WO2020062972A1 - 基于区块链的数据处理方法及装置、电子设备 - Google Patents

基于区块链的数据处理方法及装置、电子设备 Download PDF

Info

Publication number
WO2020062972A1
WO2020062972A1 PCT/CN2019/092895 CN2019092895W WO2020062972A1 WO 2020062972 A1 WO2020062972 A1 WO 2020062972A1 CN 2019092895 W CN2019092895 W CN 2019092895W WO 2020062972 A1 WO2020062972 A1 WO 2020062972A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
business
service
blockchain
authentication
Prior art date
Application number
PCT/CN2019/092895
Other languages
English (en)
French (fr)
Inventor
邱鸿霖
张辉
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Priority to SG11202010630RA priority Critical patent/SG11202010630RA/en
Priority to EP19866641.4A priority patent/EP3779760B1/en
Publication of WO2020062972A1 publication Critical patent/WO2020062972A1/zh
Priority to US17/085,559 priority patent/US20210049715A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • G06Q50/163Property management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • One or more embodiments of the present specification relate to the field of blockchain technology, and in particular, to a method and an apparatus for processing data based on a blockchain, and an electronic device.
  • Blockchain technology also known as distributed ledger technology, is an emerging technology in which several computing devices participate in "accounting" and jointly maintain a complete distributed database. Because blockchain technology has the characteristics of decentralization, openness and transparency, each computing device can participate in database records, and data can be quickly synchronized between computing devices, making blockchain technology widely used in many fields. Apply.
  • This specification proposes a data processing method based on a blockchain that stores a variety of business data related to a target business; wherein the business data includes at least data content; and The referenced source data, the method includes:
  • the authentication root data and the multiple service data are organized into a service data chain with the authentication root data as a root node.
  • This specification also proposes a data processing device based on a blockchain, wherein the blockchain stores various business data related to a target business; wherein the business data includes at least data content; and the business data
  • the referenced source data, the device includes:
  • An acquisition module which obtains authentication root data related to a target service; wherein the authentication root data has previously completed data authentication and carries a data certificate indicating that the data authentication has passed;
  • a determining module that determines first data that references the authentication root data in the plurality of types of business data; and second data that references the first data, and so on, until it is determined that between the plurality of types of business data Data reference relationship;
  • An organization module based on the data reference relationship, organizes the authentication root data and the multiple business data into a business data chain with the authentication root data as a root node.
  • This specification also proposes an electronic device, including:
  • Memory for storing machine-executable instructions
  • the processor is caused to:
  • the authentication root data has previously completed data authentication and carries a data certificate indicating that the data authentication has passed;
  • the authentication root data and the multiple service data are organized into a service data chain with the authentication root data as a root node.
  • the root data carries data certification, which can be used without relying on external data.
  • Independent verification is performed under the premise of the above; therefore, for any business data on the above business data chain, only data tracing in the above business data chain based on the data reference relationship can complete the data verification, so that it can be based on the above business data chain
  • FIG. 1 is a flowchart of a blockchain-based data processing method according to an exemplary embodiment.
  • FIG. 2 is a schematic diagram of business data reference data stored in a blockchain according to an exemplary embodiment.
  • FIG. 3 is an architecture diagram of an alliance chain provided by an exemplary embodiment.
  • FIG. 4 is a schematic diagram of a data chain for traceability verification of an online rental business organization according to an exemplary embodiment.
  • FIG. 5 is a schematic structural diagram of an electronic device according to an exemplary embodiment.
  • FIG. 6 is a block diagram of a blockchain-based data processing apparatus according to an exemplary embodiment.
  • the purpose is to propose a technical solution to organize a variety of business data related to the target business stored in the blockchain into a business data chain that can be traced and verified based on the data reference relationship.
  • a variety of business data related to the target business can be stored in advance in the distributed database of the blockchain in the form of transactions; where the data structure of each business data can be at least the data content and the business
  • the source data referenced by the data consists of two parts;
  • the standard format of the transactions supported by the blockchain can be extended to extend a reference field in the standard format of the transactions; when each business node in the blockchain constructs a transaction that carries the business data, The source data referenced by this business data can also be populated into the reference field, and then the completed transaction can be published and stored in the blockchain.
  • the upper-level application can first obtain the authentication root data related to the target business stored in the blockchain;
  • the authentication root data has completed data authentication in advance, and carries a data certificate indicating that the data authentication has passed, so that the authentication root data can be independently verified without relying on external data;
  • the application may determine that the first data that references the authentication root data is used among the various business data that has been stored in the blockchain; and the second data that references the first data. , And so on, until all the data reference relationships between the above various business data are obtained.
  • the upper-layer application can organize the above-mentioned authentication root data and the above-mentioned multiple kinds of business data into a service with the above-mentioned authentication root data as the root node based on the data reference relationship Data link.
  • the root data carries data certification, which can be independent of external Independent verification under the premise of data; therefore, for any business data on the above business data chain, only data tracing in the above business data chain based on the data reference relationship can complete data verification, so that it can be based on the above business data
  • To build a trusted business model flexibly and provide users with authentic and reliable verification services.
  • FIG. 1 is a block chain-based data processing method provided by an embodiment of the present specification and is applied to an application client.
  • the block chain stores various business data related to a target service;
  • the business data includes at least data content; and the source data referenced by the business data; the above method performs the following steps:
  • Step 102 Obtain authentication root data related to the target service stored in the blockchain; wherein the authentication root data has completed data authentication in advance and carries a data certificate indicating that the data authentication has passed;
  • Step 104 Determine the first data that references the authentication root data in the multiple types of service data; and the second data that references the first data, and so on, until the multiple types of service data are obtained.
  • Step 106 Organize the authentication root data and the multiple service data into a service data chain with the authentication root data as a root node based on the data reference relationship.
  • the blockchain described in this specification may specifically include a private chain, a common chain, an alliance chain, etc., and is not particularly limited in this specification.
  • the above-mentioned blockchain may specifically include the service equipment of a real estate certification agency, the service equipment of a real estate leasing agency, the terminal equipment of a tenant, and the smart device installed in the house to be rented as a member node device.
  • An alliance chain ; the operator of the alliance chain can rely on the alliance chain to deploy online renting business online.
  • Each member node device described above can be used as a service node of the above-mentioned online rental service.
  • Each business node can publish the business data generated by itself in the form of a transaction in the alliance chain. After the published transaction is processed by the consensus node's consensus, it is stored in a distributed database in the alliance chain to complete its own generated data. "On-chain" registration of business data.
  • the transaction described in this specification refers to a piece of data created by a user through a client of the blockchain and needs to be finally released to the distributed database of the blockchain.
  • a narrow transaction refers to a value transfer issued by a user to the blockchain; for example, in a traditional Bitcoin blockchain network, a transaction can be a transfer initiated by a user in the blockchain.
  • the generalized transaction refers to a piece of business data with business intent issued by the user to the blockchain; for example, the operator can build an alliance chain based on actual business needs, and rely on the alliance chain to deploy other types that are not related to value transfer.
  • Online business (such as renting business, vehicle scheduling business, insurance claims business, credit services, medical services, etc.), and in this type of alliance chain, the transaction can be a business with a business intent issued by the user in the alliance chain Message or business request.
  • the above target services may include any type of online services that can be deployed in the blockchain; for example, online renting services; correspondingly, the above business data may include any type of online services that are deployed in the blockchain Relevant data; among them, the data type of the above business data can usually depend on the specific business type of the target business deployed on the blockchain;
  • the business data involved in the online rental business can usually include the property data of the rental property, the data of the rental property, the rental contract data of the rental property, and the lease. Smart hardware data installed in the listing, etc.
  • the above application client may include any type of upper-layer application that uses the underlying business data stored in the blockchain as data support to implement specific business functions;
  • the online renting service is still deployed in the blockchain as an example.
  • the above application client may specifically use the business data related to the online renting service stored in the blockchain as data support to implement, for example, verifying tenant leases. Whether the listed property is an app client for business functions such as trusted listings, rented tenants, or trusted tenants.
  • the online business is usually related to multiple business data; moreover, between the multiple business data related to the online business There may usually be a certain data reference relationship; in this case, when each business node in the blockchain conducts business data certification in the blockchain in the form of a transaction, the data reference relationship is not carried in the transaction Therefore, the data reference relationship between the business data stored in the blockchain by each business node will be unclear, and a "data island" will be formed, resulting in the integrity of the business data of the above online business cannot be guaranteed.
  • the standard format of transactions supported by the blockchain can be extended in advance, and at least one reference field can be further expanded based on the original data format of the transaction; this reference field is specifically used to fill the business The source data to which the data refers.
  • each business node in the blockchain can not only fill the data content of the business data that needs to be stored in the transaction, but also fill the source data referenced by the business data into the reference field. To write the data reference relationship in the business data of the certificate.
  • the business data that each business node deposits into the blockchain can follow the same standard data structure.
  • this standard data structure it can be composed of at least two parts: data content and source data referenced by the business data.
  • a data summary of the source data may be calculated in advance (such as a hash value), and then populate the source data's data digest with a reference field in the transaction.
  • the original data content of the source data referenced by the business data can also be directly filled into the reference field in the transaction.
  • the data digest of the source data referenced by the business data is filled in the reference field in the transaction as an example for description.
  • each business node constructs a transaction to carry business data, it can publish the transaction on the blockchain, and the consensus nodes in the blockchain will perform consensus processing. After the transaction consensus is passed, it can be stored in The specific block in the blockchain completes the operation of depositing the business data in the blockchain.
  • the source data that can be referenced by the business data that each business node has stored in the blockchain can be more flexible; it can be data that has been stored on the blockchain, or it can be stored in the AND area.
  • FIG. 2 is a schematic diagram of reference data of business data stored in a blockchain as shown in the present specification.
  • the business data stored in the blockchain can be referenced to the business data that has been stored in the blocks of the same blockchain, or it can be referenced across the chain in other blockchains.
  • Deposited business data; for example, the above-mentioned blockchain can be an alliance chain composed of multiple sub-chains.
