and the second storage information from another terminal device; the step 250 may include: the terminal device decrypting the control information by using the shared key The decrypted control information is obtained; the terminal device parses the data packet using the decrypted control information.
  • the following is a terminal device for the Internet of Things terminal device A (such as a smart meter, a smart water meter, an RFID terminal device, etc.), the first network data storage system is a data center, and the second network data storage system is a blockchain network, for example, in more detail.
  • the embodiments of the present application are described. It should be noted that the examples of FIG. 3 to FIG. 4 are only for facilitating the understanding of the embodiments of the present application, and the embodiments of the present application are not limited to the specific numerical values or specific scenarios illustrated. A person skilled in the art will be able to make various modifications or changes in the embodiments according to the examples of FIG. 3 to FIG. 4, and such modifications or variations are also within the scope of the embodiments of the present application.
  • FIG. 3 is a schematic flowchart of a data processing method according to another embodiment of the present application.
  • the method of Figure 3 includes steps 302-326.
  • step 302 the Internet of Things terminal device A determines the data to be stored.
  • the data to be stored may be power data.
  • the data to be stored may be a photo, a video, a file, or the like.
  • step 304 the Internet of Things terminal device A receives the uplink scheduling information sent by the network device.
  • the uplink scheduling information may indicate an uplink transmission resource allocated for the Internet of Things terminal device A.
  • the Internet of Things terminal device A can transmit data packets through the uplink transmission resource.
  • step 304 is an optional step, and the Internet of Things terminal device A can also directly perform uplink transmission in a scheduling-free manner. For example, the Internet of Things terminal device A can periodically send data packets to the network device through a preset unlicensed uplink transmission resource.
  • step 306 the Internet of Things terminal device A determines the transmission format of the data packet.
  • the uplink scheduling information described in step 304 may include control information for indicating a transmission format of the data packet, and the Internet of Things terminal device A may determine a transmission format of the data packet according to the control information.
  • the control information of the data packet may include at least one of the following information: information indicating a modulation mode of the data packet; information indicating a coding mode of the data packet; and indicating segmentation of the data packet Information of the mode; and information for indicating the cascading manner of the data packet.
  • the Internet of Things terminal device A can autonomously determine the transmission format of the data packet.
  • the IoT terminal device A can use a pre-negotiated or protocol pre-configured transport format.
  • step 308 the Internet of Things terminal device A transmits the data packet to the network device according to the determined transmission format.
  • step 310 the network device parses the received data packet.
  • step 312 if the data packet is successfully parsed, the network device sends feedback information to the Internet of Things terminal device A indicating that the data packet transmission is successful.
  • the feedback information may be, for example, ACK information.
  • the network device may send feedback information to the IoT terminal device A indicating that the packet transmission failed.
  • the feedback information may be, for example, NACK information.
  • steps 310-312 are optional steps, and the network device may also not parse the data packet and/or not feed back to the Internet of Things terminal device A feedback information indicating whether the data packet is successfully transmitted. For example, after receiving the data packet, the network device can directly store the data packet into the first network data storage system. The execution of steps 310-312 can ensure to some extent that the data stored in the network data storage system is valid data.
  • step 314 the network device stores the unresolved data packets to the data center.
  • the network device can send a data packet to a node in the data center to store the data packet to the data center through the node.
  • the network device encrypts the control information of the data packet using the public key of the Internet of Things terminal device A, and stores the encrypted control information in the blockchain network.
  • the network device may first obtain the public key of the Internet of Things terminal device A. For example, the network device may send indication information to the Internet of Things terminal device A, indicating that the Internet of Things terminal device A reports the public key of the Internet of Things terminal device A.
  • the network device may be a node of the blockchain network (ie, a member of the blockchain network), or any node outside the blockchain network that can acquire the data storage service of the blockchain network.
  • the network device can broadcast the data packet to other nodes of the blockchain network by broadcasting, so that each node in the blockchain network obtains one packet. Copy of.
  • step of encrypting the control information described in steps 316-318 is an optional step.
  • the network device may also encrypt the control information and directly store the control information in the blockchain network. .
  • the network device may also store the key information corresponding to the other encryption processing into the blockchain network.
  • the embodiment of the present application does not specifically limit the storage manner of the control information in the blockchain network.
  • the network device may store the control information as a whole in the same block in the blockchain network.
  • the network device may first divide the control information into at least two information blocks, and then store the at least two information blocks separately to at least two of the blockchain networks. In two blocks, this can increase the difficulty of stealing or deciphering control information, thereby further improving the storage security of network data.
  • the network device feeds back the first storage information and the second storage information to the terminal device.
  • the first stored information can be used to indicate where the data packet is stored in the data center.
  • the first indication information may be, for example, a storage address of the data packet in the data center.
  • the second stored information can be used to indicate where the control information is stored in the blockchain network.
  • the second indication information may be, for example, an identifier of a target block for storing control information, such as a block height of a target block or a hash value of a target block.
  • Step 320 The first storage information and the second storage information are simultaneously fed back to the terminal device, but the embodiment of the present application is not limited thereto.
  • the first storage information may be fed back to the terminal device, and After performing step 318, the second storage information is fed back to the terminal device.
  • steps 322-326 if the IoT terminal device A determines that the data in the data packet needs to be read, the IoT terminal device A obtains an unresolved data packet from the data center and acquires control of the data packet from the blockchain network. information.
  • Steps 324 and 326 are identified in Figure 3 by two dashed lines. These two dashed lines indicate that the Internet of Things terminal device A can acquire data packets and control information from nodes in the blockchain network and nodes in the data center through a specific network device (not shown in FIG. 3).
  • the specific network device may be, for example, a network device that is currently closest to the Internet of Things terminal device A, or a network device that has the best signal quality with the Internet of Things terminal device A.
  • the specific network device may be the network device for storing the data to be stored in the Internet of Things terminal device A in FIG. 3, or may be another network device, which is not specifically limited in this embodiment of the present application.
  • step 328 the Internet of Things terminal device A decrypts the control information of the data packet by using the private key of the Internet of Things terminal device A to obtain the decrypted control information, and then parses the data packet with the decrypted control information to obtain the data packet.
  • the data The data.
  • FIG. 3 is described by taking a first network data storage system as a data center and a second network data storage system as a blockchain network.
  • the first network data storage system can also be a blockchain network.
  • FIG. 4 is a schematic flowchart of a method for processing data according to another embodiment of the present application.
  • the embodiment of FIG. 4 is substantially similar to the flow of the embodiment of FIG. 3, except that the embodiment of FIG. 3 encrypts control information (described in step 316 of FIG. 3) by the network device, the embodiment of FIG.
  • the IoT terminal device A encrypts the control information using the shared key of the Internet of Things terminal device A and the Internet of Things terminal device B, so that the IoT terminal device A stores the data packet to the network data storage system, and the Internet of Things terminal device B
  • the shared key can be used to read data in the data packet, thereby implementing data sharing between the Internet of Things terminal device A and the Internet of Things terminal device B.
  • the method of Figure 4 includes steps 402-430, the steps of which are described below.
  • Steps 402-414 are similar to steps 302-314 of FIG. 3, and can be seen in the description of FIG. 3, and will not be described in detail herein.
  • step 416 the Internet of Things terminal device A encrypts the control information using the shared key of the Internet of Things terminal device A and the Internet of Things terminal device B.
  • the Internet of Things terminal device A can generate the shared key using the DH algorithm.
  • step 418 the Internet of Things terminal device A stores the encrypted control information in the blockchain network through the network device.
  • the Internet of Things terminal device A can send the encrypted control information to the network device, and the network device can broadcast the encrypted control information to the blockchain network through the node in the blockchain, so that the blockchain network Each node obtains a copy of the encrypted control information.
  • the network device feeds back the first storage information and the second storage information to the terminal device.
  • Step 420 is similar to step 320. See the description of FIG. 3, and details are not described herein.
  • step 422 the Internet of Things terminal device B determines that the object data stored in the network data storage system by the IoT terminal device A needs to be read.
  • step 424 the Internet of Things terminal device B communicates with the Internet of Things terminal device A to acquire the first storage information and the second storage information.
  • Steps 424-428 are similar to steps 322-326 of FIG. 3, except that in the embodiment of FIG. 3, the Internet of Things terminal device A decrypts the control information using the public key of the Internet of Things terminal device A, and the implementation of FIG. In the example, the Internet of Things terminal device B decrypts the control information by using the shared key of the Internet of Things terminal device A and the Internet of Things terminal device B.
  • the other processes are basically similar and will not be described in detail herein.
  • the Internet of Things terminal device A can also send an identifier set of other Internet of Things terminal devices capable of sharing data with the Internet of Things terminal device A to the network device, so that the network device receives the Internet of Things terminal initiated by the Internet of Things terminal device B.
  • the data read request of the device A is first, it is determined whether the identifier of the Internet of Things terminal device B belongs to the identifier set. If the identifier of the Internet of Things terminal device B belongs to the identifier set, the request of the Internet of Things terminal device B is responded.
  • the control information of the data packet and the data packet including the data of the Internet of Things terminal device A is sent to the Internet of Things terminal device B; if the identifier of the Internet of Things terminal device B does not belong to the identification set, the request of the Internet of Things terminal device B may not be performed. Respond, or reject the request of the Internet of Things Terminal B.
  • FIG. 5 is a schematic structural diagram of a network device according to an embodiment of the present application.
  • the network device 500 of Figure 5 can be used to perform the various steps performed by the network device in the method of Figure 1.
  • the network device 500 includes a receiving module 510 and a storage module 520. The functions of the various modules of the network device 500 are described in detail below.
  • the receiving module 510 is configured to receive a data packet that is sent by the terminal device and includes data to be stored.
  • the storage module 520 can be configured to store the data packet to the first network data storage system and store the control information of the data packet to the second network data storage system.
  • the control information is used to indicate a transmission format of the data packet.
  • At least one of the first network data storage system and the second network data storage system is a blockchain network.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the second network data storage system is a blockchain network
  • the storage module 520 is specifically configured to perform consensus confirmation and storage on the control information by using the blockchain network.
  • the storage module 520 may be specifically configured to divide the control information into at least two information blocks; and perform consensus confirmation on the at least two information blocks by using the blockchain network. And storing, by the blockchain network, the at least two information blocks into at least two of the blockchain networks.
  • the network device 500 may further include a determining module and an encryption module.
  • the determining module is configured to determine key information of the data to be stored.
  • the encryption module is configured to encrypt the key information by using a public key of the terminal device to obtain the encrypted key information.
  • the storage module 520 is further configured to perform consensus confirmation and storage on the encrypted key information by using the blockchain network.
  • the storage module 520 may be specifically configured to parse the data packet; if the data packet is successfully parsed, storing the data packet to the first network a data storage system and storing the control information to the second network data storage system.
  • the storage module 520 may be specifically configured to encrypt the control information by using a public key of the terminal device or a shared key of the terminal device and another terminal device, to obtain The encrypted control information; storing the encrypted control information to the second network data storage system.
  • the network device 500 may further include a sending module, configured to send, to the terminal device, first storage information and second storage information, where the first storage information is used to indicate the The storage location of the data packet in the first network data storage system, the second storage information being used to indicate a storage location of the control information of the data packet in the second network data storage system.
  • a sending module configured to send, to the terminal device, first storage information and second storage information, where the first storage information is used to indicate the The storage location of the data packet in the first network data storage system, the second storage information being used to indicate a storage location of the control information of the data packet in the second network data storage system.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application.
  • the terminal device 600 of Figure 6 can be used to perform the various steps performed by the terminal device in the method of Figure 1.
  • the terminal device 600 may include a transmitting module 610 and a receiving module 620, and the functions of the respective modules in the terminal device 600 are described in detail below.
  • the sending module 610 is configured to send, to the network device, a data packet that includes data to be stored;
  • the receiving module 620 is configured to receive first storage information and second storage information that are sent by the network device, where the first storage information is used to indicate a storage location of the data packet in the first network data storage system.
  • the second storage information is used to indicate a storage location of the control information in the second network data storage system, and the at least one network data storage system of the first network data storage system and the second network data storage system is A blockchain network, the control information being used to indicate a transmission format of the data packet.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • control information includes at least two information blocks, where the second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network.
