WO2020119476A1 - 联盟链信息发布控制方法及终端设备 - Google Patents

联盟链信息发布控制方法及终端设备 Download PDF

Info

Publication number
WO2020119476A1
WO2020119476A1 PCT/CN2019/121861 CN2019121861W WO2020119476A1 WO 2020119476 A1 WO2020119476 A1 WO 2020119476A1 CN 2019121861 W CN2019121861 W CN 2019121861W WO 2020119476 A1 WO2020119476 A1 WO 2020119476A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
target
alliance chain
released
release
Prior art date
Application number
PCT/CN2019/121861
Other languages
English (en)
French (fr)
Inventor
冯承勇
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020119476A1 publication Critical patent/WO2020119476A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Definitions

  • This application belongs to the field of blockchain technology, and particularly relates to alliance chain information release control method and terminal equipment.
  • the alliance chain technology is mainly used between organizations with business connections for information sharing and management between organizations.
  • any alliance member or alliance node in the alliance chain can publish the information of its own organization, so that all alliance members or alliance nodes in the alliance chain can share the information, but at present, only the administrator needs to pass to join the alliance chain.
  • it is easy to cause confusion in the management of members or nodes in the alliance chain which may cause some members in the alliance chain to release untrusted information, resulting in the problem of reduced trust in information sharing in the alliance chain, which is not conducive to the development of alliance chain technology, so control It is an urgent problem for members of the alliance organization to release trusted information for the members of the alliance chain to share.
  • the first aspect of the embodiments of the present application provides a method for controlling release of alliance chain information, including:
  • each organization node in the alliance chain releases various types of information within a preset time period, multiple information types are selected, wherein the alliance chain contains multiple organization nodes, and each organization node contains multiple node devices;
  • the smart contract includes the information type identification, and the identity identification list of each organization node in the alliance chain;
  • the information type identifier in the target smart contract includes the target information type identifier, it is determined whether the list of IDs of each organization node in the alliance chain of the target smart contract includes the target ID, wherein the target smart contract Any one of all smart contracts;
  • the identity list of each organization node in the alliance chain of the target smart contract contains the target identity
  • the information to be released is sent to each recording node device in the alliance chain for storage to complete the information to be released In the release of the alliance chain.
  • a second aspect of an embodiment of the present application provides a terminal device, including a memory, a processor, and computer-readable instructions stored in the memory and executable on the processor, and the processor executes the computer
  • the following steps are realized when the instructions are readable:
  • each organization node in the alliance chain releases various types of information within a preset time period, multiple information types are selected, wherein the alliance chain contains multiple organization nodes, and each organization node contains multiple node devices;
  • the smart contract includes the information type identification, and the identity identification list of each organization node in the alliance chain;
  • the information type identifier in the target smart contract includes the target information type identifier, it is determined whether the list of IDs of each organization node in the alliance chain of the target smart contract includes the target ID, wherein the target smart contract Any one of all smart contracts;
  • the identity list of each organization node in the alliance chain of the target smart contract contains the target identity
  • the information to be released is sent to each recording node device in the alliance chain for storage to complete the information to be released In the release of the alliance chain.
  • a third aspect of the embodiments of the present application provides an alliance chain information release control device, including:
  • the information type filtering unit is used to filter out multiple information types according to the number of times each organization node in the alliance chain publishes various types of information within a preset time period, wherein the alliance chain contains multiple organization nodes, each organization node Contains multiple node devices;
  • the smart contract establishment unit is used to establish a smart contract for each information type selected, and the smart contract includes an information type identifier and a list of identity identifiers of each organization node in the alliance chain;
  • the request parsing unit is configured to parse out the target identity of the organization node to which the target node device belongs and the information to be released when the information release request sent by the target node device is received;
  • a release information recognition unit used to identify the type of information to be released and determine the target information type identifier of the type of information to be released;
  • the identity identification judging unit is used to determine whether the identity identification list of each organization node in the alliance chain of the target smart contract includes the target identification if the information type identification in the target smart contract includes the target information type identification , Where the target smart contract is any of all smart contracts;
  • a publishing information sending unit used to send the information to be released to each recording node device in the alliance chain if the identity identification list of each organization node in the alliance chain of the target smart contract includes the target identity identification Store to complete the release of the information to be released in the alliance chain.
  • a fourth aspect of the embodiments of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores computer-readable instructions, which are implemented by a processor as described in the first aspect The steps of the alliance chain information release control method.
  • the embodiment of the present application first selects multiple information types according to the number of times each organization node in the alliance chain releases various types of information within a preset time period, and establishes a smart contract for each selected information type.
  • the smart contract includes an information type identifier 1.