  • Each business node can store business data generated by itself on different sub-chains and reference them across the chain.
  • the third-party storage system may specifically include a CAS (content-addressable-storage) storage platform that provides a reliable data storage service for a blockchain.
  • the various service data related to the above target service may also include at least one authentication root data; the so-called authentication root data refers to data authentication that has been completed in advance, and carries a data proof indicating that the data authentication has passed. ), Data that can be independently verified without relying on external data.
  • the above-mentioned authentication root data can also be stored on the blockchain in advance, or it can be stored independently in a third-party storage system connected to the blockchain, which is not particularly limited in this description; for example, see FIG. 2, Figure 2 shows that the authentication root data is stored independently in a third-party storage system that interfaces with the blockchain.
  • the operator of the blockchain can rely on the business data stored in the blockchain to develop upper-layer applications.
  • the upper-layer applications can use the data reference relationship to integrate the various services related to the target business stored in the blockchain. Data, the organization becomes a business data chain with traceable verification.
  • the upper-level application can first obtain the authentication root data related to the target business, and then further determine the first data that references the authentication root data among the various business data that has been stored on the blockchain; when it is determined that the reference After the first data of the root data is authenticated, the second data that refers to the first data in the multiple types of business data is further determined in the same manner, and so on, until all the data between the multiple types of business data are determined. Stop when referencing a relationship.
  • the upper-layer application when the upper-layer application determines the first data that references the authentication root data in the multiple service data, it may first calculate a data summary of the authentication data root; then, the authentication root data may be The data summary is used as a query index to initiate a query in the block of the blockchain; and the node device in the blockchain can respond to the query initiated by the upper-level application, and store the data summary of the authentication root data with the certificate in the blockchain.
  • the node device may return the target service data or the data summary of the target service data as a query result and return it to the upper-layer application.
  • the upper-layer application may determine the target service data as the first data that references the authentication root data.
  • the specific implementation process for the upper-layer application to determine the second data that references the first data in the foregoing multiple service data is the same as the implementation process described above, and is not repeated here.
  • the data reference relationship between the above-mentioned various business data stored in the blockchain can be determined by the operator of the blockchain based on the business characteristics of the online business deployed on the blockchain. Custom design is not limited in this specification.
  • the authentication root data and the multiple types of business data can be organized into business data with the authentication root data as the root node. chain.
  • the above business data chain is organized based on the data reference relationship between various business data related to the above target business, and as the root node's authentication, the root data carries data certification, which can be independent without relying on external data Verification; therefore, for any business data on the above business data chain, only data tracing in the above business data chain based on the data reference relationship can complete the data verification, so that upper-layer applications can be flexible based on the above business data chain
  • the upper-layer application can initiate a service verification request for the target service. After receiving the user-initiated service verification request, the upper-layer application can respond to the service verification request and execute the service based on the service data link. The service verification initiated by the user for the above target service, and then the corresponding service verification result is returned to the user.
  • the following description uses the above-mentioned blockchain as an alliance chain and the above-mentioned target business as an online rental business as an example.
  • the above-mentioned target business as the online renting business is only exemplary; obviously, in practical applications, the above target business may also be other types of online services other than the online renting business, which is not described in this specification. Enumerate one by one.
  • FIG. 3 is an architecture diagram of an alliance chain shown in this specification.
  • the real estate certification agency, the real estate rental agency, the tenant, and the smart device installed in the property to be rented are all You can join the alliance chain as a member of the alliance, and as a business node in the online rental business, jointly participate in the business process of the online rental business.
  • the above alliance chain may specifically include multiple sub-chains.
  • an independent sub-chain can be deployed for members of alliances such as real estate certification agencies, real estate leasing agencies, tenants, and smart devices; for example, the property certification data sub-chain can be deployed for real estate certification agencies, and for real estate leasing
  • the institution deploys the house number sub-chain, the lease contract sub-chain for the tenants, the smart device data sub-chain and the smart device operation data sub-chain for smart devices; thus. It enables real estate certification agencies, real estate leasing agencies, tenants, smart devices and other alliance members to store their business data in their own sub-chains.
  • the real estate certification agency can perform data authentication on the property data of the house and generate the property certificate data of the house after the certification is passed; the generated property certificate data can be the property data of the house and indicate that the property data has The data certificate that has passed the data certification consists of two parts. By verifying the data certificate carried by the property certificate data, it can be determined whether the property anchored by the property certificate data is a real property with property rights.
  • the property certification agency After the property certification agency passes the data authentication on the property data of the house, it can sign the property data based on the private key held, and use the signed property data as the property right certification data.
  • the above-mentioned data certificate is the signature carried by the property certificate data.
  • the property right certification data generated by the real estate certification agency can be stored persistently on the service equipment of the real estate certification agency; or, the real estate certification agency can also publish the generated property right certification data to the alliance chain in the form of a transaction. Credentials are stored in blocks of the data subchain.
  • the property right certification data carries data certification, independent verification can be performed without relying on external data, so when constructing a transaction based on the property right certification data, the reference field in the transaction can be null.
  • the real estate leasing agency (or individual renting the individual) can divide the real estate with the property right certificate data into at least one rentable listing, and generate a listing number for each listing code; in the coding information of the listing number , which can include basic information such as the size of the listing, renovation information, and smart hardware installed in the listing.
  • the house number refers to the property right certification data stored on the blockchain, indicating the house belonging to the house.
  • the real estate leasing agency After the real estate leasing agency has generated a listing code for the divided listings, it can construct a transaction based on the listing number of each listing, and fill the data summary of the above proof of title data in the reference field of the transaction, and then The transaction is posted to the alliance chain, and the certificate is stored in the block of the house number sub-chain.
  • one piece of property right certification data can be divided into multiple rentable houses.
  • a tenant can sign a lease contract with a real estate leasing agency online based on the listing number of the real estate when renting one of the above-mentioned multiple listings; for example, the tenant and the real estate leasing agency can use the The private key signs the lease contract and completes the signing of the lease contract.
  • the lease contract refers to the number of the house where the certificate is stored on the blockchain, and the house lease number can be used to query the historical lease contract and the lease contract currently in effect.
  • the tenant can build a transaction based on the signed lease contract, and fill in the data's summary of the listing number of the rented property in the reference field of the transaction, and then post the transaction to the alliance chain , Deposit in the block of the lease contract sub-chain.
  • a house can correspond to multiple historical lease contracts stored on the blockchain and a lease contract currently in force.
  • the deposit certificate operation of the signed lease contract on the blockchain can also be completed by the real estate lease agency
  • a real estate leasing agency constructs a transaction based on the signed lease contract, and fills in the data ’s data summary of the leased property ’s listing in the reference field of the transaction, and then publishes the transaction to the blockchain. Credentials are stored in the blocks of the blockchain.
  • Smart devices can collect basic data related to smart devices that need to be stored on the blockchain as smart device data;
  • the above smart device data can reference the house number stored on the blockchain, so that the smart device can be bound to the house number of the house where the smart device is installed.
  • the smart device can build a transaction based on the collected smart device data, and fill in the data's summary of the listing number of the home where the smart device is located in the reference field of the transaction, and then publish the transaction to the alliance chain. Credentials are stored in blocks of the data subchain.
  • the smart device can also collect the smart device operation data generated by the smart device during the operation process; the above smart device operation data can refer to the smart device data stored on the blockchain, indicating the smart device operation data The operating data generated for the smart device; the above smart device operating data can also reference the lease contract stored on the blockchain, indicating that the smart device operating data is the operating data generated during the lease period corresponding to the lease contract .
  • the smart device can build a transaction based on the collected smart device operating data, and fill in the transaction's reference field with a data summary of the house number of the house where the smart device is located, and the house where the smart device is currently in effect. A data summary of the lease contract, and then publish the transaction to the alliance chain, and deposit it in the block where the smart device runs the data sub-chain.
  • the above-mentioned smart device operating data is specifically used to determine the active time of the tenant in the rented house; for example, in practical applications, the above-mentioned smart running device may be a smart device installed in the rented house during operation.
  • the generated log data through these log data, it can reflect whether the smart device in the property is used by the tenant, and indirectly reflect whether the tenant who rents the property is a trusted tenant who actually stays.
  • the above upper-layer application can count the active time of the tenant in the rented property based on the smart device operating data stored in the alliance chain, and reach a certain length of time when the active time of the tenant is reached After that, a certain number of lease points are issued to the tenants;
  • the calculated active time may be compared with a preset threshold (for example, two weeks), and if the active time reaches the preset threshold, a certain number of rental points may be issued to the tenant.
  • a preset threshold for example, two weeks
  • FIG. 4 is a schematic diagram of a data chain traceable to an online rental business organization as shown in the present specification.
  • the upper-level application can obtain the property right certification data of a property as the authentication root data, and in turn determine the house number that references the property right certification data, the lease contract and smart device data that reference the house number, and the reference The lease contract and the smart device operation data of the smart device data, and then based on the determined data reference relationship, the house number stored in the blockchain that references the above property right data, the lease contract that references the above house number, and the reference The smart device data of the above house number, the smart device operating data that refers to the smart device data and the lease contract are organized into a data chain with the property right certification data as the root node.
  • the upper-layer application can flexibly build a trusted business model based on the above-mentioned data chain, and provide users (users can be tenants, landlords, or real estate leasing agencies) with authentic and reliable authentication services.