  • the at least two information blocks are respectively stored in at least two blocks of the blockchain network.
  • the terminal device 600 may further include an encryption module.
  • the encryption module may be configured to encrypt the control information before the receiving module 620 receives the first storage information and the second storage information sent by the network device; the sending module 610 is further configured to use the network And transmitting, by the device, the encrypted control information, to instruct the network device to store the encrypted control information to the second network data storage system.
  • the encryption module is specifically configured to encrypt the control information by using a public key of the terminal device or a shared key of the terminal device and another terminal device.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • FIG. 7 is a schematic structural diagram of a network device according to another embodiment of the present application.
  • the network device 700 of Figure 7 can be used to perform the various steps performed by the network device in the method of Figure 2.
  • the network device 700 can include a receiving module 710, an obtaining module 720, and a sending module 730. The functions of the various modules in the network device 700 are described in detail below.
  • the receiving module 710 is configured to receive a data read request sent by the terminal device, where the data read request is used to request to read target data stored in the network, where the data read request includes the first storage information and the second storage.
  • Information the first storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system, and the second storage information is used to indicate that the control information of the data packet is in the second a storage location in the network data storage system, the control information is used to indicate a transmission format of the data packet, and at least one network data storage system in the first network data storage system and the second network data storage system is Blockchain network.
  • the obtaining module 720 is configured to acquire the data packet from the first network data storage system according to the first storage information, and obtain, according to the second storage information, the second network data storage system. Control information.
  • the sending module 730 is configured to send a data read response to the data read request to the terminal device, where the data read response includes the data packet and the control information.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the target block is a block in the blockchain network for storing the control information.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • control information includes at least two information blocks, where the second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network.
  • the at least two information blocks are respectively stored in the at least two blocks of the blockchain network, and the obtaining module 720 is specifically configured to use the second storage information from the at least two blocks. Obtaining the at least two pieces of information.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • FIG. 8 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
  • the terminal device 800 of Figure 8 can be used to perform the various steps performed by the terminal device in the method of Figure 2.
  • the terminal device 800 can include a transmitting module 810, a receiving module 820, and a parsing module 830.
  • the sending module 810 is configured to send a data read request to the network device, where the data read request is used to request to read target data stored in the network, where the data read request includes the first storage information and the second storage information.
  • the first storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system
  • the second storage information is used to indicate that the control information of the data packet is in the second network.
  • a storage location in the data storage system the control information is used to indicate a transmission format of the data packet, and at least one network data storage system in the first network data storage system and the second network data storage system is a zone Blockchain network.
  • the receiving module 820 is configured to receive a data read response sent by the network device for the data read request, where the data read response includes the data packet and the control information.
  • the parsing module 830 is configured to parse the data packet according to the control information to obtain the target data.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • the target data is data stored by another terminal device into the network
  • the control information is a shared key using the terminal device and the another terminal device.
  • the control device obtains the control information
  • the terminal device further includes an obtaining module, configured to acquire the first storage information and the second storage information from the another terminal device before sending the data read request to the network device
  • the parsing module 830 may be specifically configured to decrypt the control information by using the shared key to obtain decrypted control information, and parse the data packet by using the decrypted control information.
  • control information includes at least two information blocks, where the second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network.
  • the at least two information blocks are respectively stored in at least two blocks of the blockchain network.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • FIG. 9 is a schematic structural diagram of a network device according to another embodiment of the present application.
  • the network device 900 of Figure 9 can be used to perform the various steps performed by the network device in the method of Figure 1.
  • Network device 900 includes a receiver 910 and a memory 920.
  • the receiver 910 is configured to receive a data packet that is sent by the terminal device and includes data to be stored.
  • the memory 920 is configured to store the data packet received by the receiver 910 to a first network data storage system, and store control information of the data packet to a second network data storage system, where the control information And indicating a transmission format of the data packet, where at least one of the first network data storage system and the second network data storage system is a blockchain network.
  • the embodiment of the present application separates and stores user plane data and control panel data, which can reduce the possibility of network data being attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the network device 900 further includes: a processor, configured to parse the data packet; the memory 920 is specifically configured to successfully parse the data packet by the processor And storing the data packet to the first network data storage system and storing the control information to the second network data storage system.
  • the processor is further configured to encrypt the control information by using a public key of the terminal device or a shared key of the terminal device and another terminal device to obtain encryption.
  • the control information is used to store the control information encrypted by the processor to the second network data storage system.
  • the memory 920 is specifically configured to perform consensus confirmation and storage on the control information by using the blockchain network when the second network data storage system is a blockchain network. .
  • the processor is configured to divide the control information stored by the memory 920 into at least two information blocks; the memory 920 is specifically configured to perform the processing by using the blockchain network.
  • the at least two pieces of information divided by the device are subjected to consensus confirmation, and the at least two pieces of information are respectively stored into at least two blocks in the block chain network through the blockchain network.
  • the processor is configured to determine key information of the data to be stored, and encrypt the key information by using a public key of the terminal device to obtain an encrypted device.
  • the key information is used to perform consensus confirmation and storage on the key information encrypted by the processor through the blockchain network.
  • the network device 900 further includes: a transmitter, configured to send, to the terminal device, first storage information and second storage information, where the first storage information is used to indicate the The storage location of the data packet in the first network data storage system, the second storage information being used to indicate a storage location of the control information of the data packet in the second network data storage system.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • FIG. 10 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
  • the terminal device 1000 of FIG. 10 can be used to perform the various steps performed by the terminal device in the method of FIG. 1.
  • the terminal device 1000 may include a transmitter 1010, a receiver 1020, and a memory 1030.
  • the transmitter 1010 is configured to send, to the network device, a data packet that includes data to be stored;
  • the receiver 1020 is configured to receive first storage information and second storage information that are sent by the network device, where the first storage information is used to indicate that the data packet sent by the sender 1010 is in a first network data storage. a storage location in the system, the second storage information is used to indicate a storage location of the control information in a second network data storage system, in the first network data storage system and the second network data storage system At least one network data storage system is a blockchain network, and the control information is used to indicate a transmission format of the data packet;
  • the memory 1030 is configured to store the first storage information and the second storage information.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • control information includes at least two information blocks, where the second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network.
  • the at least two information blocks are respectively stored in at least two blocks of the blockchain network.
  • the terminal device 1000 further includes: a processor, configured to encrypt the control information; the transmitter 1010 is further configured to send the encrypted device to the network device Control information, the control information being used to instruct the network device to store the encrypted control information to the second network data storage system.
  • the processor is specifically configured to encrypt the control information by using a public key of the terminal device 1000 or a shared key of the terminal device 1000 and another terminal device.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • FIG. 11 is a schematic structural diagram of a network device according to another embodiment of the present application.
  • the network device 1100 of Figure 11 can be used to perform the various steps performed by the network device in the method of Figure 2.
  • Network device 1100 can include a receiver 1110, a processor 1120, and a transmitter 1130.
  • the receiver 1110 is configured to receive a data read request sent by the terminal device, where the data read request is used to request to read target data stored in the network, where the data read request includes the first storage information and the second storage.
  • Information the first storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system, and the second storage information is used to indicate that the control information of the data packet is in the second a storage location in the network data storage system, the control information is used to indicate a transmission format of the data packet, and at least one network data storage system in the first network data storage system and the second network data storage system is Blockchain network;
  • the processor 1120 is configured to acquire, according to the first storage information received by the receiver 1110, the data packet from the first network data storage system, and according to the second storage information, from the second Obtaining the control information in a network data storage system;
  • the transmitter 1130 is configured to send a data read response to the data read request to the terminal device, where the data read response includes the data packet and the control information acquired by the processor 1120.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • the processor 1120 is specifically configured to: when the control information includes at least two information blocks, the second storage information is used to indicate that the at least two information blocks are each located a storage location in the blockchain network, wherein the at least two information blocks are respectively stored in at least two blocks of the blockchain network, from the at least two blocks according to the second storage information Obtaining the at least two pieces of information.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • FIG. 12 is a schematic structural diagram of a terminal device according to another embodiment of the present application.
  • the terminal device 1200 of Figure 12 can be used to perform the various steps performed by the terminal device in the method of Figure 2.
  • the terminal device 1200 can include a transmitter 1210, a receiver 1220, and a processor 1230.
  • the transmitter 1210 is configured to send a data read request to the network device, where the data read request is used to request to read target data stored in the network, where the data read request includes the first storage information and the second storage information.
  • the first storage information is used to indicate a storage location of the data packet including the target data in the first network data storage system
  • the second storage information is used to indicate that the control information of the data packet is in the second network.
  • a storage location in the data storage system the control information is used to indicate a transmission format of the data packet
  • at least one network data storage system in the first network data storage system and the second network data storage system is a zone Blockchain network
  • the receiver 1220 is configured to receive a data read response sent by the network device for the data read request, where the data read response includes the data packet and the control information;
  • the processor 1230 is configured to parse the data packet according to the control information to obtain the target data.
  • the embodiment of the present application separates and stores the user plane data and the control panel data, which can reduce the possibility that the network data is attacked or falsified.
  • user plane data and/or control plane data are stored in the blockchain network, the storage security of the network data is improved.
  • the second network data storage system is a blockchain network
  • the second storage information includes an identifier of the target block
  • the control information is in the target block.
  • the identifier of the target block is a hash value of the target block or a block height of the target block.
  • the receiver 1220 is further configured to: use the terminal device 1200 and the control information to be data stored in the network by another terminal device, and In the case that the control information obtained by the shared key of the other terminal device is encrypted, the first storage information is acquired from the another terminal device before the terminal device 1200 sends a data read request to the network device. And the second storage information; the processor 1230 is specifically configured to decrypt the control information by using the shared key to obtain decrypted control information; and parse the data packet by using the decrypted control information.
  • control information includes at least two information blocks, where the second storage information is used to indicate a storage location of each of the at least two information blocks in the blockchain network.
  • the at least two information blocks are respectively stored in at least two blocks of the blockchain network.
  • control information includes at least one of the following information: information used to indicate a modulation mode of the data packet; information used to indicate a coding mode of the data packet; And information indicating a manner of dividing the data packet; and information indicating a cascading manner of the data packet.
  • the computer program product includes one or more computer instructions.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transmission to another website site, computer, server or data center via wired (eg coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (such as a digital video disc (DVD)), or a semiconductor medium (such as a solid state disk (SSD)).
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium such as a digital video disc (DVD)
  • a semiconductor medium such as a solid state disk (SSD)
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种处理数据的方法、终端设备和网络设备,包括:网络设备接收终端设备发送的包含待存储数据的数据包;网络设备将数据包存储至第一网络数据存储系统,并将数据包的控制信息存储至第二网络数据存储系统,其中控制信息用于指示数据包的传输格式,第一网络数据存储系统和第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。本申请提供的技术方案能够提高网络数据的存储安全性。