  • the identity list of each organization node in the alliance chain when receiving the information release request sent by the target node device, parse out the target identity of the organization node to which the target node device included in the information release request belongs and the information to be released; then Identify the type of information to be published and determine the target information type identifier of the type of information to be published; if the information type identifier in the target smart contract contains the target information type identifier, the identity of each organization node in the alliance chain of the target smart contract is judged Whether the ID list contains the target ID; if the ID list of each organization node in the alliance chain of the target smart contract contains the target ID, the information to be released is sent to each recording node device in the alliance chain for storage to complete the information to be released
  • the release of the alliance chain can ensure that the node devices that publish information in the alliance chain belong to the trusted devices in the alliance chain, reduce the release of untrusted information, and increase the trust of information sharing in the alliance chain.
  • FIG. 1 is a schematic flowchart of a method for controlling release of alliance chain information according to an embodiment of the present application
  • FIG. 2 is a schematic flowchart of a method for controlling release of alliance chain information provided by another embodiment of the present application
  • FIG. 3 is a schematic flowchart of a method for controlling release of alliance chain information provided by yet another embodiment of the present application.
  • FIG. 4 is a schematic flowchart of a method for controlling release of alliance chain information according to another embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 6 is a functional block diagram of an alliance chain information distribution control device provided by an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a method for controlling release of alliance chain information provided by an embodiment of the present application.
  • the side of the alliance chain consensus management server is used as an execution subject for explanation.
  • the alliance chain consensus management server can be one, or can be completed through communication and cooperation of multiple servers.
  • the processing procedure of the server may include the following steps:
  • the node device may be a device such as a personal computer, a server, or a mobile terminal.
  • the organization node may be a node device of a company or group local area network. You can count the number of information releases of various types, and the number of releases exceeds a certain number of information types, indicating that this type of information is published more, and filter out this type of information type.
  • S102 Establish a smart contract for each selected information type.
  • the smart contract includes information type identification and a list of identity identifications of each organization node in the alliance chain.
  • the smart contract refers to the protocol information used to regulate the alliance chain.
  • the information type identifier is used to uniquely identify the information type corresponding to the smart contract, and may be a set of arrays.
  • the identity of each organization node in the alliance chain may be the IP (Internet Protocol, network interconnection protocol) address of each organization node, the name of each organization node, or the code of each organization node.
  • S103 When receiving the information publishing request sent by the target node device, parse out the target identity of the organization node to which the target node device belongs and the information to be released contained in the information publishing request.
  • the target node device is any node device in the target organization node, and the target organization node is any organization node in each organization node in the intra-consortium chain.
  • the target node device sends an information release request, it will add the target identity of the target organization node (IP address, the name of each organization node, or the code of each organization node, etc.).
  • the information to be released can be added to the data message of the information release request.
  • S104 Identify the type of information to be published, and determine the target information type identifier of the type of information to be published.
  • each type of feature keyword may be extracted from the information to be published according to pre-stored multi-type feature keywords (where each type of feature keyword corresponds to an information type), if the number of any type of feature keywords of the information to be published is greater than Or equal to the preset number of times threshold, then the type of the information to be published is determined as the type of information corresponding to the characteristic keyword of the type.
  • Each type of feature keyword includes multiple feature keywords. For example, a piece of information to be released contains 5 “life” and 6 “insurance”, and the preset threshold of the number of times is 10, then the information to be released is determined as the type of “life insurance”.
  • S105 If the information type identifier in the target smart contract includes the target information type identifier, determine whether the list of IDs of each organization node in the alliance chain of the target smart contract includes the target ID, where the target smart contract is the Any one.
  • each smart contract can be traversed in a random order. If there is a target information type identifier in the information type identifier of the traversed smart contract, the traversed smart contract is determined as the target smart contract.
  • each recording node device is used to receive and record the information to be released. Since the information to be released is stored by each recording node device, distributed records ensure that the information to be released will not be modified at will, and the authenticity of the data is guaranteed .
  • this embodiment first selects multiple information types based on the number of times each organization node in the alliance chain releases various types of information within a preset time period, and establishes a smart contract for each selected information type.
  • the smart contract Including the information type identification, the identification list of each organization node in the alliance chain, when receiving the information release request sent by the target node device, the target identification of the organization node to which the target node device included in the information release request belongs and the pending Publish information; then identify the type of information to be published, and determine the target information type identifier of the type of information to be published; if the information type identifier in the target smart contract contains the target information type identifier, then judge each of the alliance chains of the target smart contract Whether the ID list of the organization node contains the target ID; if the ID list of each organization node in the alliance chain of the target smart contract contains the target ID, the information to be released is sent to each record node device in the alliance chain for storage, The completion of the release of the information
  • FIG. 2 is a schematic flowchart of a method for controlling release of alliance chain information according to another embodiment of the present application. Based on the foregoing embodiment, step S101 specifically includes the following steps:
  • S201 Obtain the information issued by each organization node in the alliance chain within a preset time period, and determine the information type of each piece of information according to the number of occurrences of characteristic keywords in each piece of information.
  • acquiring information published by each organization node in the alliance chain within a preset time period refers to all information published by all organization nodes within a preset time period.