  • the user can initiate a service verification of the above-mentioned online rental service by initiating a verification request to the upper-layer application; and the upper-layer application can respond to the user-initiated service verification request, complete the user-initiated business verification based on the data chain, and then send the verification Returns the verification result.
  • the upper-layer application provides a user-oriented verification service through a trusted business model built, which may specifically be verification initiated by any of the data nodes in the above data chain, which is not specifically limited in this specification;
  • the above-mentioned application provides a user-oriented verification service through the established trusted business model, which may specifically be a trusted house verification service for the above-mentioned online rental business.
  • the tenant can initiate a trusted listing verification request through the above-mentioned application; and the above-mentioned upper-layer application can respond to the trusted listing verification request initiated by the tenant and verify the rented listing based on the data chain Whether it is a trusted listing.
  • verifying whether the listing is a trusted listing can usually include verifying whether the listing is anchored to a real listing with property rights; and whether the listing is a valid listing (that is, verifying whether the listing is currently groupable) .
  • the above-mentioned trusted house verification request may include the house number of the house rented by the tenant; after receiving the trusted house verification request, the upper-level application may first verify the user ’s Whether the house number of the rented house has been stored on the blockchain; for example, the data summary of the house number is used as a query index, and a query is initiated in the block of the blockchain to determine the house. Whether the number has been stored in the blockchain;
  • the upper-level application can further trace the data on the above data chain to obtain the listing number of the listing that has been stored on the blockchain.
  • the referenced property right data and verify whether there is a logical conflict between multiple house numbers that reference the property right data; for example, if the sum of the area of the houses corresponding to the multiple house numbers is greater than the property data of the house The total area recorded in the data, it is considered that there is a logical conflict between the multiple listing numbers;
  • the upper-level application can further verify the data certificate carried by the proof of title data; if the data The certification verification is passed, indicating that the property certificate data referenced by the listing number, the anchored property is a real property with property rights, and the property rented by the tenant is a credible property.
  • the above-mentioned trusted house verification request may also include a lease contract signed by the tenant and the real estate leasing agency; since the lease contract references the house number, the upper-level application receives the trusted house After verifying the request, you can also query all lease contracts that reference the house number stored in the blockchain based on the house number referenced in the lease contract, and further verify whether the lease contracts found are historical lease contracts; If the lease contracts found are historical lease contracts, it means that there are no other effective contracts during the lease period of the lease contract, and the house corresponding to the house number is available for lease.
  • the listing is valid. That is, for a valid house, it can match multiple historical lease contracts with certificates on the blockchain, and at most one lease contract that is in effect.
  • the above-mentioned application provides a user-oriented authentication service through the established trusted business model, and may also be a trusted tenant authentication service for the above-mentioned online rental business.
  • the management user of the real estate leasing institution can initiate a trusted tenant verification request through the above-mentioned application; and the above-mentioned application can respond to the trusted house verification request initiated by the management user of the real estate leasing institution, based on the above data chain To verify that the tenant is a trusted tenant.
  • verifying whether the tenant is a trusted tenant usually includes verifying whether the tenant has actually stayed in the rented property.
  • the above-mentioned trusted house verification request may include the house number of the house rented by the tenant.
  • the upper-level application may perform the above-mentioned data link. Data tracing to obtain the smart device data referencing the listing number; when the smart device data referencing the listing number is obtained, the smart device operating data referencing the smart device data can be further obtained;
  • the smart device operating data can reflect whether the referenced smart device is used by the tenant, and indirectly reflect whether the tenant of the house where the smart device is installed is a trusted tenant who actually stays; therefore, the upper-level application
  • the above-mentioned application provides a user-oriented verification service through the established trusted business model, and may also be a trusted lease point verification service for the above-mentioned online rental business.
  • the above rental points may specifically be the upper-layer application data of smart devices based on the certificate stored in the blockchain. After the statistics of the active time of the tenants in the rented property reaches a preset threshold, , A certain number of rental points issued to the tenant. That is, the number of rental points actually indicates how active a tenant is in the property they rent.
  • the management user of the lease management institution can initiate a trusted lease point verification request through the above-mentioned application; and the above-mentioned application can respond to the trusted lease point verification request initiated by the management user of the lease management institution, based on the above data chain To verify that the lease points issued to tenants are credible lease points.
  • verifying whether the lease points issued to the tenant are credible lease points can usually include verifying whether the tenant's active time in the rented property has reached the active time indicated by the lease point.
  • the above-mentioned trusted house verification request may include the house number of the house rented by the tenant.
  • the upper-level application may perform the above-mentioned data link. Data tracing to obtain the smart device data referencing the listing number; when the smart device data referencing the listing number is obtained, the smart device operating data referencing the smart device data can be further obtained;
  • the smart device operation data can be used to count the active time of the tenant in the rented property, and the rental points issued to the tenant are sent when the active time reaches a preset threshold; therefore, the above-mentioned upper-layer application can Based on the obtained smart device operating data, the statistics of the active time of the tenant in the rented property are re-stated, and it is verified whether the newly counted active time of the tenant in the rented property is the same as that of the tenant.
  • the active times indicated by the issued lease points match; if they match, it indicates that the number of lease points issued to the tenant is reasonable, and the lease points issued to the tenant are credible lease points.
  • the upper-level application will issue 10 lease points to the tenant. Then the upper-level application will perform credible lease point verification on these 10 lease points. You can verify whether the re-statisticed active time of the tenant in the listing is two weeks; if it is, it indicates that the number of lease points issued to the tenant is reasonable, and these 10 lease points are credible lease points.
  • the upper-layer application builds a trusted business model through the data chain shown in Figure 4 and provides user-oriented verification services, in addition to the trusted home verification, trusted tenant verification, and In addition to verification services such as credit leasing points verification, in actual applications, it can also be other forms of verification services that can be verified based on the data chain shown in Figure 4; The verification service of whether the smart device in the property listing is missing after the rent-out is not listed in this manual.
  • this specification also provides an embodiment of a data processing device based on a blockchain.
  • the embodiments of the blockchain-based data processing device of this specification can be applied to electronic devices.
  • the device embodiments may be implemented by software, or by hardware or a combination of software and hardware. Taking software implementation as an example, as a device in a logical sense, it is formed by reading the corresponding computer program instructions in the non-volatile memory into the memory through the processor of the electronic device in which it is located.
  • FIG. 5 this is a hardware structure diagram of the electronic device in which the blockchain-based data processing device is located in this specification, except for the processor, memory, network interface, and non-processor shown in FIG. 5.
  • the electronic device in which the device is located in the embodiment may generally include other hardware according to the actual function of the electronic device, and details are not described herein again.
  • Fig. 6 is a block diagram of a blockchain-based data processing device according to an exemplary embodiment of the present specification.
  • the blockchain-based data processing device 60 can be applied to the electronic device shown in FIG. 5 described above; wherein the blockchain stores various business data related to the target business;
  • the service data includes at least data content; and the source data referenced by the service data, the device 60 includes: an acquisition module 601, a determination module 602, and an organization module 603.
  • the obtaining module 601 obtains authentication root data related to a target service, wherein the authentication root data has completed data authentication in advance, and carries a data certificate indicating that the data authentication passes;
  • the determining module 602 determines first data that references the authentication root data among the multiple types of service data; and second data that references the first data, and so on, until one of the multiple types of service data is obtained. Data reference relationship
  • An organizing module 603 organizes the authentication root data and the multiple service data into a service data chain with the authentication root data as a root node based on the data reference relationship.
  • the device 60 further includes:
  • a receiving module 604 (not shown in FIG. 6), receiving a service verification request related to the target service
  • the verification module 605 (not shown in FIG. 6), in response to the service verification request, performs a service verification for the target service based on the service data link, and returns a service verification result.
  • the service data includes data content; and a data summary of source data referenced by the service data;
  • the determining module 602 is a determining module 602:
  • the authentication root data is stored in the blockchain; or, it is stored in a third-party storage system that interfaces with the blockchain.
  • the multiple types of business data are stored in different sub-chains in the blockchain, respectively.
  • the target service includes: a rental service
  • the certification root data includes: property right certification data in which the property right certification agency has completed data certification in advance;
  • the multiple types of business data include: house number data that references the property right certification data, lease contract data that references the house number data, smart device data that references the house number data, and references to the smart device
  • the smart device operation data of the data and the lease contract data wherein the smart device operation data is used to determine the active time of the tenant in the rented house.
  • the service verification for the target service includes any of the following:
  • Verification of credible rental points for the rental business wherein the rental points are issued to tenants when the active time in the rented apartment reaches a threshold.
  • the relevant part may refer to the description of the method embodiment.
  • the device embodiments described above are only schematic, and the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, which may be located in One place, or can be distributed to multiple network modules. Some or all of these modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement without creative efforts.
  • the system, device, module, or module described in the foregoing embodiments may be specifically implemented by a computer chip or entity, or may be implemented by a product having a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet computer, wearable device, or a combination of any of these devices.
  • the electronic device includes a processor and a memory for storing machine-executable instructions; wherein the processor and the memory are usually connected to each other through an internal bus.
  • the device may further include an external interface to enable communication with other devices or components.
  • the processor by reading and executing the machine-executable instructions corresponding to the control logic of the blockchain-based data processing stored in the memory, the processor is caused to:
  • the authentication root data and the multiple service data are organized into a service data chain with the authentication root data as a root node.
  • the processor by reading and executing the machine-executable instructions corresponding to the control logic of the blockchain-based data processing stored in the memory, the processor is caused to:
  • a service verification for the target service is performed based on the service data link, and a service verification result is returned.
  • the business data includes data content; and a data summary of source data referenced by the business data; by reading and executing control logic stored in the memory and processing data based on a blockchain
  • the processor is caused to:

Abstract

一种基于区块链的数据处理方法,所述区块链中存储了与目标业务相关的多种业务数据;其中,所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据,包括:获取与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。

Description

基于区块链的数据处理方法及装置、电子设备 技术领域
本说明书一个或多个实施例涉及区块链技术领域,尤其涉及一种基于区块链的数据处理方法及装置、电子设备。
背景技术
区块链技术,也被称之为分布式账本技术,是一种由若干台计算设备共同参与“记账”,共同维护一份完整的分布式数据库的新兴技术。由于区块链技术具有去中心化、公开透明、每台计算设备可以参与数据库记录、并且各计算设备之间可以快速的进行数据同步的特性,使得区块链技术已在众多的领域中广泛的进行应用。
发明内容
本说明书提出一种基于区块链的数据处理方法,所述区块链中存储了与目标业务相关的多种业务数据;其中,所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据,所述方法包括:
获取与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
本说明书还提出一种基于区块链的数据处理装置,所述区块链中存储了与目标业务相关的多种业务数据;其中,所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据,所述装置包括:
获取模块,获取与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
确定模块,确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
组织模块,基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
本说明书还提出一种电子设备,包括:
处理器;
用于存储机器可执行指令的存储器;
其中,通过读取并执行所述存储器存储的与基于区块链的基于区块链的数据处理的控制逻辑对应的机器可执行指令,所述处理器被促使:
获取与目标业务相关的认证根数据;其中,所述区块链中存储了与目标业务相关的多种业务数据;所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据;所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
通过以上实施例,由于上述业务数据链是基于与上述目标业务相关的多种业务数据之间的数据引用关系组织而成,并且作为根节点的认证根数据携带数据证明,可以在不依赖外部数据的前提下进行独立验证;因此,对于上述业务数据链上任一业务数据而言,只需要基于数据引用关系在上述业务数据链中进行数据追溯,就可以完成数据验证,从而可以基于上述业务数据链来灵活的搭建可信业务模型,为用户提供真实可信的验证服务。
附图说明
图1是一示例性实施例提供的一种基于区块链的数据处理方法的流程图。
图2是一示例性实施例提供的一种在区块链中存证的业务数据引用数据的示意图。
图3是一示例性实施例提供的一种联盟链的架构图。
图4是一示例性实施例提供的一种为在线租房业务组织可追溯验证的数据链的示意 图。
图5是一示例性实施例提供的一种电子设备的结构示意图。
图6是一示例性实施例提供的一种基于区块链的数据处理装置的框图。
具体实施方式
在本说明书中,旨在提出一种基于数据引用关系,将区块链中存储的与目标业务相关的多种业务数据,组织成为可追溯验证的业务数据链的技术方案。
在实现时,与目标业务相关的多种业务数据,可以以交易的形式预先在区块链的分布式数据库中进行存储;其中,每种业务数据的数据结构至少可以由数据内容,以及该业务数据所引用的源数据两部分组成;
例如,在实现时,可以对区块链支持的交易的标准格式进行扩展,在交易的标准格式中扩展出一个引用字段;区块链中的各个业务节点在构建承载该业务数据的交易时,可以将该业务数据所引用的源数据也填充至引用字段,然后可以将构建完成的交易在区块链中进行发布和存储。
而在组织业务数据链时,上层应用首先可以获取区块链中存储的与目标业务相关的认证根数据;
其中,认证根数据预先完成了数据认证,并且携带指示数据认证通过的数据证明,使得该认证根数据可以在不依赖外部数据的前提下进行独立验证;
进一步,上述应用在获取到上述认证根数据后,可以确定在区块链中已经存储的多种业务数据中,引用所述认证根数据的第一数据;以及,引用第一数据的第二数据,并以此类推,直到得出上述多种业务数据之间全部的数据引用关系。
当确定出上述多种业务数据之间全部的数据引用关系之后,上层应用可以基于该数据引用关系,将上述认证根数据和上述多种业务数据,组织成以上述认证根数据为根节点的业务数据链。
在以上实施例中,由于上述业务数据链是基于与上述目标业务相关的多种业务数据之间的数据引用关系组织而成,并且作为根节点的认证根数据携带数据证明,可以在不依赖外部数据的前提下进行独立验证;因此,对于上述业务数据链上任一业务数据而言,只需要基于数据引用关系在上述业务数据链中进行数据追溯,就可以完成数据验证,从 而可以基于上述业务数据链来灵活的搭建可信业务模型,为用户提供真实可信的验证服务。
下面通过具体实施例并结合具体的应用场景对本说明书进行描述。
请参考图1,图1是本说明书一实施例提供的一种基于区块链的数据处理方法,应用于应用客户端;其中,区块链中存储了与目标业务相关的多种业务数据;所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据;上述方法执行以下步骤:
步骤102,获取区块链中存储的与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
步骤104,确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
步骤106,基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
在本说明书所描述的区块链,具体可以包括私有链、共有链以及联盟链等,在本说明书中不进行特别限定。
例如,在一个场景中,上述区块链具体可以是由房产认证机构的服务设备、房产租赁机构的服务设备、租客的终端设备、安装于待出租房房源中的智能设备作为成员节点设备组成的一个联盟链;该联盟链的运营方可以依托于该联盟链,来在线部署在线租房业务。而以上所描述的各个成员节点设备都可以作为上述在线租房业务的一个业务节点。各个业务节点可以将自身所产生的业务数据以交易的形式在联盟链中进行发布,当所发布的交易经过共识节点的共识处理之后,在联盟链中的分布式数据库进行存储,完成自身所产生的业务数据的“上链”存证。
其中,需要说明的是,在本说明书中所描述的交易(Transaction),是指用户通过区块链的客户端创建,并需要最终发布至区块链的分布式数据库中的一笔数据。
区块链中的交易,通常存在狭义的交易以及广义的交易之分。狭义的交易是指用户向区块链发布的一笔价值转移;例如,在传统的比特币区块链网络中,交易可以是用户在区块链中发起的一笔转账。而广义的交易是指用户向区块链发布的一笔具有业务意图的业务数据;例如,运营方可以基于实际的业务需求搭建一个联盟链,依托于联盟链部署一些与价值转移无关的其它类型的在线业务(比如,租房业务、车辆调度业务、保险理赔业务、信用服务、医疗服务等),而在这类联盟链中,交易可以是用户在联盟链中 发布的一笔具有业务意图的业务消息或者业务请求。
上述目标业务,可以包括任意类型的能够在区块链中进行部署的在线业务;例如,在线租房业务;相应的,上述业务数据,则可以包括任意类型的与在区块链中部署的在线业务相关的数据;其中,上述业务数据的数据类型,通常可以取决于在区块链所部署的目标业务的具体业务类型;
例如,仍以上述目标业务为在线租房业务为例,在线租房业务所涉及的业务数据,通常可以包括租赁房源的产权数据、租赁房源的房源数据、租赁房源的租赁合同数据、租赁房源中安装的智能硬件数据等。
上述应用客户端,可以包括任意类型的以区块链中存储的底层业务数据作为数据支撑,来实现特定的业务功能的上层应用;
例如,仍以在区块链中部署在线租房业务为例,上述应用客户端具体可以是,以区块链中存储的与在线租房业务相关的业务数据作为数据支撑,来实现诸如验证租客承租的房源是否为可信房源、承租的租客是否可信租客等业务功能的APP客户端。
在本说明书中,区块链的运营方在依托于区块链来部署上述目标业务时,与目标业务相关的多种业务数据,可以以交易的形式预先在区块链的分布式数据库中进行存储。
其中,需要说明的是,在传统的区块链中,将数据以交易的形式在区块链中进行数据存证时,在交易中通常仅会涵盖该需要存证的数据的数据内容,并不会在交易中携带所存证的数据的数据引用关系。
在实际应用中,在区块链中部署一些需要多个业务节点共同参与的在线业务时,该在线业务通常会与多种业务数据相关;而且,与该在线业务相关的多种业务数据之间通常可能还会存在一定的数据引用关系;在这种情况下,区块链中的各个业务节点以交易的形式在区块链中进行业务数据存证时,由于交易中并不携带数据引用关系,因此会造成各个业务节点在区块链中存证的业务数据之间数据引用关系不明确,形成“数据孤岛”,导致上述在线业务的业务数据的完整性无法得到保证。
基于此,在本说明书中,可以预先对区块链支持的交易的标准格式进行扩展,在交易原有的数据格式的基础上,进一步扩展出至少一个引用字段;该引用字段具体用于填充业务数据所引用的源数据。
区块链中的各个业务节点在构建承载业务数据的交易时,除了可以将需要存证的业务数据的数据内容填充在交易中,还可以将该业务数据所引用的源数据也填充至引用字 段,以在存证的业务数据中写入数据引用关系。
也即,在本说明书中,各业务节点向区块链存证的业务数据,可以遵循相同的标准数据结构。在该标准数据结构中,至少可以由数据内容,以及该业务数据所引用的源数据两部分组成。
其中,需要说明的是,在交易的标准格式中扩展出的引用字段,可以为多个;也即,交易所承载的业务数据,可以通过应用多个源数据、
在示出的一种实施方式中,为了降低所存证的业务数据的数据量,各业务节点在交易中的引用字段填充业务数据所引用的源数据时,可以预先计算该源数据的数据摘要(比如hash值),然后将该源数据的数据摘要填充至交易中的引用字段。当然,在实际应用中,也可以直接将业务数据所引用的源数据的原始数据内容,填充至交易中的引用字段。在以下的实施例中,将以在交易中的引用字段中填充业务数据所引用的源数据的数据摘要为例进行说明。
当各业务节点在构建完成用于承载业务数据的交易之后,可以将该交易在区块链上进行发布,由区块链中的共识节点进行共识处理;当该交易共识通过后,可以存储至区块链中的特定区块,完成该业务数据在区块链中的存证操作。
其中,对交易进行共识处理的具体过程,通常取决于区块链所支持的共识算法,在本说明书中不再进行详述,本领域技术人员在将本说明书披露的技术方案付诸实现时,可以参考相关技术中的记载。
在本说明书中,各业务节点在区块链中存证的业务数据所能引用的源数据,可以比较灵活;可以是已经在区块链上存证的数据,也可以是已经存储在与区块链对接的第三方存储系统中的持久化数据。