Description

处理数据的方法、终端设备和网络设备
本申请要求于2017年07月27日提交中国专利局、申请号为201710626150.7、申请名称为“处理数据的方法、终端设备和网络设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体地,涉及一种处理数据的方法、终端设备和网络设备。
背景技术
随着计算机技术以及网络技术的高速发展,计算机自带的存储器逐渐难以满足存取速度快、存储容量大和成本低等诸多要求,于是发展出相对独立的网络数据存储系统。数据中心(即存储数据的中心)是一种传统的网络数据存储系统,通常包含多个存储服务器。这些存储服务器一般具有自己的接口和协议,并通过同轴电缆、网线、光纤等方式与计算机主机连接,为计算机主机提供存储服务。
数据中心可以对网络数据进行集中化的存储和管理。但是,网络数据的集中化存储和管理带来了安全性问题,例如,一旦数据中心被攻击或数据中心存储的数据被篡改,可能会导致网络数据的丢失。
发明内容
本申请提供一种处理数据的方法、终端设备和网络设备,以提高网络数据的存储安全性。
第一方面,提供一种处理数据的方法,包括:网络设备接收终端设备发送的包含待存储数据的数据包;所述网络设备将所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统,其中所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
通过对用户面数据(对应于上文中的数据包)和控制面板数据(对应于上文中的控制信息)进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
在一个可能的设计中,所述第二网络数据存储系统为区块链网络,所述网络设备将所述数据包的控制信息存储至第二网络数据存储系统,包括:所述网络设备通过所述区块链网络对所述控制信息进行共识确认和存储。进一步地,在某些实现方式中,第一网络数据存储系统可以为数据中心。
将数据量相对较小的控制信息存储至区块链网络中,将数据量相对较大的数据包存储 至数据中心,既能提高网络数据存储的安全性,又能降低区块链网络中的各节点的存储压力。
在一个可能的设计中,所述网络设备通过所述区块链网络对所述控制信息进行共识确认和存储,包括:所述网络设备将所述控制信息分割为至少两个信息块;所述网络设备通过所述区块链网络对所述至少两个信息块进行共识确认,并通过所述区块链网络将所述至少两个信息块分别存储至所述区块链网络中的至少两个区块中。
将控制信息分割成至少两个信息块,并将该至少两个信息块存储在区块链网络的不同区块中,可以提高控制信息被篡改或破译的难度,从而进一步提升网络数据的存储安全性。
在一个可能的设计中,所述方法还包括:所述网络设备确定所述待存储数据的密钥信息;所述网络设备使用所述终端设备的公钥对所述密钥信息进行加密,得到加密后的所述密钥信息;所述网络设备通过所述区块链网络对加密后的所述密钥信息进行共识确认和存储。
将待存储数据的密钥信息也存储至区块链网络中,这样可以进一步降低终端设备本地所需的存储量,减轻本地存储压力。
在一个可能的设计中,所述网络设备将所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统,包括:所述网络设备对所述数据包进行解析;在所述数据包解析成功的情况下,所述网络设备将所述数据包存储至所述第一网络数据存储系统,并将所述控制信息存储至所述第二网络数据存储系统。
上述方案保证了第一网络数据存储系统中存储的数据均是可解析的有效数据。
在一个可能的设计中,所述网络设备将所述数据包的控制信息存储至第二网络数据存储系统,包括:所述网络设备使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密,得到加密后的所述控制信息;所述网络设备将加密后的所述控制信息存储至所述第二网络数据存储系统。
将控制信息存储至第二网络数据存储系统之前,对控制信息进行加密,可以进一步地提高控制信息的存储安全性。
在一个可能的设计中,所述方法还包括:所述网络设备向所述终端设备发送第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在所述第二网络数据存储系统中的存储位置。
向终端设备反馈第一存储信息和第二存储信息,方便终端设备对数据包中的数据的后续访问。
第二方面,提供一种处理数据的方法,包括:终端设备向网络设备发送包含待存储数据的数据包;所述终端设备接收所述网络设备发送的第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述控制信息在第二网络数据存储系统中的存储位置,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络,所述控制信息用于指示所述数据包的传输格式;所述终端设备存储所述第一存储信息和所述第二存储信息。
通过对用户面数据(对应于上文中的数据包)和控制面板数据(对应于上文中的控制 信息)进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
在一个可能的设计中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
在一个可能的设计中,将控制信息分割成至少两个信息块,并将该至少两个信息块存储在区块链网络的不同区块中,可以提高控制信息被篡改或破译的难度,从而进一步提升网络数据的存储安全性。
在一个可能的设计中,在所述终端设备接收所述网络设备发送的第一存储信息和第二存储信息之前,所述方法还包括:所述终端设备对所述控制信息进行加密;所述终端设备向所述网络设备发送加密后的所述控制信息,指示所述网络设备将所述加密后的所述控制信息存储至所述第二网络数据存储系统。
将控制信息存储至第二网络数据存储系统之前,对控制信息进行加密,可以进一步地提高控制信息的存储安全性。
在一个可能的设计中,所述终端设备对所述控制信息进行加密,包括:所述终端设备使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密。
第三方面,提供一种处理数据的方法,包括:网络设备接收终端设备发送的数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络;所述网络设备根据所述第一存储信息从所述第一网络数据存储系统中获取所述数据包,并根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息;所述网络设备向所述终端设备发送针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述数据包和所述控制信息。
通过对用户面数据(对应于上文中的数据包)和控制面板数据(对应于上文中的控制信息)进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
在一个可能的设计中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中,所述网络设备根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息,包括:所述网络设备根据所述第二存储信息从所述至少两个区块中获取所述至少两个信息块。
将控制信息分割成至少两个信息块,并将该至少两个信息块存储在区块链网络的不同区块中,可以提高控制信息被篡改或破译的难度,从而进一步提升网络数据的存储安全性。
第四方面,提供一种处理数据的方法,包括:终端设备向网络设备发送数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储 信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络;所述终端设备接收所述网络设备发送的针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述数据包和所述控制信息;所述终端设备根据所述控制信息解析所述数据包,得到所述目标数据。
通过对用户面数据(对应于上文中的数据包)和控制面板数据(对应于上文中的控制信息)进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
在一个可能的设计中,所述目标数据是另一终端设备存储至所述网络中的数据,且所述控制信息是使用所述终端设备和所述另一终端设备的共享密钥加密后得到的控制信息,在所述终端设备向网络设备发送数据读取请求之前,所述方法还包括:所述终端设备从所述另一终端设备获取所述第一存储信息和所述第二存储信息;所述终端设备根据所述控制信息解析所述数据包,包括:所述终端设备使用所述共享密钥解密所述控制信息,得到解密后的控制信息;所述终端设备使用解密后的所述控制信息,解析所述数据包。
通过共享密钥对控制信息加密,能够实现终端设备之间的数据共享。
在一个可能的设计中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
将控制信息分割成至少两个信息块,并将该至少两个信息块存储在区块链网络的不同区块中,可以提高控制信息被篡改或破译的难度,从而进一步提升网络数据的存储安全性。
第五方面,提供一种网络设备,包括接收器和存储器。所述接收器用于接收终端设备发送的包含待存储数据的数据包。所述存储器用于将所述接收器接收的所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统。其中所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
第六方面,提供一种终端设备,包括发送器、接收器和存储器。所述发送器用于向网络设备发送包含待存储数据的数据包。所述接收器用于接收所述网络设备发送的第一存储信息和第二存储信息。所述第一存储信息用于指示所述发送器发送的所述数据包在第一网络数据存储系统中的存储位置。所述第二存储信息用于指示所述控制信息在第二网络数据存储系统中的存储位置。所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。所述控制信息用于指示所述数据包的传输格式。所述存储器用于存储所述第一存储信息和所述第二存储信息。
第七方面,提供一种网络设备,包括接收器、处理器和发送器。所述接收器用于接收终端设备发送的数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所 述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。所述处理器用于根据所述接收器接收的所述第一存储信息从所述第一网络数据存储系统中获取所述数据包,并根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息。所述发送器用于向所述终端设备发送针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述处理器获取的所述数据包和所述控制信息。
第八方面,提供一种终端设备,包括发送器、接收器和处理器。所述发送器用于向网络设备发送数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。所述接收器用于接收所述网络设备发送的针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述数据包和所述控制信息。所述处理器1430用于根据所述控制信息解析所述数据包,得到所述目标数据。
第九方面,提供一种网络设备,包括存储器、处理器和收发器。所述存储器用于存储计算机指令,所述处理器用于执行所述存储器中存储的计算机指令,以通过所述收发器执行第一方面或第三方面所述的方法。
第十方面,提供一种终端设备,包括存储器、处理器和收发器。所述存储器用于存储计算机指令,所述处理器用于执行所述存储器中存储的计算机指令,以通过所述收发器执行第二方面或第四方面所述的方法。
第十一方面,提供一种芯片,包括存储器和处理器,所述存储器用于存储计算机指令,所述处理器用于执行所述存储器中存储的计算机指令,以通过收发器执行上述各方面描述的方法。
第十二方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在网络设备上运行时,使得网络设备执行第一方面或第三方面所述的方法。
第十三方面,提供一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在终端设备上运行时,使得终端设备执行第二方面或第四方面所述的方法。
第十四方面,提供一种包含指令的计算机程序产品,当其在网络设备上运行时,使得网络设备执行第一方面或第三方面所述的方法。
第十五方面,提供一种包含指令的计算机程序产品,当其在终端设备上运行时,使得终端设备执行第二方面或第四方面所述的方法。
第十六方面,提供一种网络设备,包含用于执行第一方面或第三方面所述的方法的模块。
第十七方面,提供一种终端设备,包含用于执行第二方面或第四方面所述的方法的模块。
在一个可能的设计中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
在一个可能的设计中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
在一个可能的设计中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
本申请对用户面数据(对应于上文中的数据包)和控制面板数据(对应于上文中的控制信息)进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
附图说明
图1是本申请一个实施例提供的处理数据的方法。
图2是本申请另一实施例提供的处理数据的方法的示意性流程图。
图3是本申请又一实施例提供的数据处理方法的示意性流程图。
图4是本申请又一实施例提供的处理数据的方法的示意性流程图。
图5是本申请一个实施例提供的网络设备的示意性结构图。
图6是本申请一个实施例提供的终端设备的示意性结构图。
图7是本申请另一实施例提供的网络设备的示意性结构图。
图8是本申请另一实施例提供的终端设备的示意性结构图。
图9是本申请又一实施例提供的网络设备的示意性结构图。
图10是本申请又一实施例提供的终端设备的示意性结构图。
图11是本申请又一实施例提供的网络设备的示意性结构图。
图12是本申请又一实施例提供的终端设备的示意性结构图。
具体实施方式
应理解,本申请提及的终端设备是指有数据存储需求、且能够通过网络中的某个网络设备将数据存储至网络数据存储系统的任意设备。在一些实施例中,终端设备可以是固定终端设备,也可以是移动终端设备。可选地,在一些实施例中,本申请提及的终端设备可以是低能力、低功耗的终端设备,这种终端设备受到自身能力的限制,可能无法直接接入网络数据存储系统,但可以通过某个网络设备间接将本地数据存储至网络数据存储系统。具体地,本申请提及的终端设备可以包括但不限于台式电脑、智能电表、移动台(mobile station,MS)、移动终端设备(mobile terminal)、移动电话(mobile telephone)、用户设备(user equipment,UE)、手机(handset)、便携设备(portable equipment)及物流用的射频识别(radio frequency identification,RFID)终端设备等。
还应理解,本申请提及的网络设备可以是能够接收终端设备发送的待存储数据,并将待存储数据存储至网络数据存储系统的任意网络设备。该网络设备可以包括但不限于交换机、路由器、基站、中继节点、网络中的服务器等。