  • extract each type of feature keyword from the information If the number of any type of feature keyword in the information is greater than or equal to the preset number of times threshold, then the information The type is determined as the type of information corresponding to this type of characteristic keyword.
  • the type of information whose number of postings exceeds a preset threshold is the type of information that has a higher number of postings among all types of posting information.
  • FIG. 3 is a schematic flowchart of a method for controlling release of alliance chain information provided by yet another embodiment of the present application.
  • the smart contract further includes a correspondence between the identity of each organization node in the alliance chain and read and write permissions.
  • the read and write authority includes write authority and/or read authority; before step S106, it also includes:
  • S301 Acquire the target read and write permission of the target node device according to the corresponding relationship.
  • the read and write permissions include write permissions and/or read permissions, where the write permissions refer to the corresponding identification organization node has the authority to publish information in the alliance chain, the information can be used within the alliance chain
  • the recording of each recording node device makes it impossible to modify the released information after recording; the read permission refers to the corresponding identification organization node has the right to read the information published by other node devices in the alliance chain.
  • the target read-write permission includes write permission and read permission
  • the information to be released is sent to each recording node device in the alliance chain for storage, and the release of the information to be released on the alliance chain is completed.
  • the target read and write permissions include write permissions and read permissions, indicating that the corresponding target node device has both the authority to publish information in the alliance chain and the ability to read information published by other node devices in the alliance chain Permissions.
  • the target read-write permission only includes the read permission, which means that the corresponding target node device only has the permission to read information published by other node devices in the alliance chain.
  • the permission of the target node device to publish information and read information within the alliance chain can be restricted to meet the needs of diverse information release.
  • a prompt to prohibit publishing of information is sent to the target node device. By sending a prompt message, it is reminded that the user of the target node device does not have the authority to publish information.
  • FIG. 4 is a schematic flowchart of a federation chain information release control method provided by another embodiment of the present application. Based on the foregoing embodiment, step S106 specifically includes the following steps:
  • S401 Acquire multiple recording node device identifiers according to the release range control information.
  • the identifier of the recording node device may be a node device with stable operation generated through election in the alliance chain.
  • the recording node device identifier is the MAC address (Medium Access Control, physical address) or code of the recording node device.
  • S402 Send the information to be released to the recording node device corresponding to the plurality of recording node device identifiers for storage, and complete the release of the information to be released in the local scope of the alliance chain.
  • the information to be released is sent to the corresponding recording node device for storage through the device identification, so as to prevent the information to be released from being missed or wrongly sent, and the accuracy of the release.
  • FIG. 5 shows a schematic structural diagram of a terminal device provided by an embodiment of the present application. For ease of explanation, only parts related to this embodiment are shown.
  • the alliance chain information distribution control device 600 is installed and operated in the terminal device 60.
  • the terminal device 60 may be a mobile terminal, a palmtop computer, a server, or the like.
  • the terminal device 60 may include, but is not limited to, a memory 601, a processor 602, and a display 603.
  • FIG. 5 only shows the terminal device 60 having the components 601-603, but it should be understood that it is not required to implement all the components shown, and more or fewer components may be implemented instead.
  • the memory 601 may be an internal storage unit of the terminal device 60, such as a hard disk or a memory of the terminal device 60.
  • the memory 601 may also be an external storage device of the terminal device 60, for example, a plug-in hard disk equipped on the terminal device 60, a smart memory card (Smart Media Card, SMC), or a secure digital device. (Secure Digital, SD) card, flash card (Flash Card), etc.
  • the memory 601 may also include both an internal storage unit of the terminal device 60 and an external storage device.
  • the memory 601 is used to store application software and various types of data installed in the terminal device 60, such as program codes of the alliance chain information release control device 600.
  • the memory 601 may also be used to temporarily store data that has been output or will be output.
  • the processor 602 may be a central processor (Central Processing Unit (CPU), microprocessor or other data processing chip, used to run the program code or processing data stored in the memory 601, for example, to execute the alliance chain information release control device 600.
  • CPU Central Processing Unit
  • microprocessor or other data processing chip, used to run the program code or processing data stored in the memory 601, for example, to execute the alliance chain information release control device 600.
  • the display 603 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an organic light-emitting diode (Organic Light-Emitting Diode, OLED) touch device, or the like.
  • the display 603 is used to display information processed in the terminal device 60 and to display a visual user interface, such as an application menu interface, an application icon interface, and the like.
  • the components 601-603 of the terminal device 60 communicate with each other through a system bus.
  • FIG. 6 is a functional block diagram of an alliance chain information release control device 600 provided by an embodiment of the present application.
  • the alliance chain information release control device 600 may be divided into one or more modules, the one or more modules are stored in the memory 601, and are controlled by one or more processors (This embodiment is executed by the processor 602) to complete this application.