例如,请参见图2,图2为本说明书示出的一种在区块链中存证的业务数据引用数据的示意图。
如图2所示,在区块链中存证的业务数据,可以引用在同一条区块链的区块中已经存证的业务数据,也可以跨链引用在其它区块链的区块中存证的业务数据;比如,上述区块链具体可以是一个由多条子链构成的联盟链,各个业务节点可以将自身产生的业务数据分别在不同的子链上进行存证,并跨链引用其它子链上已经存证的业务数据;甚至,还可以引用存储在与区块链对接的第三方存储系统中的认证根数据。例如,上述第三方存储系统具体可以包括面向区块链提供可靠的数据存储服务的CAS (content-addressable-storage,内容可寻址存储)存储平台。
在本说明书中,与上述目标业务相关的多种业务数据中,还可以包括至少一认证根数据;所谓认证根数据,是指预先完成了数据认证,并携带指示数据认证通过的数据证明(proof),能够在不依赖外部数据的前提下进行独立验证的数据。
其中,上述认证根数据也可以预先在区块链上进行存证,也可以独立存储于与区块链对接的第三方存储系统,在本说明书中不进行特别限定;例如,请参见图2,图2中示出的为将认证根数据独立存储于与区块链对接的第三方存储系统中。
区块链的运营方可以依托于在区块链中存证的业务数据,来开发上层应用,由上层应用可以基于数据引用关系,将区块链中存证的与目标业务相关的多种业务数据,组织成为可追溯验证的业务数据链。
在实现时,上层应用首先可以获取与目标业务相关的认证根数据,再进一步确定已经在区块链上存证的多种业务数据中引用该认证根数据的第一数据;当确定出引用该认证根数据的第一数据之后,再按照相同的方式,进一步确定上述多种业务数据中引用该第一数据的第二数据,以此类推,直到确定出上述多种业务数据之间所有的数据引用关系时停止。
例如,在示出的一种实施方式中,上层应用确定上述多种业务数据中引用上述认证根数据的第一数据时,首先可以计算该认证数据根的数据摘要;然后可以将该认证根数据的数据摘要作为查询索引,在区块链的区块中发起查询;而区块链中的节点设备可以响应上层应用发起的查询,将该认证根数据的数据摘要与在区块链中存证的上述多种业务数据中的所引用的源数据的数据摘要进行匹配;如果上述多种业务数据中的任一目标业务数据中所引用的源数据的数据摘要与该认证根数据的数据摘要匹配,节点设备可以将该目标业务数据或者该目标业务数据的数据摘要作为查询结果,返回给上层应用。上层应用在收到查询结果后,可以将该目标业务数据确定为引用上述认证根数据的第一数据。上层应用确定上述多种业务数据中引用该第一数据的第二数据的具体实施过程,与以上描述的实施过程相同,不再赘述。
其中,需要说明的是,在区块链中存证的上述多种业务数据之间的数据引用关系,可以由区块链的运营方基于在区块链上部署的在线业务的业务特性,来进行自定义设计,在本说明书中不进行特别限定。
当上层应用确定出上述多种业务数据之间的数据引用关系之后,可以基于该数据引 用关系,将所述认证根数据和上述多种业务数据组织成以该认证根数据为根节点的业务数据链。
由于上述业务数据链是基于与上述目标业务相关的多种业务数据之间的数据引用关系组织而成,并且作为根节点的认证根数据携带数据证明,可以在不依赖外部数据的前提下进行独立验证;因此,对于上述业务数据链上任一业务数据而言,只需要基于数据引用关系在上述业务数据链中进行数据追溯,就可以完成数据验证,从而上层应用可以基于上述业务数据链,来灵活的搭建可信业务模型,为用户提供真实可信的验证服务。
而对于用户而言,可以通过上层应用发起针对上述目标业务的业务验证请求,而上述上层应用在接收到用户发起的业务验证请求之后,可以响应该业务验证请求,基于上述业务数据链,来执行由用户发起的针对上述目标业务的业务验证,然后向用户返回相应的业务验证结果。
以下以上述区块链为联盟链,上述目标业务为在线租房业务为例进行说明。
其中,需要强调的是,以上述目标业务为在线租房业务仅为示例性的;显然,在实际应用中,上述目标业务也可以是在线租房业务以外的其它类型的在线业务,在本说明书中不再进行一一列举。
请参见图3,图3为本说明书示出的一种联盟链的架构图。
如图3所示,在示出的一种实施方式中,在联盟链中部署在线租房业务时,房产认证机构、房产租赁机构、租客、安装于待出租房房源中的智能设备,均可以作为联盟成员加入联盟链,并作为在线租房业务中的业务节点,共同参与在线租房业务的业务流程。
其中,在示出的一种实现方式中,上述联盟链具体可以包括多条子链。如图3所示,可以针对房产认证机构、房产租赁机构、租客、智能设备等联盟成员,分别部署一条独立的子链;比如,可以针对房产认证机构部署产权证明数据子链,针对房产租赁机构部署房源编号子链,针对租客部署租赁合同子链,针对智能设备部署智能设备数据子链和智能设备运行数据子链;从而。使得房产认证机构、房产租赁机构、租客、智能设备等联盟成员,可以将自身所产生的业务数据,在各自的子链中进行存证。
房产认证机构,可以对房源的产权数据进行数据认证,并在认证通过后生成该房源的产权证明数据;其中,生成的产权证明数据可以由房源的产权数据,和指示该产权数据已经通过了数据认证的数据证明两部分组成,通过验证产权证明数据所携带的数据证明,可以确定该产权证明数据所锚定的房产是否为具有产权的真实房产。
例如,在实际应用中,房产认证机构对房源的产权数据进行数据认证通过后,可以基于持有的私钥对该产权数据进行签名,将签名后的产权数据作为产权证明数据;在这种情况下,上述数据证明即为该产权证明数据所携带的签名。
对于房产认证机构生成的产权证明数据,可以在房产认证机构的服务设备上进行持久化存储;或者,房产认证机构也可以将生成的产权证明数据来以交易的形式发布至联盟链,在产权证明数据子链的区块中进行存证。
其中,由于产权证明数据携带数据证明,可以在不依赖外部数据的前提下进行独立验证,因此在基于产权证明数据构建交易时,该交易中的引用字段可以为空值。
房产租赁机构(或者房租租赁个人),可以将拥有产权证明数据的房产切分为至少一个可出租的房源,并为每一个房源编码生成一个房源编号;在房源编号的编码信息中,可以包括房源面积、装修信息、安装在该房源中的智能硬件等基础信息。
其中,房源编号引用在区块链上存证的产权证明数据,表示归属于该房产下的房源。当房产租赁机构在为切分出的房源生成了房源编码之后,可以基于每一个房源的房源编号来构建交易,并在交易的引用字段中填充上述产权证明数据的数据摘要,然后将该交易发布至联盟链,在房源编号子链的区块中进行存证。其中,在实际应用中,一份产权证明数据可以切分为多个可出租的房源。
租客,在承租上述多个房源中的某一房源时,可以基于该房源的房源编号与房产租赁机构在线签署租赁合同;例如,租客和房产租赁机构可以分别使用持有的私钥对租赁合同进行签名,完成租赁合同的签署。
其中,租赁合同引用在区块链上存证的房源编号,进而通过房源编号可以查询区块链中存证的历史租赁合同以及当前正在生效的租赁合同。
当租赁合同签署完成后,租客可以基于签署完毕的租赁合同,来构建交易,并在交易的引用字段中填充所承租的房源的房源编号的数据摘要,然后将该交易发布至联盟链,在租赁合同子链的区块中进行存证。
其中,一个房源可以对应区块链上存证的多份历史租赁合同,和一份当前正在生效的租赁合同。
当然,在实际应用中,签署完成的租赁合同在区块链的存证操作,也可以由房产租赁机构来完成;
例如,由房产租赁机构基于签署完毕的租赁合同,来构建交易,并在交易的引用字段中填充所承租的房源的房源编号的数据摘要,然后将该交易发布至区块链,在区块链的区块中进行存证。
智能设备,一方面,可以采集与智能设备相关的,需要在区块链上进行存证的基础数据作为智能设备数据;
其中,上述智能设备数据可以引用在区块链上存证的房源编号,使得该智能设备而可以与安装该智能设备的房源的房源编号进行绑定。
而智能设备可以基于采集到的智能设备数据来构建交易,并在该交易的引用字段中填充该智能设备所在房源的房源编号的数据摘要,然后将该交易发布至联盟链,在智能设备数据子链的区块中进行存证。
另一方面,智能设备还可以采集智能设备在运行过程中所产生的智能设备运行数据;其中,上述智能设备运行数据可以引用在区块链上存证的智能设备数据,表示该智能设备运行数据为该智能设备产生的运行数据;上述智能设备运行数据还可以同时引用在区块链上存证的租赁合同,表示该智能设备运行数据,是在该租赁合同对应的承租周期内产生的运行数据。
而智能设备可以基于采集到的智能设备运行数据,来构建交易,并在交易的引用字段中填充该智能设备所在房源的房源编号的数据摘要,以及该智能设备所在房源当前正在生效的租赁合同的数据摘要,然后将该交易发布至联盟链,在智能设备运行数据子链的区块中进行存证。
其中,上述智能设备运行数据具体用于确定租客在承租房源中的活跃时间;例如,在实际应用中,上述智能运行设备,可以是安装在承租房源中的智能设备在运行过程中所产生的日志数据;通过这些日志数据,可以反映出该房源中的智能设备是否被租客使用,并间接的反映承租该房源的租客是否为真实入住的可信租客。
进一步的,在一种场景下,上述上层应用可以基于联盟链中存证的智能设备运行数据,来统计租客在所承租的房源中的活跃时间,并在租客的活跃时间达到一定时长后,向租客发放一定数量的租赁积分;
例如,可以将统计出的活跃时间与预设阈值(比如两周)进行比较,如果该活跃时间达到了该预设阈值,可以向租客发放一定数量的租赁积分。
请参见图4,图4为本说明书示出的一种为在线租房业务组织可追溯验证的数据链 的示意图。
如图4所示,上层应用可以获取一房产的产权证明数据作为认证根数据,并依次确定出引用该产权证明数据的房源编号,引用该房源编号的租赁合同和智能设备数据、以及引用该租赁合同和智能设备数据的智能设备运行数据,然后基于确定出的数据引用关系,将区块链中存证的引用上述产权证明数据的房源编号、引用上述房源编号的租赁合同、引用上述房源编号的智能设备数据、引用上述智能设备数据和上述租赁合同的智能设备运行数据,组织成以产权证明数据为根节点的数据链。
其中,需要说明的是,在实际应用中,以上描述的产权证明数据、房源编号数据、租赁合同数据、智能设备数据、智能设备运行数据之间的数据引用关系,可以基于实际的业务需求进行调整和互换,在本说明书中不进行特别限定。
进一步的,上层应用可以基于上述数据链,来灵活的搭建可信业务模型,面向用户(用户可以是租客、房东或者房产租赁机构)提供真实可信的验证服务。
用户可以通过向上述上层应用发起验证请求的方式,发起对上述在线租房业务的业务验证;而上层应用可以响应用户发起的业务验证请求,基于上述数据链来完成用户发起的业务验证,然后向用户返回验证结果。
其中,需要说明的是,上层应用通过搭建的可信业务模型,面向用户提供的验证服务,具体可以是针对上述数据链中任一数据节点发起的验证,在本说明书中不进行特别限定;
在示出的一种实施方式中,上述应用通过搭建的可信业务模型,面向用户提供的验证服务,具体可以是针对上述在线租房业务的可信房源验证服务。
在这种情况下,租客可以通过上述上层应用发起可信房源验证请求;而上述上层应用可以响应租客发起的可信房源验证请求,基于上述数据链来验证租客承租的房源是否为可信房源。
其中,验证房源是否为可信房源,通常可以包括验证房源是否锚定了具有产权的真实房源;以及,该房源是否为有效房源(即验证该房源当前是否可组)。