本申请实施例对网络设备和网络数据存储系统之间的关系不做具体限定,只要该网络设备能够获取网络数据存储系统提供的网络数据存储服务即可。作为一个示例,该网络设备可以是网络数据存储系统中的节点。例如,网络设备可以是数据中心的节点和/或区块 链(blockchain)网络中的节点。作为另一个示例,网络设备也可以是位于网络数据存储系统之外的、且能够与网络数据存储系统中的节点进行通信的节点。例如,网络设备可以安装有网络数据存储系统的客户端,并能够通过该客户端获取网络数据存储系统的数据存储服务。
本申请实施例中,终端设备和网络设备通过网络连接,并能够通过该网络进行通信和数据转发。但本申请实施例对该网络的类型不做具体限定,可以是有线网络,也可以是无线网络。
作为一个示例,终端设备和网络设备之间可以通过有线网络连接,例如终端设备和网络设备可以通过同轴电缆、网线、光纤连接。
作为另一个示例,终端设备和网络设备可以通过无线网络连接。该无线网络例如可以是无线局域网(wireless local area network,WLAN)、全球移动通讯(global system for mobile communication,GSM)系统、码分多址(code division multiple access,CDMA)系统、宽带码分多址(wideband code division multiple access,WCDMA)系统、通用分组无线业务(general packet radio service,GPRS)、长期演进(long term evolution,LTE)系统、先进的长期演进(advanced long term evolution,LTE-A)系统、通用移动通信系统(universal mobile telecommunication system,UMTS)、NR(new radio)等。
更为具体地,终端设备和网络设备可以通过物联网(internet of thing,IoT)连接。物联网作为互联网基础上延伸和扩展的网络,通过应用智能感知、识别技术与普适计算等计算机技术,实现信息交换和通信。物联网中的终端设备(或称物联网终端设备)例如可以是智能电表,RFID终端设备等,物联网终端设备一般能力较弱,可能无法直接接入网络数据存储系统,需要通过能力较强的网络设备间接接入网络数据存储系统。
本申请提及的网络数据存储系统可以包括数据中心和/或区块链网络。下面分别对数据中心和区块链网络进行介绍。
数据中心是一种能够对网络数据进行集中化存储和管理的网络数据存储系统。数据中心可以包括能够存储数据的许多节点。这些节点例如可以是存储服务器。数据中心中的节点之间可以通过低延迟、高吞吐量的网络(例如光纤通道、10G以太网)相连形成集群,对外提供数据存储服务。数据中心中的节点的用于存储数据的存储介例如可以是磁盘、固态硬盘(solid state drives,SSD)等。
区块链网络也可称为区块链,是一种新型的分布式网络数据存储系统,相比于传统的网络数据存储系统(如数据中心),区块链提供的网络数据存储方式更加安全可靠。下面对区块链的相关概念进行详细介绍。
从广义上看,区块链是利用块链式数据结构来存储数据、利用分布式节点共识机制来验证数据、利用密码学的方式保证数据传输和访问的安全、利用由自动化脚本代码组成的智能合约来编程和操作数据的一种全新的分布式基础架构与计算范式。由于区块链最初主要应用于记录账目信息,因此,从狭义上看,区块链可以理解为按照时间顺序将用于存储数据的区块(block)以顺序相连的方式组合成的一种链式数据结构,并以密码学方式保证的不可篡改和不可伪造的分布式账本。当然,随着技术的方案,区块链网络越来越多的应用于其他数据存储领域,而不仅限于存储账目信息。
实际上,区块链可以理解为一种去中心化去信任的、且由分布式节点集体维护的可靠 数据库。分布式网络是区块链网络的基础设施,分布式网络中的每个节点上产生的数据可以通过分布式网络广播到其他节点,使得区块链网络中的每个节点均可获得一份完整的数据库拷贝。其他节点可以通过某种共识机制来验证数据的真实性。该共识机制例如可以是工作量证明机制,也可以是权益证明机制。在区块链网络技术中,除非能够同时控制整个区块链网络中的超过51%的节点,否则单个节点对数据库的修改是无效的,也无法影响其他节点上存储的数据。通常来讲,参与区块链网络的节点数量非常庞大,同时控制超过51%的节点的可能性微乎其微,因此,区块链网络被认为是一种可靠性较高的网络数据存储系统。
区块链的种类包括公有区块链、联盟区块链和私有区块链等。本申请提及的区块链可以是公有区块链、联盟区块链和私有区块链中的任一种。区块链网络中的节点可以是网络中的任意节点,例如可以是手机、个人数字助理(personal digital assistant,PDA)、无线手持设备、平板电脑(tablet computer)、个人电脑(personal computer,PC)、可穿戴设备等终端设备,也可以是应用服务器、网络服务器等节点。
在相关技术中,当终端设备希望将本地数据(如相片、视频、文档、电表的电量数据等)存储至位于云端的网络数据存储系统时,终端设备可以将待存储数据封装成数据包,然后将该数据包发送至能够获取网络数据存储系统提供的数据存储服务的网络设备。在接收到终端设备发送的数据包之后,网络设备可以对该数据包进行解析,得到待存储数据,并将该待存储数据存储至数据中心。
数据中心可以对网络数据进行集中化存储和管理。但是,数据的集中化存储和管理会引发安全性问题,例如,一旦数据中心被攻击或数据中心存储的数据被篡改,可能会导致数据的丢失。
为了提高网络数据的存储安全性,本申请实施例并非将待存储数据直接存储至数据中心,而是将待存储数据分为未解析的数据包(用户面数据)以及该数据包的控制信息(控制面数据),并对用户面数据和控制面数据进行分离存储,且用户面数据和控制面数据中的至少一种数据会被存储至区块链网络中,从而为用户面数据和/或控制面数据提供更加安全可靠的数据存储服务。下面结合具体的附图,对本申请实施例进行详细的描述。
图1是本申请一个实施例提供的处理数据的方法的示意性流程图。图1的方法可以包括步骤110-150,下面对图1的步骤进行详细描述。
在步骤110中,网络设备接收终端设备发送的包含待存储数据的数据包。
该待存储数据可以是终端设备希望存储至网络中的数据,该数据例如可以是视频、相片、文件、电表数据,RFID数据等。
应理解,终端设备可以通过一定的上行传输资源传输数据包。本申请实施例对该上行传输资源的获取方式不做具体限定。可选地,在一些实施例中,终端设备可以在网络设备的调度下获取上行传输资源,例如,在网络设备接收终端设备发送的数据包之前,网络设备可以先向终端设备发送上行调度信息,以指示用于传输数据包的上行传输资源。可选地,在另一些实施例中,终端设备可以自主获取上行传输资源,例如,终端设备可以基于竞争机制获取免授权的上行传输资源。
步骤110之前,终端设备需要按照一定的传输格式将待存储数据封装成数据包。本申请实施例对数据包的传输格式的确定方式不做具体限定。可选地,在一些实施例中,在网 络设备接收终端设备发送的数据包之前,网络设备可以先向终端设备发送上行调度信息,该上行调度信息可以包含数据包的控制信息,该控制信息可以指示数据包的传输格式,例如可以指示L1层对应的传输格式和/或L2层对应的传输格式,其中L1层可以指物理层,L2层可以指媒体接入控制(media access control,MAC)层/无线链路层控制协议(radio link control,RLC)层。举例说明,数据包的控制信息可以包括以下信息中的至少一种:用于指示数据包的调制方式的信息;用于指示数据包的编码方式的信息;用于指示数据包的分割方式的信息;以及用于指示数据包的级联方式的信息。可选地,在另一些实施例中,终端设备可以按照网络设备和终端设备之间预先协商的或协议预定的传输格式完成数据包的封装。
在步骤120-130中,网络设备将数据包存储至第一网络数据存储系统,并将数据包的控制信息存储至第二网络数据存储系统,其中控制信息用于指示数据包的传输格式(或者,控制信息用于指示数据包的解析方式),第一网络数据存储系统和第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
应理解,本申请实施例对步骤120和步骤130的先后顺序不做具体限定,可以先执行步骤120,也可以先执行步骤130,也可以同时执行步骤120和步骤130。
可选地,在一些实施例中,在步骤120之前,图1的方法还可包括:网络设备对数据包进行解析;在数据包解析成功的情况下,网络设备将数据包存储至第一网络数据存储系统,并将控制信息存储至第二网络数据存储系统,这样可以保证第一网络数据存储系统中存储的数据均是可解析的有效数据。
进一步地,在网络设备成功解析该数据包的情况下,网络设备可以向终端设备发送用于指示该数据包传输成功的反馈信息,该反馈信息例如可以是ACK信息。在网络设备未能成功解析该数据包的情况下,网络设备可以不向终端设备发送反馈信息,或者向终端设备发送指示该数据包传输失败的反馈信息,该反馈信息例如可以是NACK信息。当然,在一些实施例中,网络设备可也以不对数据包进行解析,直接执行步骤120和步骤130,这样可以简化网络设备的处理流程。
网络设备可以是能够获取第一网络数据存储系统提供的数据存储服务的任意节点。例如,网络设备可以是第一网络数据存储系统中的节点(即网络设备可以是第一网络数据存储系统的成员)。又如,网络设备可以是位于第一网络数据存储系统外部,但能够获取第一网络数据存储系统提供的数据存储服务的节点。
应理解,步骤120中描述的数据包是未解析的数据包。数据包未解析可以指数据包完全未解析,或数据包部分未解析。假设数据包包含L1层数据和L2层数据,则数据包未解析可以指数据包的L1层数据和L2层数据均未解析,相应地,数据包的控制信息可以包含用于解析L1层数据的控制信息和用于解析L2层数据的控制信息。又如,数据包未解析可以指数据包的L1层数据已解析,但L2层数据未解析,相应地,数据包的控制信息可以包含用于解析L2层数据的控制信息,而不包含用于解析L1层数据的控制信息。
本申请实施例对用户面数据(对应于上文中的未解析的数据包)和控制面板数据(对应于上文中的控制信息)进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,第二网络数据存储系统为区块链网络,所述网络设备将数 据包的控制信息存储至第二网络数据存储系统可以包括:网络设备通过区块链网络对控制信息进行共识确认(或称共识认证)和存储。
如前文所述,区块链网络在对信息进行存储之前,会利用共识机制对待存储的信息进行共识确认,以验证信息的真实性,当待存储的信息通过共识确认之后,才能够存储至区块链网络,共识机制的使用可以有效提高网络数据的存储安全性。该共识机制例如可以是工作量证明机制,也可以是权益证明机制。
可选地,在一些实施例中,第一网络数据存储系统和第二网络数据存储系统均为区块链网络,这样可以使得用户面数据和控制面数据的存储可靠性均比较高。
可选地,在另一些实施例中,第一网络数据存储系统可以为数据中心,第二网络数据存储系统可以为区块链网络。上文指出,区块链网络中的每个节点均会获得区块链网络数据库的一份完整的拷贝。换句话说,区块链网络中的每个节点均会存储区块链网络的完整数据。因此,本申请实施例将数据量相对较小的控制信息存储至区块链网络中,将数据量相对较大的数据包存储至数据中心,既能提高网络数据存储的安全性,又能降低区块链网络中的各节点的存储压力。
网络设备可以是能够获取第二网络数据存储系统的数据存储服务的任意节点。例如,网络设备可以是第二网络数据存储系统中的某个节点(即网络设备可以是第二网络数据存储系统的成员)。又如,网络设备可以是位于第二网络数据存储系统外部、且能够获取第二网络数据存储系统提供的数据存储服务的节点。
应理解,上文描述的控制信息可以是未加密的控制信息,也可以是加密后的控制信息。将控制信息存储至第二网络数据存储系统之前,对控制信息进行加密,可以进一步地提高控制信息的存储安全性。需要说明的是,本申请实施例对控制信息的加密方式不做具体限定,可以采用对称加密方式进行加密,也可以采用非对称加密方式(如基于公私钥的加密方式)进行加密。此外,本申请实施例对控制信息的加密者不做具体限定,可以由网络设备进行加密,也可以由终端设备进行加密。可选地,作为一种实现方式,上述网络设备将数据包的控制信息存储至第二网络数据存储系统可以包括:网络设备使用终端设备的公钥或终端设备与另一终端设备的共享密钥对控制信息进行加密,得到加密后的控制信息;网络设备将加密后的控制信息存储至第二网络数据存储系统。
假设第二网络数据存储系统为区块链网络,本申请实施例对控制信息在该区块链网络中的存储方式不做具体限定,可以存储在区块链网络的同一区块中,也可以存储在区块链网络的不同区块中。
可选地,作为一个示例,网络设备可以将控制信息分割为至少两个信息块;网络设备通过区块链网络对至少两个信息块进行共识确认,并通过区块链网络将至少两个信息块分别存储至区块链网络中的至少两个区块中。
以至少两个信息块包括第1信息块和第2信息快为例,网络设备可以先将第1信息块存储至区块链网络中,然后,间隔一段时间,再将第2信息块存储至区块链网络中,由于区块链网络中的区块一般按时间顺序顺次连接,第1信息块的存储时间和第2信息块的存储时间之间的时间间隔越长,第1信息块和第2信息块被存储至两个不同区块中的概率就越大。
将控制信息分割成至少两个信息块,并将该至少两个信息块存储在区块链网络的不同 区块中,可以提高控制信息被篡改或破译的难度,从而进一步提升网络数据的存储安全性。
区块链网络中的每个区块具有自己的相邻区块,区块链网络的相邻区块例如可以是指向(或链接至)该区块的上一区块,和/或该区块所指向(或链接至)的下一区块。作为一个示例,网络设备可以将上述至少两个信息块分别存储至区块链网络中的互不相邻的至少两个区块中。将控制信息中的不同信息块存储至区块链网络中的互不相邻的区块中,可以进一步提高控制信息被篡改或破译的难度,从而进一步提升网络数据的存储安全性。
需要说明的是,本申请实施例对控制信息的分割方式不做具体限定,例如,可以按照功能对控制信息进行分割,也可以按照固定的大小对控制信息进行分割。例如,可以将控制信息分离成L1层相关的信息块和L2层相关的信息块。又如,假设控制信息包含M个比特,可以以K个比特(其中K<M)为单位对控制信息进行分割,使得T个信息块,其中K、M、T均为不小于1的正整数,且T等于M/K的结果向上取整。
如果终端设备的待存储数据本身已经基于某种密钥信息进行了加密处理,则图1的方法还可以包括:网络设备确定待存储数据的密钥信息;网络设备使用终端设备的公钥对密钥信息进行加密,得到加密后的密钥信息;网络设备通过区块链网络对加密后的密钥信息进行共识确认和存储。
例如,待存储数据可以是经过加密处理的图片数据,则网络设备可以通过区块链网络对该图片数据的加密密码进行共识确认和存储。
本申请实施例对网络设备确定待存储数据的密钥信息的方式不做具体限定。例如,网络设备与终端设备可以预先协商密钥信息的生成规则,并按照相同的生成规则密钥信息,然后通过区块链网络对加密后的密钥信息进行共识确认和存储。当然,网络设备和终端设备也可以采用更加安全的方式交互密钥信息。
本申请实施例将待存储数据的密钥信息也存储至区块链网络中,这样可以进一步降低终端设备本地所需的存储量,减轻本地存储压力。
终端设备将待存储数据存储至网络数据存储系统之后,如果该终端设备无需再次访问该待存储数据,网络设备可以不向终端设备反馈数据包的存储信息(下文将该存储信息称为第一存储信息,第一存储信息可用于指示数据包在第一网络数据存储系统中的存储位置)以及数据包的控制信息的存储信息(下文将该存储信息称为第二存储信息,第二存储信息可用于指示控制信息在第二网络数据存储系统中的存储位置)。例如,终端设备为智能电表,该智能电表可以按照一定的周期将电量数据存储至网络数据存储系统,该电量数据可以供网络中的其他计费节点调用,但该智能电表自身无需再次访问已经存储至网络数据存储系统的电量数据。在这种情况下,网络设备无需向智能电表反馈上述第一存储信息和第二存储信息。