  • the alliance chain information release control device 600 can be divided into an information type screening unit 701, a smart contract establishment unit 702, a request analysis unit 703, a release information recognition unit 704, an identity identification judgment unit 705 and Post information sending unit 706.
  • the unit referred to in this application refers to a series of computer-readable instruction segments capable of performing specific functions, and is more suitable than a program for describing the execution process of the alliance chain information distribution control device 600 in the terminal device 60.
  • the following description will specifically introduce the capabilities of the units 701-706.
  • the information type filtering unit 701 is used to filter out multiple information types according to the number of times each organization node in the alliance chain publishes various types of information within a preset time period, wherein the alliance chain contains multiple organization nodes, each organization node Contains multiple node devices;
  • the smart contract establishment unit 702 is used to establish a smart contract for each information type selected, and the smart contract includes an information type identifier and a list of identity identifiers of each organization node in the alliance chain;
  • the request parsing unit 703 is configured to, when receiving the information publishing request sent by the target node device, parse out the target identity of the organization node to which the target node device belongs and the information to be released contained in the information publishing request;
  • a publishing information recognition unit 704 configured to identify the type of information to be published and determine a target information type identifier of the type of information to be published;
  • the identity identification judging unit 705 is used to determine whether the identity identification list of each organization node in the alliance chain of the target smart contract includes the target identity if the information type identification in the target smart contract includes the target information type identification Logo, where the target smart contract is any one of all smart contracts;
  • the publishing information sending unit 706 is used to send the information to be released to each recording node in the alliance chain if the identity identification list of each organization node in the alliance chain of the target smart contract includes the target identity identification
  • the device stores and completes the release of the information to be released on the alliance chain.
  • this embodiment first selects multiple information types based on the number of times each organization node in the alliance chain releases various types of information within a preset time period, and establishes a smart contract for each selected information type.
  • the smart contract Including the information type identification, the identification list of each organization node in the alliance chain, when receiving the information release request sent by the target node device, the target identification of the organization node to which the target node device included in the information release request belongs and the pending Publish information; then identify the type of information to be published, and determine the target information type identifier of the type of information to be published; if the information type identifier in the target smart contract contains the target information type identifier, then judge each of the alliance chains of the target smart contract Whether the ID list of the organization node contains the target ID; if the ID list of each organization node in the alliance chain of the target smart contract contains the target ID, the information to be released is sent to each record node device in the alliance chain for storage, The completion of the release of the information
  • the information type screening unit 701 is specifically used to obtain information issued by each organization node in the alliance chain within a preset time period, and determine each piece of information according to the number of occurrences of characteristic keywords in each piece of information The information type of the information; if the number of postings corresponding to any information type exceeds a preset threshold, the information type is determined as the filtered information type.
  • the smart contract further includes the correspondence between the identity of each organization node in the alliance chain and the read and write permissions.
  • the read and write permissions include write permissions and/or read permissions; and also include :
  • a read-write permission acquisition unit 707 configured to acquire the target read-write permission of the target node device according to the corresponding relationship
  • the publishing information sending unit 706 is further configured to send the information to be released to each recording node device in the alliance chain for storage if the target read and write permissions include write permissions and read permissions. Release of the information to be released in the alliance chain;
  • the release information isolation unit 708 is configured to send the information to be released to the isolation storage server for storage if the target read-write permission includes only read permission.
  • the information release request further includes release range control information, and the release range control information includes multiple recording node device identifiers;
  • the posting information sending unit 706 is specifically configured to acquire multiple recording node device identifiers according to the posting range control information; send the information to be released to the recording node devices corresponding to the multiple recording node device identifiers for storage, Complete the release of the information to be released in the local scope of the alliance chain.
  • the release information isolation unit 708 is further configured to send a prompt to prohibit release of information to the target node device if the target read-write permission includes only read permission.
  • each functional unit and module is used as an example for illustration.
  • the above-mentioned functions may be allocated by different functional units
  • Module completion means that the internal structure of the device is divided into different functional units or modules to complete all or part of the functions described above.
  • the functional units and modules in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above integrated unit may use hardware It can also be implemented in the form of software functional units.
  • the specific names of each functional unit and module are only for the purpose of distinguishing each other, and are not used to limit the protection scope of the present application.
  • the disclosed device/terminal device and method may be implemented in other ways.
  • the device/terminal device embodiments described above are only schematic.
  • the division of the module or unit is only a logical function division, and in actual implementation, there may be another division manner, such as multiple units Or components can be combined or integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or software functional unit.
  • the integrated module/unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the present application implements all or part of the processes in the methods of the above embodiments, and can also be completed by instructing relevant hardware through computer-readable instructions, which can be stored in a computer-readable storage medium
  • the computer readable instructions include computer readable instruction codes
  • the computer readable instruction codes may be in source code form, object code form, executable file, or some intermediate form, etc.
  • the computer-readable medium may include: any entity or device capable of carrying the computer-readable instruction code, a recording medium, a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electrical carrier signals, telecommunication signals and software distribution media, etc.