在一种情况下,在上述可信房源验证请求中,可以包括租客所承租的房源的房源编号;上层应用在收到该可信房源验证请求后,首先可以验证该用户所承租的房源的房源编号,是否已经在区块链上完成存证;比如,将该房源编号的数据摘要作为查询索引,在区块链的区块中发起查询,以确定该房源编号是否已经在区块链中完成存证;
如果是,表明该房源的房源编号,已经经过租赁平台的审核;此时,上层应用可以进一步在上述数据链上进行数据追溯,获取已经在区块链上存证的该房源编号所引用的产权证明数据,并验证引用该产权证明数据的多个房源编号在逻辑上是否存在冲突;比如,如果该多个房源编号对应的房源面积之和,大于该房源的产权数据中记录的总面积,就认为该多个房源编号在逻辑上存在冲突;
如果引用该产权证明数据的多个房源编号在逻辑上并不存在冲突,表明该房源编号为有效房源,此时上层应用可以进一步验证该产权证明数据所携带的数据证明;如果该数据证明验证通过,表明该房源编号所引用的产权证明数据,所锚定的房产为具有产权的真实房产,该租客承租的房源为可信房源。
在另一种情况下,在上述可信房源验证请求中,还可以包括租客与房产租赁机构签署的租赁合同;由于租赁合同引用房源编号,因此上层应用在收到该可信房源验证请求后,还可以基于该租赁合同所引用的房源编号,查询区块链中存证的引用该房源编号的所有租赁合同,并进一步验证查询到的租赁合同是否均为历史租赁合同;如果查询到的租赁合同均为历史租赁合同,表明在该租赁合同的租赁周期内,不存在其它的生效合同,该房源编号对应的房源处于可出租的状态,此时该租客承租的房源为有效房源。也即,对于一个有效房源来说,可以匹配在区块链上存证的多份历史租赁合同,和至多一份生效的租赁合同。
在示出的一种实施方式中,上述应用通过搭建的可信业务模型,面向用户提供的验证服务,也可以是针对上述在线租房业务的可信租客验证服务。
在这种情况下,房产租赁机构的管理用户可以通过上述上层应用发起可信租客验证请求;而上述上层应用可以响应房产租赁机构的管理用户发起的可信房源验证请求,基于上述数据链来验证租客是否为可信租客。
其中,验证租客是否为可信租客,通常可以包括验证该租客是否真实入住了所承租的房源。
在这种情况下,在上述可信房源验证请求中,可以包括租客承租的房源的房源编号,上层应用在收到该可信房源验证请求后,可以在上述数据链上进行数据追溯,获取引用该房源编号的智能设备数据;当获取到引用该房源编号的智能设备数据,还可以进一步获取引用该智能设备数据的智能设备运行数据;
由于智能设备运行数据,可以反映出所引用的智能设备是否被租客使用,并间 接的反映安装了该智能设备的房源的租客是否为真实入住的可信租客;因此,上层应用在获取到引用该房源编号的智能设备数据之后,可以通过进一步验证是否获取到引用该智能设备数据的智能设备运行数据,来确定该房源编号对应的租客,是否为真实入住的可信租客;如果获取到引用该智能设备数据的智能设备运行数据,表明该房源编号对应的房源中安装的智能设备存在运行记录,表明承租该房源的租客为真实入住的可信租客。
在示出的一种实施方式中,上述应用通过搭建的可信业务模型,面向用户提供的验证服务,还可以是针对上述在线租房业务的可信租赁积分验证服务。
其中,如前所述,上述租赁积分,具体可以是上层应用在基于区块链中存证的智能设备运行数据,统计出的租客在所承租的房源中的活跃时间达到预设阈值后,向租客发放的一定数量的租赁积分。也即,租赁积分的数量,实际上指示租客在其承租的房源中的活跃时间。
在这种情况下,租赁管理机构的管理用户可以通过上述上层应用发起可信租赁积分验证请求;而上述上层应用可以响应租赁管理机构的管理用户发起的可信租赁积分验证请求,基于上述数据链来验证向租客发放的租赁积分是否为可信租赁积分。
其中,验证向租客发放的租赁积分是否为可信租赁积分,通常可以包括验证该该租客在所承租的房源中的活跃时间,是否达到了与该租赁积分所能指示的活跃时间。
在这种情况下,在上述可信房源验证请求中,可以包括租客承租的房源的房源编号,上层应用在收到该可信房源验证请求后,可以在上述数据链上进行数据追溯,获取引用该房源编号的智能设备数据;当获取到引用该房源编号的智能设备数据,还可以进一步获取引用该智能设备数据的智能设备运行数据;
由于智能设备运行数据,可以用于统计租客在所承租的该房源中的活跃时间,并且发放给租客的租赁积分,是该活跃时间达到预设阈值时发送;因此,上述上层应用可以基于获取到的智能设备运行数据,重新来统计租客在所承租的房源中的活跃时间,并验证重新统计出的租客在所承租的房源中的活跃时间,是否与向该租客发放的租赁积分所指示的活跃时间匹配;如果二者匹配,表明向该租客发放的租赁积分数量合理,向该租客发放的租赁积分为可信租赁积分。
例如,假设租客在所承租的房源中的活跃时间达到两周,上层应用会向该租客发放10个租赁积分,那么上层应用在针对这10个租赁积分进行可信租赁积分验证时,可以通过验证重新统计出的租客在该房源中的活跃时间,是否为两周;如果是,表明向 该租客发放的租赁积分数量合理,这10个租赁积分为可信的租赁积分。
需要强调的是,上层应用通过图4示出的数据链搭建可信业务模型,面向用户提供的验证服务,除了可以是针对上述在线租房业务的可信房源验证、可信租客验证、可信租赁积分验证等验证服务以外,在实际应用中,也可以是基于图4示出的数据链能够完成验证的其它形式的验证服务;比如,验证租赁合同是否有效的验证服务、验证租客承租的房源中的智能设备在退租后是否缺失的验证服务等等,在本说明书中不再进行一一列举。
与上述方法实施例相对应,本说明书还提供了一种基于区块链的数据处理装置的实施例。本说明书的基于区块链的数据处理装置的实施例可以应用在电子设备上。装置实施例可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为一个逻辑意义上的装置,是通过其所在电子设备的处理器将非易失性存储器中对应的计算机程序指令读取到内存中运行形成的。从硬件层面而言,如图5所示,为本说明书的基于区块链的数据处理装置所在电子设备的一种硬件结构图,除了图5所示的处理器、内存、网络接口、以及非易失性存储器之外,实施例中装置所在的电子设备通常根据该电子设备的实际功能,还可以包括其他硬件,对此不再赘述。
图6是本说明书一示例性实施例示出的一种基于区块链的数据处理装置的框图。
请参考图6,所述基于区块链的数据处理装置60可以应用在前述图5所示的电子设备中;其中,所述区块链中存储了与目标业务相关的多种业务数据;其中,所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据,所述装置60包括有:获取模块601、确定模块602和组织模块603。
获取模块601,获取与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
确定模块602,确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
组织模块603,基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
在本实施例中,所述装置60还包括:
接收模块604(图6中未示出),接收针对所述目标业务相关的业务验证请求;
验证模块605(图6中未示出),响应于所述业务验证请求,基于所述业务数据链执行针对所述目标业务的业务验证,并返回业务验证结果。
在本实施例中,所述业务数据包括数据内容;以及,所述业务数据所引用的源数据的数据摘要;
所述确定模块602:
将所述认证根数据的数据摘要作为查询索引向所述区块链发起查询;
当查询到所述多种业务数据中的任一目标业务数据中所引用的源数据的数据摘要与所述认证根数据的数据摘要匹配时,确定所述目标业务数据为引用所述认证根数据的第一数据。
在本实施例中,所述认证根数据存储在所述区块链;或者,存储在与所述区块链对接的第三方存储系统。
在本实施例中,所述多种业务数据分别存储在所述区块链中的不同子链。
在本实施例中,所述目标业务包括:租房业务;
所述认证根数据包括:由产权认证机构预先完成数据认证的产权证明数据;
所述多种业务数据包括:引用所述产权证明数据的房源编号数据、引用所述房源编号数据的租赁合同数据、引用所述房源编号数据的智能设备数据、以及引用所述智能设备数据和所述租赁合同数据的智能设备运行数据;其中,所述智能设备运行数据用于确定租客在承租房源中的活跃时间。
在本实施例中,针对所述目标业务的业务验证包括以下中的任一:
针对所述租房业务的可信房源验证;
针对所述租房业务的可信租客验证;
针对所述租房业务的可信租赁积分验证;其中,所述租赁积分为租客在承租房源中的活跃时间达到阈值时向租客发放。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以 根据实际的需要选择其中的部分或者全部模块来实现本说明书方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
上述实施例阐明的系统、装置、模块或模块,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
与上述方法实施例相对应,本说明书还提供了一种电子设备的实施例。该电子设备包括:处理器以及用于存储机器可执行指令的存储器;其中,处理器和存储器通常通过内部总线相互连接。在其他可能的实现方式中,所述设备还可能包括外部接口,以能够与其他设备或者部件进行通信。
在本实施例中,通过读取并执行所述存储器存储的与基于区块链的数据处理的控制逻辑对应的机器可执行指令,所述处理器被促使:
获取与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
在本实施例中,通过读取并执行所述存储器存储的与基于区块链的数据处理的控制逻辑对应的机器可执行指令,所述处理器被促使:
接收针对所述目标业务相关的业务验证请求;
响应于所述业务验证请求,基于所述业务数据链执行针对所述目标业务的业务验证,并返回业务验证结果。
在本实施例中,所述业务数据包括数据内容;以及,所述业务数据所引用的源数据的数据摘要;通过读取并执行所述存储器存储的与基于区块链的数据处理的控制逻辑对应的机器可执行指令,所述处理器被促使:
将所述认证根数据的数据摘要作为查询索引向所述区块链发起查询;
当查询到所述多种业务数据中的任一目标业务数据中所引用的源数据的数据摘要与所述认证根数据的数据摘要匹配时,确定所述目标业务数据为引用所述认证根数据的第一数据。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本说明书的其它实施方案。本说明书旨在涵盖本说明书的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本说明书的一般性原理并包括本说明书未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本说明书的真正范围和精神由下面的权利要求指出。
应当理解的是,本说明书并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本说明书的范围仅由所附的权利要求来限制。
以上所述仅为本说明书的较佳实施例而已,并不用以限制本说明书,凡在本说明书的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本说明书保护的范围之内。