终端设备将待存储数据存储至网络数据存储系统之后,如果终端设备需要再次访问该数据,网络设备可以向终端设备发送第一存储信息和第二存储信息。该终端设备可以根据该第一存储信息和第二存储信息重新获取该数据。当然,即使终端设备不会再次访问该数据,网络设备仍可以向该终端设备反馈该第一存储信息和第二存储信息,本申请实施例对此不做具体限定。
本申请实施例对第一存储信息和/或第二存储信息的形式不做具体限定。
作为一个示例,第一/第二网络数据存储系统为数据中心,第一/第二存储信息可以是 数据包的存储位置或存储索引。例如,第一/第二存储信息可以是数据包在第二网络数据存储系统中的存储地址。
作为另一个示例,第一/第二网络数据存储系统为区块链网络,第一/第二存储信息可以是存储数据包的区块的标识和/或数据包在该区块中的索引。
例如,区块的标识可以是区块的哈希值(或加密哈希值)。在区块链网络中,可以通过区块的哈希值唯一标识一个区块。区块的哈希值可以是采用安全散列算法(secure hash algorithm,SHA)256对区块的区块头进行哈希计算得到的数据指纹。区块的哈希值的具体形式例如可以是0000000kjakldsakljgklajg8239013490acjlkjlkajg910wit0qetsh。
又如,区块的标识还可以是区块的区块高度。区块的高度可以指示该区块在整个区块链中的位置。以区块链包含1000个区块为例,该区块链的第一个区块的高度一般为0,第二个区块的高度为1,依次类推。使用区块高度作为区块的标识可以快速定位该区块在区块链中的位置。
一般而言,一个区块可以存储一个或多个数据包。当一个区块可以存储多个数据包是,第二存储信息可以进一步包含数据包在区块中的索引,该索引可用于指示数据包在该区块中的相对存储位置,利用该索引可以对数据包在区块中的位置进行快速定位,加快数据包的查找过程。
在步骤140中,终端设备接收网络设备发送的第一存储信息和第二存储信息,第一存储信息用于指示数据包在第一网络数据存储系统中的存储位置,第二存储信息用于指示控制信息在第二网络数据存储系统中的存储位置,第一网络数据存储系统和第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络,控制信息用于指示数据包的传输格式;
在步骤150中,终端设备存储第一存储信息和第二存储信息。
传统技术中,网络设备会将终端设备的待存储数据对应的数据内容存储至数据中心。然后,终端设备可以通过网络设备获取到用于指示该数据内容在数据中心中的存储位置的存储信息。终端设备希望再次读取该数据内容时,可以根据该存储信息将该数据内容下载至本地。与传统技术不同,本申请实施例将数据包和控制信息进行分离存储,因此,终端设备会得到两种不同的存储信息,一种存储信息(对应于上文中的第一存储信息)指示数据包在第一网络数据存储系统中的存储位置,另一种存储信息(对应于上文中的第二存储信息)指示数据包在第二网络数据存储系统中的存储位置。当终端设备希望再次读取待存储数据的数据内容时,终端设备可以根据第一存储信息获得数据包,根据第二存储信息获得控制信息,然后利用控制信息解析该数据包,从而获得该待存储数据中的数据内容。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,图1的方法还可包括:终端设备对控制信息进行加密;终端设备向网络设备发送加密后的控制信息,指示网络设备将加密后的控制信息存储至第二网络数据存储系统。
可选地,在一些实施例中,上述终端设备对控制信息进行加密可包括:终端设备使用终端设备的公钥或终端设备与另一终端设备的共享密钥对控制信息进行加密。
为了使得终端设备的数据能够与另一终端设备共享,终端设备可以使用该终端设备和另一终端设备的共享密钥对控制信息进行加密,并通过网络设备将加密后的控制信息存储至第二网络数据存储系统中。本申请实施例对共享密钥的生成方式不做具体限定,例如,可以采用DH(Diffie-Hellman)算法使得两个终端设备安全地生成和交换共享密钥。当另一终端设备希望访问数据包中的数据内容时,该另一终端设备可以先从第一网络数据存储系统中获取未解析的数据包,并从第二网络数据存储系统中获取使用共享密钥加密的控制信息;然后,该另一终端设备可以利用共享密钥对控制信息进行解密,并利用解密后的控制信息对数据包进行解析,从而得到数据包的数据内容。
上文结合图1,详细描述了根据本申请实施例的数据存储过程,下面结合图2,详细描述根据本申请实施例的数据读取过程。应理解,在执行图2描述的数据读取过程之前,可以按照上文任一实施例描述的数据存储方式将数据存储至网络数据存储系统,因此,图2中的部分描述与图1相对应(如第一存储信息和/或第二存储信息的定义方式或具体实现形式等描述),对应的描述可以参见前文,此处不再详述。
图2是本申请又一实施例提供的处理数据的方法的示意性流程图。图2的方法包括步骤210-250,下面对图2的步骤分别进行描述。
在步骤210中,网络设备接收终端设备发送的数据读取请求,数据读取请求用于请求读取网络中存储的目标数据,数据读取请求包含第一存储信息和第二存储信息,第一存储信息用于指示包含目标数据的数据包在第一网络数据存储系统中的存储位置,第二存储信息用于指示数据包的控制信息在第二网络数据存储系统中的存储位置,控制信息用于指示数据包的传输格式,第一网络数据存储系统和第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
需要说明的是,目标数据可以是终端设备之前存储至网络中的数据;或者目标数据是另一终端设备之前存储至网络中的数据。当目标数据是另一终端设备之前存储至网络中的数据时,上述中的控制信息可以是使用终端设备和另一终端设备的共享密钥加密后得到的控制信息。
如果目标数据是另一终端设备之前存储至网络中的数据,网络设备可以直接将另一终端设备之前存储的数据包和控制信息发送至该终端设备,也可以先验证该终端设备的合法性。网络设备验证终端设备的合法性的方式可以有多种,例如,网络设备可以从该另一终端设备获取能够与该另一终端设备共享数据的共享终端设备的标识集合(该标识集合例如可以是共享终端设备的公钥集合),如果发送数据读取请求的该终端设备属于该标识集合所标识的某个终端设备,则可以继续执行后续步骤;如果发送数据读取请求的该终端设备不属于该标识集合所标识的某个终端设备,则可以不执行后续步骤。
在步骤220-230中,网络设备根据第一存储信息从第一网络数据存储系统中获取数据包,并根据第二存储信息从第二网络数据存储系统中获取控制信息。
应理解,本申请实施例对步骤220-230的执行顺序不做具体限定,可以先执行步骤220,也可以先执行步骤230,也可以同时执行步骤220和步骤230。
在步骤240中,网络设备向终端设备发送针对数据读取请求的数据读取响应,数据读取响应包含数据包和控制信息。
需要说明的是,在图2描述的数据读取过程之前,终端设备可以通过某个网络设备将 目标数据存储至网络数据存储系统。应理解,用于存储目标数据的网络设备与图2中描述的网络设备可以是同一网络设备,也可以是不同网络设备。换句话说,终端设备可以通过同一网络设备实现目标数据的存储和读取,也可以通过不同网络设备实现目标数据的存储和读取。
可选地,在一些实施例中,第二网络数据存储系统为区块链网络,第二存储信息包含目标区块的标识和/或控制信息在目标区块中的存储位置的索引,其中目标区块为区块链网络中的用于存储控制信息的区块。
可选地,在一些实施例中,目标区块的标识为目标区块的哈希值或目标区块的区块高度。
可选地,在一些实施例中,控制信息包含至少两个信息块,第二存储信息用于指示至少两个信息块各自在区块链网络中的存储位置,其中至少两个信息块分别存储在区块链网络的至少两个区块中,步骤230可包括:网络设备根据第二存储信息从至少两个区块中获取至少两个信息块。
可选地,在一些实施例中,控制信息可以包括以下信息中的至少一种:用于指示数据包的调制方式的信息;用于指示数据包的编码方式的信息;用于指示数据包的分割方式的信息;以及用于指示数据包的级联方式的信息。
在步骤250中,终端设备根据控制信息解析数据包,得到目标数据。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,目标数据是另一终端设备存储至网络中的数据,且控制信息是使用终端设备和另一终端设备的共享密钥加密后得到的控制信息,在终端设备向网络设备发送数据读取请求之前,图2的方法还可包括:终端设备从另一终端设备获取第一存储信息和第二存储信息;步骤250可包括:终端设备使用共享密钥解密控制信息,得到解密后的控制信息;终端设备使用解密后的控制信息,解析数据包。
下面以终端设备为物联网终端设备A(如智能电表、智能水表、RFID终端设备等),第一网络数据存储系统为数据中心,第二网络数据存储系统为区块链网络为例,更加详细地描述本申请实施例。应注意,图3至图4的例子仅仅是为了帮助本领域技术人员理解本申请实施例,而非要将本申请实施例限于所例示的具体数值或具体场景。本领域技术人员根据所给出的图3至图4的例子,显然可以进行各种等价的修改或变化,这样的修改或变化也落入本申请实施例的范围内。
图3是本申请又一实施例提供的数据处理方法的示意性流程图。图3的方法包括步骤302-326。
在步骤302中,物联网终端设备A确定待存储数据。
以物联网终端设备A为智能电表为例,该待存储数据可以是电量数据。以物联网终端设备A为智能手机为例,该待存储数据可以是相片、视频、文件等。
在步骤304中,物联网终端设备A接收网络设备发送的上行调度信息。
该上行调度信息可以指示为物联网终端设备A分配的上行传输资源。物联网终端设备A可以通过该上行传输资源传输数据包。应理解,步骤304是可选步骤,物联网终端设备 A也可以采用免调度的方式直接进行上行传输。例如,物联网终端设备A可以通过预设的免授权的上行传输资源,周期性地向网络设备发送数据包。
在步骤306中,物联网终端设备A确定数据包的传输格式。
作为一个示例,步骤304描述的上行调度信息可以包含用于指示数据包的传输格式的控制信息,物联网终端设备A可以根据该控制信息确定数据包的传输格式。数据包的控制信息可以包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。作为另一示例,物联网终端设备A可以自主确定数据包的传输格式。例如,物联网终端设备A可以使用预先协商或协议预先配置的传输格式。
在步骤308中,物联网终端设备A根据确定的传输格式,将数据包发送至网络设备。
在步骤310中,网络设备对接收到的数据包进行解析。
在步骤312中,如果数据包成功解析,网络设备向物联网终端设备A发送反馈信息,指示数据包传输成功。该反馈信息例如可以是ACK信息。可选地,如果数据包解析失败,网络设备可以向物联网终端设备A发送反馈信息,指示数据包传输失败。该反馈信息例如可以是NACK信息。
应理解,步骤310-312是可选步骤,网络设备也可以不对数据包进行解析和/或不向物联网终端设备A反馈用于指示数据包是否传输成功的反馈信息。例如,在接收到数据包之后,网络设备可以直接将数据包存储至第一网络数据存储系统中。步骤310-312的执行可以一定程度上保证网络数据存储系统中存储的均是有效数据。
在步骤314中,网络设备将未解析的数据包存储至数据中心。
如图3所示,网络设备可以将数据包发送至数据中心的某个节点,以便通过该节点将数据包存储至数据中心。
在步骤316-318中,网络设备使用物联网终端设备A的公钥对数据包的控制信息进行加密,并将加密后的控制信息存储至区块链网络中。
在步骤316之前,网络设备可以先获取物联网终端设备A的公钥。例如,网络设备可以向物联网终端设备A发送指示信息,指示物联网终端设备A上报物联网终端设备A的公钥。
网络设备可以是区块链网络的某个节点(即组成区块链网络的某个成员),也可以是位于区块链网络之外的可以获取区块链网络的数据存储服务的任意节点。以网路设备为区块链网络的成员为例,网络设备可以通过广播的方式将数据包传输至区块链网络的其他节点,使得区块链网络中的各节点均获得一份该数据包的拷贝。
需要说明的是,步骤316-318中描述的对控制信息的加密步骤为可选步骤,在一些实施例中,网络设备也可以不对控制信息进行加密,直接将控制信息存储至区块链网络中。
进一步地,如果数据包中的待存储数据本身已经进行了其他加密处理,网络设备还可以将该其他加密处理对应的密钥信息也一并存储至区块链网络中。
本申请实施例对控制信息在区块链网络中的存储方式不做具体限定。可选地,在一些实施例中,网络设备可以将控制信息作为一个整体,存储在区块链网络中的同一区块中。可选地,在另一些实施例中,在存储控制信息之前,网络设备可以先将控制信息进行分割成至少两个信息块,然后将该至少两个信息块分别存储至区块链网络的至少两个区块中, 这样可以增大控制信息被窃取或破译的难度,从而进一步提升网络数据的存储安全性。
在步骤320,网络设备向终端设备反馈第一存储信息和第二存储信息。
第一存储信息可用于指示数据包在数据中心中的存储位置。该第一指示信息例如可以是数据包在数据中心的存储地址。第二存储信息可用于指示控制信息在区块链网络中的存储位置。该第二指示信息例如可以是用于存储控制信息的目标区块的标识,如目标区块的区块高度或目标区块的哈希值。
步骤320将第一存储信息和第二存储信息同时反馈给终端设备,但本申请实施例不限于此,例如,当网络设备执行完步骤314之后,可以先向终端设备反馈第一存储信息,并在执行步骤318之后,再向终端设备反馈第二存储信息。
在步骤322-326中,如果物联网终端设备A确定需要读取该数据包中的数据,物联网终端设备A从数据中心获取未解析的数据包,并从区块链网络获取数据包的控制信息。
步骤324和步骤326在图3中用两条虚线进行标识。这两条虚线表示的是物联网终端设备A可以通过某个特定网络设备(图3中未示出)从区块链网络中的节点和数据中心中的节点获取数据包和控制信息。该特定网络设备例如可以是当前距离物联网终端设备A最近的网络设备,或与物联网终端设备A之间信号质量最好的网络设备。该特定网络设备可以是图3中的用于将物联网终端设备A的待存储数据存储至网络的网络设备,也可以是其他网络设备,本申请实施例对此不做具体限定。
在步骤328中,物联网终端设备A使用物联网终端设备A的私钥对数据包的控制信息进行解密,得到解密后的控制信息,然后利用解密后的控制信息解析数据包,得到数据包中的数据。
应理解,图3实施例是以第一网络数据存储系统为数据中心、第二网络数据存储系统为区块链网络为例进行说明的。实际上,第一网络数据存储系统也可以是区块链网络。
图4是本申请又一实施例提供的处理数据的方法的示意性流程图。图4的实施例与图3的实施例的流程大致类似,不同之处在于,图3的实施例由网络设备对控制信息(参见图3的步骤316的描述)进行加密,图4的实施例由物联网终端设备A使用物联网终端设备A和物联网终端设备B的共享密钥对控制信息进行加密,使得物联网终端设备A将数据包存储至网络数据存储系统之后,物联网终端设备B可以利用该共享密钥读取该数据包中的数据,从而实现物联网终端设备A和物联网终端设备B之间的数据共享。图4的方法包括步骤402-430,下面对图4的步骤进行描述。
步骤402-414与图3的步骤302-314类似,可以参见图3的描述,此处不再详述。
在步骤416中,物联网终端设备A使用物联网终端设备A和物联网终端设备B的共享密钥对控制信息进行加密。
本申请实施例对共享密钥的生成方式不做具体限定。例如,物联网终端设备A可以采用DH算法生成该共享密钥。
在步骤418中,物联网终端设备A通过网络设备将加密后的控制信息存储至区块链网络中。
具体地,物联网终端设备A可以向网络设备发送加密后的控制信息,网络设备可以通过区块链中的节点将加密后的控制信息广播至区块链网络中,使得区块链网络中的各节点获得一份加密后的控制信息的拷贝。
在步骤420,网络设备向终端设备反馈第一存储信息和第二存储信息。
步骤420与步骤320类似,可以参见图3的描述,此处不再详述。