  • a recording medium a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electrical carrier signals, telecommunication signals and software distribution media, etc.
  • ROM read-only memory
  • RAM random access memory
  • electrical carrier signals telecommunication signals and software distribution media

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请适用于区块链技术领域,提供联盟链信息发布控制方法及终端设备,方法包括:对筛选出的每个信息类型建立一个智能合约,智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表,解析出信息发布请求中包含的目标节点设备所属的组织节点的目标身份标识以及待发布信息;然后识别待发布信息的类型,并确定待发布信息的类型的目标信息类型标识;若目标智能合约中的信息类型标识中包含目标信息类型标识,则判断目标智能合约中是否包含目标身份标识;若包含则将待发布信息发送至联盟链内的各记录节点设备进行存储,完成待发布信息在联盟链的发布,能够保证在联盟链内发布信息的节点设备属于联盟链内的可信任设备,减少不可信的信息的发布。

Description

联盟链信息发布控制方法及终端设备
本申请要求于2018年12月14日提交中国专利局、申请号为201811529440.0、发明名称为“联盟链信息发布控制方法及终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请属于区块链技术领域,尤其涉及联盟链信息发布控制方法及终端设备。
背景技术
随着数字加密货币在的发展,其背后的区块技术也逐渐得到了广泛的关注与研究。当下区块链行业发展方兴未艾,各种技术发展迅速,目前对区块链技术的主流划分主要有公有链、私有脸和联盟链。联盟链技术主要应用在有业务关联的组织之间,用于组织间的信息共享和管理。
目前,联盟链内的任意一个联盟成员或联盟节点都可以发布自己所属组织的信息,使得联盟链内的所有联盟成员或联盟节点都能共享该信息,但是目前加入联盟链仅需要管理员通过即可,易造成联盟链内成员或节点管理混乱,进而导致联盟链内某些成员会发布不可信的信息,造成联盟链内信息共享信任度下降的问题,不利于联盟链技术的发展,因此控制联盟组织成员发布可信信息供联盟链成员共享就成了一个亟需要解决的问题。
技术问题
对集群中某个节点创建数据快照时,需要提前从管理服务器请求一个快照标识,在网络拥堵的情况下,请求快照标识的时间过长,会造成创建数据快照的时间长、效率差的问题。
技术解决方案
本申请实施例的第一方面提供了一种联盟链信息发布控制方法,包括:
根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
本申请实施例的第二方面提供了一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
本申请实施例的第三方面提供了一种联盟链信息发布控制装置,包括:
信息类型筛选单元,用于根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
智能合约建立单元,用于对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
请求解析单元,用于当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
发布信息识别单元,用于识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
身份标识判断单元,用于若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
发布信息发送单元,用于若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
本申请实施例的第四方面提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令被处理器执行时实现如第一方面所述的联盟链信息发布控制方法的步骤。
有益效果
本申请实施例首先根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,对筛选出的每个信息类型建立一个智能合约,智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表,当接收到目标节点设备发送的信息发布请求时,解析出信息发布请求中包含的目标节点设备所属的组织节点的目标身份标识以及待发布信息;然后识别待发布信息的类型,并确定待发布信息的类型的目标信息类型标识;若目标智能合约中的信息类型标识中包含目标信息类型标识,则判断目标智能合约的联盟链内各组织节点的身份标识列表是否包含目标身份标识;若目标智能合约的联盟链内各组织节点的身份标识列表包含目标身份标识,则将待发布信息发送至联盟链内的各记录节点设备进行存储,完成待发布信息在联盟链的发布,能够保证在联盟链内发布信息的节点设备属于联盟链内的可信任设备,减少不可信的信息的发布,提高联盟链内信息共享的信任度。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一实施例提供的联盟链信息发布控制方法的示意流程图;
图2是本申请另一实施例提供的联盟链信息发布控制方法的示意流程图;
图3是本申请再一实施例提供的联盟链信息发布控制方法的示意流程图;
图4是本申请又一实施例提供的联盟链信息发布控制方法的示意流程图;
图5是本申请一实施例提供的终端设备的结构示意图;
图6是本申请一实施例提供的联盟链信息发布控制装置的功能模块图。
本发明的实施方式
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、装置、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。
为了说明本申请所述的技术方案,下面通过具体实施例来进行说明。