Claims (17)

  1. 一种基于区块链的数据处理方法,所述区块链中存储了与目标业务相关的多种业务数据;其中,所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据,所述方法包括:
    获取与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
    确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
    基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
  2. 根据权利要求1所述的方法,还包括:
    接收针对所述目标业务相关的业务验证请求;
    响应于所述业务验证请求,基于所述业务数据链执行针对所述目标业务的业务验证,并返回业务验证结果。
  3. 根据权利要求1所述的方法,所述业务数据包括数据内容;以及,所述业务数据所引用的源数据的数据摘要。
  4. 根据权利要求3所述的方法,所述确定所述多种业务数据中引用所述认证根数据的第一数据,包括:
    将所述认证根数据的数据摘要作为查询索引向所述区块链发起查询;
    当查询到所述多种业务数据中的任一目标业务数据中所引用的源数据的数据摘要与所述认证根数据的数据摘要匹配时,确定所述目标业务数据为引用所述认证根数据的第一数据。
  5. 根据权利要求1所述的方法,所述认证根数据存储在所述区块链;或者,存储在与所述区块链对接的第三方存储系统。
  6. 根据权利要求1所述的方法,所述多种业务数据分别存储在所述区块链中的不同子链。
  7. 根据权利要求2所述的方法,所述目标业务包括:租房业务;
    所述认证根数据包括:由产权认证机构预先完成数据认证的产权证明数据;
    所述多种业务数据包括:引用所述产权证明数据的房源编号数据、引用所述房源编号数据的租赁合同数据、引用所述房源编号数据的智能设备数据、以及引用所述智能设备数据和所述租赁合同数据的智能设备运行数据;其中,所述智能设备运行数据用于确 定租客在承租房源中的活跃时间。
  8. 根据权利要求7所述的方法,针对所述目标业务的业务验证包括以下中的任一:
    针对所述租房业务的可信房源验证;
    针对所述租房业务的可信租客验证;
    针对所述租房业务的可信租赁积分验证;其中,所述租赁积分为租客在承租房源中的活跃时间达到阈值时向租客发放。
  9. 一种基于区块链的数据处理装置,所述区块链中存储了与目标业务相关的多种业务数据;其中,所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据,所述装置包括:
    获取模块,获取与目标业务相关的认证根数据;其中,所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
    确定模块,确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
    组织模块,基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
  10. 根据权利要求9所述的装置,还包括:
    接收模块,接收针对所述目标业务相关的业务验证请求;
    验证模块,响应于所述业务验证请求,基于所述业务数据链执行针对所述目标业务的业务验证,并返回业务验证结果。
  11. 根据权利要求9所述的装置,所述业务数据包括数据内容;以及,所述业务数据所引用的源数据的数据摘要。
  12. 根据权利要求11所述的装置,所述确定模块:
    将所述认证根数据的数据摘要作为查询索引向所述区块链发起查询;
    当查询到所述多种业务数据中的任一目标业务数据中所引用的源数据的数据摘要与所述认证根数据的数据摘要匹配时,确定所述目标业务数据为引用所述认证根数据的第一数据。
  13. 根据权利要求9所述的装置,所述认证根数据存储在所述区块链;或者,存储在与所述区块链对接的第三方存储系统。
  14. 根据权利要求9所述的装置,所述多种业务数据分别存储在所述区块链中的不同子链。
  15. 根据权利要求10所述的装置,所述目标业务包括:租房业务;
    所述认证根数据包括:由产权认证机构预先完成数据认证的产权证明数据;
    所述多种业务数据包括:引用所述产权证明数据的房源编号数据、引用所述房源编号数据的租赁合同数据、引用所述房源编号数据的智能设备数据、以及引用所述智能设备数据和所述租赁合同数据的智能设备运行数据;其中,所述智能设备运行数据用于确定租客在承租房源中的活跃时间。
  16. 根据权利要求15所述的装置,针对所述目标业务的业务验证包括以下中的任一:
    针对所述租房业务的可信房源验证;
    针对所述租房业务的可信租客验证;
    针对所述租房业务的可信租赁积分验证;其中,所述租赁积分为租客在承租房源中的活跃时间达到阈值时向租客发放。
  17. 一种电子设备,包括:
    处理器;
    用于存储机器可执行指令的存储器;
    其中,通过读取并执行所述存储器存储的与基于区块链的基于区块链的数据处理的控制逻辑对应的机器可执行指令,所述处理器被促使:
    获取与目标业务相关的认证根数据;其中,所述区块链中存储了与目标业务相关的多种业务数据;所述业务数据至少包括数据内容;以及,所述业务数据所引用的源数据;所述认证根数据预先完成了数据认证,并携带指示数据认证通过的数据证明;
    确定所述多种业务数据中引用所述认证根数据的第一数据;以及,引用所述第一数据的第二数据,以此类推,直到得出所述多种业务数据之间的数据引用关系;
    基于所述数据引用关系将所述认证根数据和所述多种业务数据组织成以所述认证根数据为根节点的业务数据链。
PCT/CN2019/092895 2018-09-30 2019-06-26 基于区块链的数据处理方法及装置、电子设备 WO2020062972A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG11202010630RA SG11202010630RA (en) 2018-09-30 2019-06-26 Blockchain-based data procesing method, apparatus, and electronic device
EP19866641.4A EP3779760B1 (en) 2018-09-30 2019-06-26 Blockchain-based data processing method and apparatus, and electronic device
US17/085,559 US20210049715A1 (en) 2018-09-30 2020-10-30 Blockchain-based data procesing method, apparatus, and electronic device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811162432.7 2018-09-30
CN201811162432.7A CN109598147B (zh) 2018-09-30 2018-09-30 基于区块链的数据处理方法及装置、电子设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/085,559 Continuation US20210049715A1 (en) 2018-09-30 2020-10-30 Blockchain-based data procesing method, apparatus, and electronic device