在步骤422中,物联网终端设备B确定需要读取物联网终端设备A存储至网络数据存储系统中的目标数据。
在步骤424中,物联网终端设备B与物联网终端设备A进行通信,以获取第一存储信息和第二存储信息。
步骤424-428与图3的步骤322-326类似,不同之处在于,图3的实施例中,物联网终端设备A使用物联网终端设备A的公钥对控制信息进行解密,图4的实施例中,物联网终端设备B使用物联网终端设备A和物联网终端设备B的共享密钥对控制信息进行解密,其他处理基本类似,此处不再详述。
需要说明的是,物联网终端设备A还可以向网络设备发送能够与物联网终端设备A共享数据的其他物联网终端设备的标识集合,以便网络设备接收到物联网终端设备B发起的物联网终端设备A的数据读取请求时,先判断物联网终端设备B的标识是否属于该标识集合,如果物联网终端设备B的标识属于该标识集合,则对物联网终端设备B的请求进行响应,将包含物联网终端设备A的数据的数据包和数据包的控制信息发送至物联网终端设备B;如果物联网终端设备B的标识不属于该标识集合,则可以不对物联网终端设备B的请求进行响应,或拒绝物联网终端设备B的请求。
下面对本申请的装置实施例进行描述,由于装置实施例可以执行上述方法,因此未详细描述的部分可以参见前面各方法实施例。
图5是本申请一个实施例提供的网络设备的示意性结构图。图5的网络设备500可用于执行图1方法中的由网络设备执行的各个步骤。网络设备500包括接收模块510和存储模块520,下面对网络设备500的各个模块的功能进行详细描述。
接收模块510可用于接收终端设备发送的包含待存储数据的数据包。
存储模块520可用于将所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统。所述控制信息用于指示所述数据包的传输格式。所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述存储模块520可具体用于通过所述区块链网络对所述控制信息进行共识确认和存储。
可选地,在一些实施例中,所述存储模块520可具体用于将所述控制信息分割为至少两个信息块;通过所述区块链网络对所述至少两个信息块进行共识确认,并通过所述区块链网络将所述至少两个信息块分别存储至所述区块链网络中的至少两个区块中。
可选地,在一些实施例中,所述网络设备500还可包括确定模块和加密模块。所述确定模块可用于确定所述待存储数据的密钥信息。所述加密模块可用于使用所述终端设备的公钥对所述密钥信息进行加密,得到加密后的所述密钥信息。所述存储模块520还可用于通过所述区块链网络对加密后的所述密钥信息进行共识确认和存储。
可选地,在一些实施例中,所述存储模块520可具体用于对所述数据包进行解析;在所述数据包解析成功的情况下,将所述数据包存储至所述第一网络数据存储系统,并将所述控制信息存储至所述第二网络数据存储系统。
可选地,在一些实施例中,所述存储模块520可具体用于使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密,得到加密后的所述控制信息;将加密后的所述控制信息存储至所述第二网络数据存储系统。
可选地,在一些实施例中,所述网络设备500还可包括发送模块,用于向所述终端设备发送第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在所述第二网络数据存储系统中的存储位置。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
图6是本申请一个实施例提供的终端设备的示意性结构图。图6的终端设备600可用于执行图1方法中的由终端设备执行的各个步骤。终端设备600可包括发送模块610和接收模块620,下面对终端设备600中的各个模块的功能进行详细描述。
所述发送模块610可用于向网络设备发送包含待存储数据的数据包;
所述接收模块620可用于接收所述网络设备发送的第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述控制信息在第二网络数据存储系统中的存储位置,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络,所述控制信息用于指示所述数据包的传输格式。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
可选地,在一些实施例中,所述终端设备600还可包括加密模块。所述加密模块可用 于在所述接收模块620接收所述网络设备发送的第一存储信息和第二存储信息之前,对所述控制信息进行加密;所述发送模块610还用于向所述网络设备发送加密后的所述控制信息,指示所述网络设备将所述加密后的所述控制信息存储至所述第二网络数据存储系统。
可选地,在一些实施例中,所述加密模块具体用于使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
图7是本申请另一实施例提供的网络设备的示意性结构图。图7的网络设备700可用于执行图2方法中的由网络设备执行的各个步骤。网络设备700可包括接收模块710,获取模块720和发送模块730,下面对网络设备700中的各个模块的功能进行详细描述。
所述接收模块710可用于接收终端设备发送的数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
所述获取模块720可用于根据所述第一存储信息从所述第一网络数据存储系统中获取所述数据包,并根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息。
所述发送模块730可用于向所述终端设备发送针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述数据包和所述控制信息。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引。所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中,所述获取模块720可具体用于根据所述第二存储信息从所述至少两个区块中获取所述至少两个信息块。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
图8是本申请另一实施例提供的终端设备的示意性结构图。图8的终端设备800可用于执行图2方法中的由终端设备执行的各个步骤。终端设备800可包括发送模块810,接 收模块820和解析模块830。
所述发送模块810可用于向网络设备发送数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
所述接收模块820可用于接收所述网络设备发送的针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述数据包和所述控制信息。
所述解析模块830可用于根据所述控制信息解析所述数据包,得到所述目标数据。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述目标数据是另一终端设备存储至所述网络中的数据,且所述控制信息是使用所述终端设备和所述另一终端设备的共享密钥加密后得到的控制信息,所述终端设备还包括获取模块,用于在向网络设备发送数据读取请求之前,从所述另一终端设备获取所述第一存储信息和所述第二存储信息;所述解析模块830可具体用于使用所述共享密钥解密所述控制信息,得到解密后的控制信息;使用解密后的所述控制信息,解析所述数据包。
可选地,在一些实施例中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
图9是本申请又一实施例提供的网络设备的示意性结构图。图9的网络设备900可用于执行图1方法中的由网络设备执行的各个步骤。网络设备900包括接收器910和存储器920。
所述接收器910用于接收终端设备发送的包含待存储数据的数据包;
所述存储器920用于将所述接收器910接收的所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统,其中所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击 或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,所述网络设备900还包括:处理器,用于对所述数据包进行解析;所述存储器920具体用于在所述处理器对所述数据包解析成功的情况下,将所述数据包存储至所述第一网络数据存储系统,并将所述控制信息存储至所述第二网络数据存储系统。
可选地,在一些实施例中,所述处理器,还用于使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密,得到加密后的所述控制信息;所述存储器920具体用于将所述处处理器加密后的所述控制信息存储至所述第二网络数据存储系统。
可选地,在一些实施例中,所述存储器920具体用于当所述第二网络数据存储系统为区块链网络时,通过所述区块链网络对所述控制信息进行共识确认和存储。
可选地,在一些实施例中,所述处理器用于将所述存储器920存储的控制信息分割为至少两个信息块;所述存储器920具体用于通过所述区块链网络对所述处理器分割的所述至少两个信息块进行共识确认,并通过所述区块链网络将所述至少两个信息块分别存储至所述区块链网络中的至少两个区块中。
可选地,在一些实施例中,所述处理器,用于确定所述待存储数据的密钥信息,使用所述终端设备的公钥对所述密钥信息进行加密,得到加密后的所述密钥信息;所述存储器920具体用于通过所述区块链网络对所述处理器加密后的所述密钥信息进行共识确认和存储。
可选地,在一些实施例中,所述网络设备900还包括:发送器,用于向所述终端设备发送第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在所述第二网络数据存储系统中的存储位置。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
图10是本申请又一实施例提供的终端设备的示意性结构图。图10的终端设备1000可用于执行图1方法中的由终端设备执行的各个步骤。终端设备1000可包括发送器1010,接收器1020和存储器1030。
所述发送器1010用于向网络设备发送包含待存储数据的数据包;
所述接收器1020用于接收所述网络设备发送的第一存储信息和第二存储信息,所述第一存储信息用于指示所述发送器1010发送的所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述控制信息在第二网络数据存储系统中的存储位 置,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络,所述控制信息用于指示所述数据包的传输格式;
所述存储器1030用于存储所述第一存储信息和所述第二存储信息。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
可选地,在一些实施例中,所述终端设备1000还包括:处理器,用于对所述控制信息进行加密;所述发送器1010还用于向所述网络设备发送加密后的所述控制信息,所述控制信息用于指示所述网络设备将所述加密后的所述控制信息存储至所述第二网络数据存储系统。
可选地,在一些实施例中,所述处理器具体用于使用所述终端设备1000的公钥或所述终端设备1000与另一终端设备的共享密钥对所述控制信息进行加密。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
图11是本申请又一实施例提供的网络设备的示意性结构图。图11的网络设备1100可用于执行图2方法中的由网络设备执行的各个步骤。网络设备1100可包括接收器1110,处理器1120和发送器1130。
所述接收器1110用于接收终端设备发送的数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络;
所述处理器1120用于根据所述接收器1110接收的所述第一存储信息从所述第一网络数据存储系统中获取所述数据包,并根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息;
所述发送器1130用于向所述终端设备发送针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述处理器1120获取的所述数据包和所述控制信息。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高 了网络数据的存储安全性。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述处理器1120具体用于在所述控制信息包含至少两个信息块时,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中,根据所述第二存储信息从所述至少两个区块中获取所述至少两个信息块。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
图12是本申请又一实施例提供的终端设备的示意性结构图。图12的终端设备1200可用于执行图2方法中的由终端设备执行的各个步骤。终端设备1200可包括发送器1210、接收器1220和处理器1230。
所述发送器1210用于向网络设备发送数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络;
所述接收器1220用于接收所述网络设备发送的针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述数据包和所述控制信息;
所述处理器1230用于根据所述控制信息解析所述数据包,得到所述目标数据。
本申请实施例对用户面数据和控制面板数据进行分离存储,可以降低网络数据被攻击或篡改的可能性。此外,由于用户面数据和/或控制面数据被存储至区块链网络中,提高了网络数据的存储安全性。
可选地,在一些实施例中,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
可选地,在一些实施例中,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
可选地,在一些实施例中,所述接收器1220还用于在所述目标数据是另一终端设备存储至所述网络中的数据,且所述控制信息是使用所述终端设备1200和所述另一终端设备的共享密钥加密后得到的控制信息的情况下,在所述终端设备1200向网络设备发送数据读取请求之前,从所述另一终端设备获取所述第一存储信息和所述第二存储信息;所述处理器1230具体用于使用所述共享密钥解密所述控制信息,得到解密后的控制信息;使用解密后的所述控制信息,解析所述数据包。
可选地,在一些实施例中,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
可选地,在一些实施例中,所述控制信息包括以下信息中的至少一种:用于指示所述数据包的调制方式的信息;用于指示所述数据包的编码方式的信息;用于指示所述数据包的分割方式的信息;以及用于指示所述数据包的级联方式的信息。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其他任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如数字视频光盘(digital video disc,DVD))、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (44)