请参阅图1,图1是本申请一实施例提供的一种联盟链信息发布控制方法的示意流程图,在该实施例中,以联盟链共识管理服务器一侧为执行主体进行说明,这里,联盟链共识管理服务器可以为一台,也可以通过多台服务器通信协作完成。如图1所示,在该实施例中,服务器的处理过程可以包括以下步骤:
S101:根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中联盟链内包含多个组织节点,每个组织节点中包含多个节点设备。
在本申请实施例中,节点设备可以是个人电脑、服务器或移动终端等设备。组织节点可以是一个公司或集团的局域网的节点设备。可以统计各类型的信息发布次数,将发布次数超出一定数量的信息类型,说明这种类型的信息发布较多,将这种类型的信息类型筛选出来。
S102:对筛选出的每个信息类型建立一个智能合约,智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表。
在本实施例中,智能合约指的是用于规范联盟链内的协议信息。信息类型标识用于唯一标识与智能合约对应的信息类型,可以是一组数组。联盟链内各组织节点的身份标识可以是各组织节点的IP(Internet Protocol,网络互连协议)地址、各组织节点的名称或各组织节点的代码等。
S103:当接收到目标节点设备发送的信息发布请求时,解析出信息发布请求中包含的目标节点设备所属的组织节点的目标身份标识以及待发布信息。
在本实施例中,目标节点设备为目标组织节点中的任一节点设备,目标组织节点为内联盟链内各组织节点中的任一组织节点。目标节点设备发送信息发布请求时,会添加上目标组织节点的的目标身份标识(IP地址、各组织节点的名称或各组织节点的代码等)。可以将待发布信息添加到信息发布请求的数据报文中。
S104:识别待发布信息的类型,并确定待发布信息的类型的目标信息类型标识。
具体地,可以根据预存的多类特征关键字(其中每类特征关键字对应一个信息类型),从待发布信息中提取每类特征关键字,若待发布信息任一类特征关键字的数量大于或等于预设的次数阈值,则将该待发布信息的类型确定为该类特征关键字对应的信息类型。其中每一类特征关键字包括多个特征关键字。例如某条待发布信息中包含5个“人寿”、6个“保险”,预设的次数阈值为10次,则将该待发布信息确定为“人寿保险”类型。
S105:若目标智能合约中的信息类型标识中包含目标信息类型标识,则判断目标智能合约的联盟链内各组织节点的身份标识列表是否包含目标身份标识,其中目标智能合约为所有智能合约中的任一个。
在本实施例中,可以按照随机顺序遍历每个智能合约,若在遍历的智能合约的信息类型标识中存在目标信息类型标识,则将遍历的智能合约确定为目标智能合约。
106:若目标智能合约的联盟链内各组织节点的身份标识列表包含目标身份标识,则将待发布信息发送至联盟链内的各记录节点设备进行存储,完成待发布信息在联盟链的发布。
在本实施例中,各记录节点设备用于接收并记录待发布信息,由于对待发布信息采用各记录节点设备进行存储,分布式记录,保证待发布信息不会被随意修改,保证数据的真实性。
从上述描述可知,本实施例首先根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,对筛选出的每个信息类型建立一个智能合约,智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表,当接收到目标节点设备发送的信息发布请求时,解析出信息发布请求中包含的目标节点设备所属的组织节点的目标身份标识以及待发布信息;然后识别待发布信息的类型,并确定待发布信息的类型的目标信息类型标识;若目标智能合约中的信息类型标识中包含目标信息类型标识,则判断目标智能合约的联盟链内各组织节点的身份标识列表是否包含目标身份标识;若目标智能合约的联盟链内各组织节点的身份标识列表包含目标身份标识,则将待发布信息发送至联盟链内的各记录节点设备进行存储,完成待发布信息在联盟链的发布,能够保证在联盟链内发布信息的节点设备属于联盟链内的可信任设备,减少不可信的信息的发布,提高联盟链内信息共享的信任度。
请参阅图2,图2为本申请另一实施例提供的联盟链信息发布控制方法的示意流程图,在上述实施例的基础上,步骤S101具体包括以下步骤:
S201:获取预设时间段内联盟链内各组织节点发布的信息,根据每条信息中特征关键字出现的次数确定每条信息的信息类型。
在本实施例中,获取预设时间段内联盟链内各组织节点发布的信息指的是预设时间段内所有的组织节点发布的所有信息。针对每一条信息,根据预存的多类特征关键字,从该信息中提取每类特征关键字,若该信息任一类特征关键字的数量大于或等于预设的次数阈值,则将该信息的类型确定为该类特征关键字对应的信息类型。
S202:若任一信息类型对应的发布次数超出预设阈值,则将该信息类型确定为筛选出的信息类型。
在本实施例中,发布次数超过预设阈值的信息类型,为所有的发布信息类型中发布次数较多的信息类型。
从上述描述可知,通过筛选发布次数超过预设阈值的信息类型,能够实现为发布次数较多的信息类型建立智能合约。
请参阅图3,图3为本申请再一实施例提供的联盟链信息发布控制方法的示意流程图,所述智能合约还包括联盟链内各组织节点的身份标识与读写权限的对应关系,所述读写权限包括写入权限和/或读取权限;在步骤S106之前,还包括:
S301:根据对应关系获取目标节点设备的目标读写权限。
在本实施例中,读写权限包括写入权限和/或读取权限,其中写入权限指的是对应的身份标识的组织节点具有在联盟链发布信息的权限,该信息可以被联盟链内的各记录节点设备记录,使得记录后的发布信息,不能随意修改;其中读取权限指的是对应的身份标识的组织节点具有在联盟链读取其它节点设备发布的信息的权限。
S302:若目标读写权限包括写入权限和读取权限,则将待发布信息发送至联盟链内的各记录节点设备进行存储,完成待发布信息在联盟链的发布。
在本实施例中,目标读写权限包括写入权限和读取权限,则说明对应的目标节点设备既具有在联盟链发布信息的权限,还具有在联盟链读取其它节点设备发布的信息的权限。
S303:若目标读写权限仅包括读取权限,则将待发布信息发送至隔离存储服务器保存。
在本实施例中,在本实施例中,目标读写权限仅包括读取权限,则说明对应的目标节点设备仅具有在在联盟链读取其它节点设备发布的信息的权限。
从上述描述可知,通过获取所述目标节点设备的目标读写权限,可以对目标节点设备在联盟链内发布信息和读取信息的权限进行不同限制,满足多样性发布信息的需求。