Publications (1)

Publication Number Publication Date
WO2020062972A1 true WO2020062972A1 (zh) 2020-04-02

Family

ID=65957319

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/092895 WO2020062972A1 (zh) 2018-09-30 2019-06-26 基于区块链的数据处理方法及装置、电子设备

Country Status (6)

Country Link
US (1) US20210049715A1 (zh)
EP (1) EP3779760B1 (zh)
CN (3) CN109598147B (zh)
SG (1) SG11202010630RA (zh)
TW (1) TWI727281B (zh)
WO (1) WO2020062972A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598518A (zh) 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 基于区块链的防伪方法及装置、电子设备
CN109598147B (zh) * 2018-09-30 2020-01-21 阿里巴巴集团控股有限公司 基于区块链的数据处理方法及装置、电子设备
CN110163691B (zh) * 2019-04-29 2020-12-04 创新先进技术有限公司 基于区块链的发票创建方法和装置、电子设备
US11087371B2 (en) 2019-04-29 2021-08-10 Advanced New Technologies Co., Ltd. Blockchain-based invoice creation method apparatus, and electronic device
WO2022104392A1 (en) * 2020-11-16 2022-05-19 Jpmorgan Chase Bank, N.A. Systems and methods for blockchain-based data-driven property management
CN113378235B (zh) * 2021-06-02 2022-05-24 浙江数秦科技有限公司 一种分布式供应链金融平台
CN116897345A (zh) * 2022-01-30 2023-10-17 京东方科技集团股份有限公司 合同任务的处理方法及装置
CN114254374B (zh) * 2022-03-01 2022-07-01 北京市农林科学院信息技术研究中心 数据溯源方法及系统
CN114490697B (zh) * 2022-03-28 2022-09-06 山东国赢大数据产业有限公司 一种基于区块链的数据协同处理方法及设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106780007A (zh) * 2016-11-28 2017-05-31 树读(上海)信息科技有限公司 一种征信数据共享与交易系统
US20170243286A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for allowing external validation of data in a process data network
CN108389129A (zh) * 2018-02-27 2018-08-10 阿里巴巴集团控股有限公司 基于区块链的交易执行方法及装置、电子设备
CN109598147A (zh) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 基于区块链的数据处理方法及装置、电子设备

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060242176A1 (en) * 2005-04-22 2006-10-26 Igor Tsyganskiy Methods of exposing business configuration dependencies
US10872077B2 (en) * 2013-09-23 2020-12-22 David D. Wright, SR. Management of entitlements using blockchain
CN106886864A (zh) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 一种业务构建方法、装置及电子设备
KR101772554B1 (ko) * 2016-02-02 2017-08-30 주식회사 코인플러그 파일에 대한 노터리 서비스를 제공하고 상기 노터리 서비스를 사용하여 기록된 파일에 대한 검증을 수행하는 방법 및 서버
CA3083508C (en) * 2016-06-17 2022-03-08 Jonathan WEIMER Blockchain systems and methods for user authentication
WO2018112940A1 (zh) * 2016-12-23 2018-06-28 深圳前海达闼云端智能科技有限公司 区块链节点的业务执行方法、装置及节点设备
CN106790253A (zh) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 基于区块链的认证方法和装置
CN107566360B (zh) * 2017-08-25 2019-11-26 北京中星仝创科技有限公司 一种数据认证码的生成方法
CN108023893A (zh) * 2017-12-18 2018-05-11 王松山 一种区块链数据认证系统的方法
CN108428168B (zh) * 2018-03-21 2021-03-02 王国良 一种基于区块链技术的房屋租赁方法和系统
CN111861433B (zh) * 2018-03-30 2024-04-02 创新先进技术有限公司 基于区块链的业务执行方法及装置、电子设备
CN108563784A (zh) * 2018-04-26 2018-09-21 福建中锐海沃科技有限公司 一种数字资源引用关系记录方法及系统
TWM565363U (zh) * 2018-05-24 2018-08-11 兆豐國際商業銀行股份有限公司 基於區塊鏈的虛擬貨幣整合系統
CN108898389B (zh) * 2018-06-26 2021-05-18 创新先进技术有限公司 基于区块链的内容验证方法及装置、电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243286A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for allowing external validation of data in a process data network
CN106780007A (zh) * 2016-11-28 2017-05-31 树读(上海)信息科技有限公司 一种征信数据共享与交易系统
CN108389129A (zh) * 2018-02-27 2018-08-10 阿里巴巴集团控股有限公司 基于区块链的交易执行方法及装置、电子设备
CN109598147A (zh) * 2018-09-30 2019-04-09 阿里巴巴集团控股有限公司 基于区块链的数据处理方法及装置、电子设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3779760A4 *

Also Published As

Publication number Publication date
EP3779760A1 (en) 2021-02-17
CN111177800A (zh) 2020-05-19
CN111177797A (zh) 2020-05-19
CN111177797B (zh) 2023-06-30
TW202014926A (zh) 2020-04-16
CN111177800B (zh) 2023-06-30
CN109598147B (zh) 2020-01-21
EP3779760A4 (en) 2021-10-13
US20210049715A1 (en) 2021-02-18
TWI727281B (zh) 2021-05-11
CN109598147A (zh) 2019-04-09
EP3779760B1 (en) 2023-05-24
SG11202010630RA (en) 2020-11-27

Similar Documents

Publication Publication Date Title
WO2020062972A1 (zh) 基于区块链的数据处理方法及装置、电子设备
TWI737944B (zh) 基於區塊鏈的交易執行方法及裝置、電子設備
TWI706368B (zh) 基於區塊鏈的服務租賃方法、裝置、系統及電子設備
CN110121727B (zh) 一种为智能合同提供经证实、可审计和不可变输入的方法和系统
CN108632268B (zh) 区块链访问的鉴权方法和装置、存储介质、电子装置
CN112491551B (zh) 基于区块链的数据验证方法及装置、电子设备
WO2020088108A1 (zh) 基于区块链的数据存证方法及装置、电子设备
WO2020057016A1 (zh) 基于区块链的保险理赔方法、电子装置及存储介质
US20210083856A1 (en) Improved hardware security module management
CN113537984A (zh) 基于区块链的内容验证方法及装置、电子设备
CN108960825A (zh) 基于区块链的电子签名方法及装置、电子设备
WO2020108114A1 (zh) 基于区块链的数据存证方法及装置、电子设备
CN109190881A (zh) 一种数据资产管理方法、系统及设备
CN109214818A (zh) 一种跨链交易方法及装置
CN110866289B (zh) 基于区块链的数据处理方法、装置、服务器及存储介质
CN110163755A (zh) 基于区块链的数据压缩、查询方法及装置和电子设备
CN113221191B (zh) 基于区块链的数据存证方法、装置、设备和存储介质
CN110555684A (zh) 基于区块链系统的账户及系统
CN112291321B (zh) 业务处理方法、装置及系统
WO2021213474A1 (zh) 基于区块链的税务管理方法、装置及计算机存储介质
CN113037505A (zh) 一种可信Web应用的实现方法及系统
CN116961876A (zh) 用于区块链的虚拟资源管理方法、装置、设备及存储介质
CN111260364A (zh) 一种基于区块链的可扩展快速支付方法及系统
CN114358948A (zh) Nft原子交换方法、系统、计算机可读存储介质及终端设备
CN115619395A (zh) 基于区块链的数据处理方法及相关设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19866641

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019866641

Country of ref document: EP

Effective date: 20201029

NENP Non-entry into the national phase

Ref country code: DE