  1. 一种处理数据的方法,其特征在于,包括:
    网络设备接收终端设备发送的包含待存储数据的数据包;
    所述网络设备将所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统,其中所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
  2. 如权利要求1所述的方法,其特征在于,所述第二网络数据存储系统为区块链网络,所述网络设备将所述数据包的控制信息存储至第二网络数据存储系统,包括:
    所述网络设备通过所述区块链网络对所述控制信息进行共识确认和存储。
  3. 如权利要求2所述的方法,其特征在于,所述网络设备通过所述区块链网络对所述控制信息进行共识确认和存储,包括:
    所述网络设备将所述控制信息分割为至少两个信息块;
    所述网络设备通过所述区块链网络对所述至少两个信息块进行共识确认,并通过所述区块链网络将所述至少两个信息块分别存储至所述区块链网络中的至少两个区块中。
  4. 如权利要求2或3所述的方法,其特征在于,所述方法还包括:
    所述网络设备确定所述待存储数据的密钥信息;
    所述网络设备使用所述终端设备的公钥对所述密钥信息进行加密,得到加密后的所述密钥信息;
    所述网络设备通过所述区块链网络对加密后的所述密钥信息进行共识确认和存储。
  5. 如权利要求1-4中任一项所述的方法,其特征在于,所述网络设备将所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统,包括:
    所述网络设备对所述数据包进行解析;
    在所述数据包解析成功的情况下,所述网络设备将所述数据包存储至所述第一网络数据存储系统,并将所述控制信息存储至所述第二网络数据存储系统。
  6. 如权利要求1-5中任一项所述的方法,其特征在于,所述网络设备将所述数据包的控制信息存储至第二网络数据存储系统,包括:
    所述网络设备使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密,得到加密后的所述控制信息;
    所述网络设备将加密后的所述控制信息存储至所述第二网络数据存储系统。
  7. 如权利要求1-6中任一项所述的方法,其特征在于,所述方法还包括:
    所述网络设备向所述终端设备发送第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在所述第二网络数据存储系统中的存储位置。
  8. 如权利要求7所述的方法,其特征在于,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储 位置的索引,所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
  9. 如权利要求8所述的方法,其特征在于,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
  10. 如权利要求1-9中任一项所述的方法,其特征在于,所述控制信息包括以下信息中的至少一种:
    用于指示所述数据包的调制方式的信息;
    用于指示所述数据包的编码方式的信息;
    用于指示所述数据包的分割方式的信息;以及
    用于指示所述数据包的级联方式的信息。
  11. 一种处理数据的方法,其特征在于,包括:
    终端设备向网络设备发送包含待存储数据的数据包;
    所述终端设备接收所述网络设备发送的第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述控制信息在第二网络数据存储系统中的存储位置,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络,所述控制信息用于指示所述数据包的传输格式;
    所述终端设备存储所述第一存储信息和所述第二存储信息。
  12. 如权利要求11所述的方法,其特征在于,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
  13. 如权利要求12所述的方法,其特征在于,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
  14. 如权利要求12或13所述的方法,其特征在于,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
  15. 如权利要求11-14中任一项所述的方法,其特征在于,在所述终端设备接收所述网络设备发送的第一存储信息和第二存储信息之前,所述方法还包括:
    所述终端设备对所述控制信息进行加密;
    所述终端设备向所述网络设备发送加密后的所述控制信息,指示所述网络设备将所述加密后的所述控制信息存储至所述第二网络数据存储系统。
  16. 如权利要15所述的方法,其特征在于,所述终端设备对所述控制信息进行加密,包括:
    所述终端设备使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密。
  17. 如权利要求11-16中任一项所述的方法,其特征在于,所述控制信息包括以下信息中的至少一种:
    用于指示所述数据包的调制方式的信息;
    用于指示所述数据包的编码方式的信息;
    用于指示所述数据包的分割方式的信息;以及
    用于指示所述数据包的级联方式的信息。
  18. 一种处理数据的方法,其特征在于,包括:
    网络设备接收终端设备发送的数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络;
    所述网络设备根据所述第一存储信息从所述第一网络数据存储系统中获取所述数据包,并根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息;
    所述网络设备向所述终端设备发送针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述数据包和所述控制信息。
  19. 如权利要求18所述的方法,其特征在于,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
  20. 如权利要求19所述的方法,其特征在于,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
  21. 如权利要求18-20中任一项所述的方法,其特征在于,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中,
    所述网络设备根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息,包括:
    所述网络设备根据所述第二存储信息从所述至少两个区块中获取所述至少两个信息块。
  22. 如权利要求18-21中任一项所述的方法,其特征在于,所述控制信息包括以下信息中的至少一种:
    用于指示所述数据包的调制方式的信息;
    用于指示所述数据包的编码方式的信息;
    用于指示所述数据包的分割方式的信息;以及
    用于指示所述数据包的级联方式的信息。
  23. 一种网络设备,其特征在于,包括接收器和存储器,其中:
    所述接收器用于接收终端设备发送的包含待存储数据的数据包;
    所述存储器用于将所述接收器接收的所述数据包存储至第一网络数据存储系统,并将所述数据包的控制信息存储至第二网络数据存储系统,其中所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络。
  24. 如权利要求23所述的网络设备,其特征在于,所述网络设备还包括:
    处理器,用于对所述数据包进行解析;
    所述存储器具体用于在所述处理器对所述数据包解析成功的情况下,将所述数据包存 储至所述第一网络数据存储系统,并将所述控制信息存储至所述第二网络数据存储系统。
  25. 如权利要求24中所述的网络设备,其特征在于,
    所述处理器,还用于使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密,得到加密后的所述控制信息;
    所述存储器具体用于将所述处处理器加密后的所述控制信息存储至所述第二网络数据存储系统。
  26. 如权利要求23至25任一权要所述的网络设备,其特征在于,所述存储器具体用于当所述第二网络数据存储系统为区块链网络时,通过所述区块链网络对所述控制信息进行共识确认和存储。
  27. 如权利要求26所述的网络设备,其特征在于,所述处理器用于将所述存储器存储的控制信息分割为至少两个信息块;
    所述存储器具体用于通过所述区块链网络对所述处理器分割的所述至少两个信息块进行共识确认,并通过所述区块链网络将所述至少两个信息块分别存储至所述区块链网络中的至少两个区块中。
  28. 如权利要求26所述的网络设备,其特征在于,
    所述处理器,用于确定所述待存储数据的密钥信息,使用所述终端设备的公钥对所述密钥信息进行加密,得到加密后的所述密钥信息;
    所述存储器具体用于通过所述区块链网络对所述处理器加密后的所述密钥信息进行共识确认和存储。
  29. 如权利要求23-28中任一项所述的网络设备,其特征在于,所述网络设备还包括:
    发送器,用于向所述终端设备发送第一存储信息和第二存储信息,所述第一存储信息用于指示所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在所述第二网络数据存储系统中的存储位置。
  30. 如权利要求29所述的网络设备,其特征在于,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
  31. 如权利要求30所述的网络设备,其特征在于,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
  32. 如权利要求23-31中任一项所述的网络设备,其特征在于,所述控制信息包括以下信息中的至少一种:
    用于指示所述数据包的调制方式的信息;
    用于指示所述数据包的编码方式的信息;
    用于指示所述数据包的分割方式的信息;以及
    用于指示所述数据包的级联方式的信息。
  33. 一种终端设备,其特征在于,包括发送器、接收器和存储器;
    所述发送器用于向网络设备发送包含待存储数据的数据包;
    所述接收器用于接收所述网络设备发送的第一存储信息和第二存储信息,所述第一存储信息用于指示所述发送器发送的所述数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述控制信息在第二网络数据存储系统中的存储位置,所述第一 网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络,所述控制信息用于指示所述数据包的传输格式;
    所述存储器用于存储所述第一存储信息和所述第二存储信息。
  34. 如权利要求33所述的终端设备,其特征在于,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区块。
  35. 如权利要求34所述的终端设备,其特征在于,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
  36. 如权利要求34或35所述的终端设备,其特征在于,所述控制信息包含至少两个信息块,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中。
  37. 如权利要求33-36中任一项所述的终端设备,其特征在于,所述终端设备还包括:
    处理器,用于对所述控制信息进行加密;
    所述发送器还用于向所述网络设备发送加密后的所述控制信息,所述控制信息用于指示所述网络设备将所述加密后的所述控制信息存储至所述第二网络数据存储系统。
  38. 如权利要37所述的终端设备,其特征在于,所述处理器具体用于使用所述终端设备的公钥或所述终端设备与另一终端设备的共享密钥对所述控制信息进行加密。
  39. 如权利要求33-38中任一项所述的终端设备,其特征在于,所述控制信息包括以下信息中的至少一种:
    用于指示所述数据包的调制方式的信息;
    用于指示所述数据包的编码方式的信息;
    用于指示所述数据包的分割方式的信息;以及
    用于指示所述数据包的级联方式的信息。
  40. 一种网络设备,其特征在于,包括接收器、处理器和发送器;
    所述接收器用于接收终端设备发送的数据读取请求,所述数据读取请求用于请求读取网络中存储的目标数据,所述数据读取请求包含第一存储信息和第二存储信息,所述第一存储信息用于指示包含所述目标数据的数据包在第一网络数据存储系统中的存储位置,所述第二存储信息用于指示所述数据包的控制信息在第二网络数据存储系统中的存储位置,所述控制信息用于指示所述数据包的传输格式,所述第一网络数据存储系统和所述第二网络数据存储系统中的至少一个网络数据存储系统为区块链网络;
    所述处理器用于根据所述接收器接收的所述第一存储信息从所述第一网络数据存储系统中获取所述数据包,并根据所述第二存储信息从所述第二网络数据存储系统中获取所述控制信息;
    所述发送器用于向所述终端设备发送针对所述数据读取请求的数据读取响应,所述数据读取响应包含所述处理器获取的所述数据包和所述控制信息。
  41. 如权利要求40所述的网络设备,其特征在于,所述第二网络数据存储系统为区块链网络,所述第二存储信息包含目标区块的标识和/或所述控制信息在所述目标区块中的存储位置的索引,其中所述目标区块为所述区块链网络中的用于存储所述控制信息的区 块。
  42. 如权利要求41所述的网络设备,其特征在于,所述目标区块的标识为所述目标区块的哈希值或所述目标区块的区块高度。
  43. 如权利要求40-42中任一项所述的网络设备,其特征在于,
    所述处理器具体用于在所述控制信息包含至少两个信息块时,所述第二存储信息用于指示所述至少两个信息块各自在所述区块链网络中的存储位置,其中所述至少两个信息块分别存储在所述区块链网络的至少两个区块中,根据所述第二存储信息从所述至少两个区块中获取所述至少两个信息块。
  44. 如权利要求40-43中任一项所述的网络设备,其特征在于,所述控制信息包括以下信息中的至少一种:
    用于指示所述数据包的调制方式的信息;
    用于指示所述数据包的编码方式的信息;
    用于指示所述数据包的分割方式的信息;以及
    用于指示所述数据包的级联方式的信息。
PCT/CN2018/092967 2017-07-27 2018-06-27 处理数据的方法、终端设备和网络设备 WO2019019853A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710626150.7A CN109309650B (zh) 2017-07-27 2017-07-27 处理数据的方法、终端设备和网络设备
CN201710626150.7 2017-07-27