在本申请的一个实施例中,所述若所述目标读写权限仅包括读取权限,则发送禁止发布信息的提示到所述目标节点设备。通过发送提示信息,提醒目标节点设备的用户没有发布信息的权限。
请参阅图4,图4为本申请又一实施例提供的联盟链信息发布控制方法的示意流程图,在上述实施例的基础上,步骤S106具体包括以下步骤:
S401:根据发布范围控制信息获取多个记录节点设备标识。
在本实施例中,记录节点设备标识可以是联盟链内通过选举产生的运行稳定的节点设备。记录节点设备标识为记录节点设备的MAC地址(Medium Access Control,物理地址)或代码。
S402:将待发布信息发送至所述多个记录节点设备标识对应的记录节点设备进行存储,完成待发布信息在联盟链的局部范围的发布。
在本实施例中,通过设备标识,将待发布信息发送至对应的记录节点设备进行存储,避免待发布信息会漏发或错发,发布的准确性。
对应于上文实施例的联盟链信息发布控制方法,图5示出了本申请一实施例提供的终端设备的结构示意图。为了便于说明,仅示出了与本实施例相关的部分。
在本实施例中,联盟链信息发布控制装置600安装并运行于终端设备60中。该终端设备60可以是移动终端、掌上电脑、服务器等。该终端设备60可包括,但不仅限于,存储器601、处理器602及显示器603。图5仅示出了具有组件601-603的终端设备60,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。
存储器601在一些实施例中可以是所述终端设备60的内部存储单元,例如该终端设备60的硬盘或内存。所述存储器601在另一些实施例中也可以是所述终端设备60的外部存储设备,例如所述终端设备60上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器601还可以既包括所述终端设备60的内部存储单元也包括外部存储设备。所述存储器601用于存储安装于所述终端设备60的应用软件及各类数据,例如所述联盟链信息发布控制装置600的程序代码等。所述存储器601还可以用于暂时地存储已经输出或者将要输出的数据。
所述处理器602在一些实施例中可以是一中央处理器(Central Processing Unit,CPU),微处理器或其他数据处理芯片,用于运行所述存储器601中存储的程序代码或处理数据,例如执行所述联盟链信息发布控制装置600等。
所述显示器603在一些实施例中可以是LED显示器、液晶显示器、触控式液晶显示器以及有机发光二极管(Organic Light-Emitting Diode,OLED)触摸器等。所述显示器603用于显示在所述终端设备60中处理的信息以及用于显示可视化的用户界面,例如应用菜单界面、应用图标界面等。所述终端设备60的部件601-603通过系统总线相互通信。
请参阅图6,是本申请一实施例提供的联盟链信息发布控制装置600的功能模块图。在本实施例中,所述的联盟链信息发布控制装置600可以被分割成一个或多个模块,所述一个或者多个模块被存储于所述存储器601中,并由一个或多个处理器(本实施例为所述处理器602)所执行,以完成本申请。例如,在图6中,所述的联盟链信息发布控制装置600可以被分割成信息类型筛选单元701、智能合约建立单元702、请求解析单元703、发布信息识别单元704、身份标识判断单元705和发布信息发送单元706。
本申请所称的单元是指能够完成特定功能的一系列计算机可读指令段,比程序更适合于描述所述联盟链信息发布控制装置600在所述终端设备60中的执行过程。以下描述将具体介绍所述单元701-706能。
信息类型筛选单元701,用于根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
智能合约建立单元702,用于对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
请求解析单元703,用于当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
发布信息识别单元704,用于识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
身份标识判断单元705,用于若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
发布信息发送单元706,用于若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
从上述描述可知,本实施例首先根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,对筛选出的每个信息类型建立一个智能合约,智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表,当接收到目标节点设备发送的信息发布请求时,解析出信息发布请求中包含的目标节点设备所属的组织节点的目标身份标识以及待发布信息;然后识别待发布信息的类型,并确定待发布信息的类型的目标信息类型标识;若目标智能合约中的信息类型标识中包含目标信息类型标识,则判断目标智能合约的联盟链内各组织节点的身份标识列表是否包含目标身份标识;若目标智能合约的联盟链内各组织节点的身份标识列表包含目标身份标识,则将待发布信息发送至联盟链内的各记录节点设备进行存储,完成待发布信息在联盟链的发布,能够保证在联盟链内发布信息的节点设备属于联盟链内的可信任设备,减少不可信的信息的发布,提高联盟链内信息共享的信任度。
在本申请的一个实施例中,所述信息类型筛选单元701,具体用于获取预设时间段内联盟链内各组织节点发布的信息,根据每条信息中特征关键字出现的次数确定每条信息的信息类型;若任一信息类型对应的发布次数超出预设阈值,则将该信息类型确定为筛选出的信息类型。
在本申请的一个实施例中,所述智能合约还包括联盟链内各组织节点的身份标识与读写权限的对应关系,所述读写权限包括写入权限和/或读取权限;还包括:
读写权限获取单元707,用于根据所述对应关系获取所述目标节点设备的目标读写权限;
所述发布信息发送单元706,还用于若所述目标读写权限包括写入权限和读取权限,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布;
发布信息隔离单元708,用于若所述目标读写权限仅包括读取权限,则将所述待发布信息发送至隔离存储服务器保存。
在本申请的一个实施例中,所述信息发布请求中还包括发布范围控制信息,所述发布范围控制信息包含多个记录节点设备标识;