Publications (1)

Publication Number Publication Date
WO2019019853A1 true WO2019019853A1 (zh) 2019-01-31

Family

ID=65039377

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/092967 WO2019019853A1 (zh) 2017-07-27 2018-06-27 处理数据的方法、终端设备和网络设备

Country Status (2)

Country Link
CN (1) CN109309650B (zh)
WO (1) WO2019019853A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478957A (zh) * 2020-04-02 2020-07-31 深圳市人工智能与机器人研究院 基于区块链的实验数据处理方法、装置和计算机设备
CN112114976A (zh) * 2020-08-19 2020-12-22 浙江大搜车融资租赁有限公司 业务处理方法、装置、设备及存储介质
US11843950B2 (en) * 2018-12-31 2023-12-12 T-Mobile Usa, Inc. Protecting a telecommunications network using network components as blockchain nodes

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109934005A (zh) * 2019-03-15 2019-06-25 北京物资学院 一种基于区块链的学位认证系统及认证方法
CN110149373B (zh) * 2019-04-28 2022-01-07 平安科技(深圳)有限公司 基于点对点网络的数据存储方法、装置、介质及服务器
CN110198316A (zh) * 2019-05-30 2019-09-03 全链通有限公司 基于联盟区块链的身份验证方法、设备及存储介质
CN112700361A (zh) * 2020-12-29 2021-04-23 安徽路歌运输有限公司 一种运输平台中运输车辆信息储存的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664928A (zh) * 2012-04-01 2012-09-12 南京邮电大学 一种用于云存储的数据安全存取方法及用户端系统
CN103685162A (zh) * 2012-09-05 2014-03-26 中国移动通信集团公司 文件存储和共享方法
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN106230851A (zh) * 2016-08-29 2016-12-14 中金云金融(北京)大数据科技股份有限公司 基于区块链的数据保全方法及系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107103252A (zh) * 2017-04-27 2017-08-29 电子科技大学 基于区块链的数据访问控制方法
CN107181599B (zh) * 2017-07-18 2020-01-21 天津理工大学 基于区块链的路由位置数据保密存储及共享方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664928A (zh) * 2012-04-01 2012-09-12 南京邮电大学 一种用于云存储的数据安全存取方法及用户端系统
CN103685162A (zh) * 2012-09-05 2014-03-26 中国移动通信集团公司 文件存储和共享方法
US20160330027A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices
CN106230851A (zh) * 2016-08-29 2016-12-14 中金云金融(北京)大数据科技股份有限公司 基于区块链的数据保全方法及系统

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11843950B2 (en) * 2018-12-31 2023-12-12 T-Mobile Usa, Inc. Protecting a telecommunications network using network components as blockchain nodes
CN111478957A (zh) * 2020-04-02 2020-07-31 深圳市人工智能与机器人研究院 基于区块链的实验数据处理方法、装置和计算机设备
CN111478957B (zh) * 2020-04-02 2023-09-08 深圳市人工智能与机器人研究院 基于区块链的实验数据处理方法、装置和计算机设备
CN112114976A (zh) * 2020-08-19 2020-12-22 浙江大搜车融资租赁有限公司 业务处理方法、装置、设备及存储介质
CN112114976B (zh) * 2020-08-19 2024-03-22 浙江大搜车融资租赁有限公司 业务处理方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN109309650B (zh) 2020-12-08
CN109309650A (zh) 2019-02-05

Similar Documents

Publication Publication Date Title
WO2019019853A1 (zh) 处理数据的方法、终端设备和网络设备
CN110311883B (zh) 身份管理方法、设备、通信网络及存储介质
US11229023B2 (en) Secure communication in network access points
CN111052672B (zh) 无证书或预共享对称密钥的安全密钥传输协议
US9608963B2 (en) Scalable intermediate network device leveraging SSL session ticket extension
EP4014425B1 (en) Secure publish-subscribe communication methods and apparatus
WO2019153701A1 (zh) 一种获得设备标识的方法及装置
CN109413645B (zh) 接入认证的方法和装置
US20160269176A1 (en) Key Configuration Method, System, and Apparatus
US20200162245A1 (en) Method and system for performing ssl handshake
WO2018219181A1 (zh) 确定终端设备的标识的方法和装置
US20230344626A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
US20180262352A1 (en) Secure Authentication of Remote Equipment
US20120324090A1 (en) Resource control method, apparatus, and system in peer-to-peer network
US20230155996A1 (en) Method and electronic device for managing digital keys
WO2021089035A1 (zh) 一种签约数据的管理方法、装置
US11637704B2 (en) Method and apparatus for determining trust status of TPM, and storage medium
Rizzardi et al. Analysis on functionalities and security features of Internet of Things related protocols
US11838755B2 (en) Techniques for secure authentication of the controlled devices
US11240661B2 (en) Secure simultaneous authentication of equals anti-clogging mechanism
US20220369103A1 (en) Method and apparatus for performing uwb secure ranging
KR101785382B1 (ko) 클라이언트 인증 방법, 클라이언트의 동작 방법, 서버, 및 통신 소프트웨어
WO2022048125A1 (zh) 信息处理方法、装置、设备及存储介质
WO2023221502A1 (zh) 数据传输方法和系统及信令安全管理网关
US12003629B2 (en) Secure server digital signature generation for post-quantum cryptography key encapsulations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18837594

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18837594

Country of ref document: EP

Kind code of ref document: A1