所述发布信息发送单元706,具体用于根据所述发布范围控制信息获取多个记录节点设备标识;将所述待发布信息发送至所述多个记录节点设备标识对应的记录节点设备进行存储,完成待发布信息在所述联盟链的局部范围的发布。
在本申请的一个实施例中,所述发布信息隔离单元708,还用于所述若所述目标读写权限仅包括读取权限,则发送禁止发布信息的提示到所述目标节点设备。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的各功能单元、模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,各功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述系统中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
在本申请所提供的实施例中,应该理解到,所揭露的装置/终端设备和方法,可以通过其它的方式实现。例如,以上所描述的装置/终端设备实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通讯连接可以是通过一些接口,装置或单元的间接耦合或通讯连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实现上述实施例方法中的全部或部分流程,也可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一计算机可读存储介质中,该计算机可读指令在被处理器执行时,可实现上述各个方法实施例的步骤。其中,所述计算机可读指令包括计算机可读指令代码,所述计算机可读指令代码可以为源代码形式、对象代码形式、可执行文件或某些中间形式等。所述计算机可读介质可以包括:能够携带所述计算机可读指令代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、电载波信号、电信信号以及软件分发介质等。需要说明的是,所述计算机可读介质包含的内容可以根据司法管辖区内立法和专利实践的要求进行适当的增减,例如在某些司法管辖区,根据立法和专利实践,计算机可读介质不包括电载波信号和电信信号。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种联盟链信息发布控制方法,其特征在于,包括:
    根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
    对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
    当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
    识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
    若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
    若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
  2. 如权利要求1所述的联盟链信息发布控制方法,其特征在于,所述根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选多个信息类型,包括:
    获取预设时间段内联盟链内各组织节点发布的信息,根据每条信息中特征关键字出现的次数确定每条信息的信息类型;
    若任一信息类型对应的发布次数超出预设阈值,则将该信息类型确定为筛选出的信息类型。
  3. 如权利要求1所述的联盟链信息发布控制方法,其特征在于,所述智能合约还包括联盟链内各组织节点的身份标识与读写权限的对应关系,所述读写权限包括写入权限和/或读取权限;
    所述将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息的发布之前,还包括:
    根据所述对应关系获取所述目标节点设备的目标读写权限;
    若所述目标读写权限包括写入权限和读取权限,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布;
    若所述目标读写权限仅包括读取权限,则将所述待发布信息发送至隔离存储服务器保存。
  4. 如权利要求1所述的联盟链信息发布控制方法,其特征在于,所述信息发布请求中还包括发布范围控制信息,所述发布范围控制信息包含多个记录节点设备标识;
    所述将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布,包括:
    根据所述发布范围控制信息获取多个记录节点设备标识;
    将所述待发布信息发送至所述多个记录节点设备标识对应的记录节点设备进行存储,完成待发布信息在所述联盟链的局部范围的发布。
  5. 如权利要求3所述的联盟链信息发布控制方法,其特征在于,若所述目标读写权限仅包括读取权限,则发送禁止发布信息的提示到所述目标节点设备。
  6. 一种终端设备,其特征在于,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
    根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
    对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
    当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
    识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
    若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
    若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
  7. 如权利要求6所述的终端设备,其特征在于,所述根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选多个信息类型,包括:
    获取预设时间段内联盟链内各组织节点发布的信息,根据每条信息中特征关键字出现的次数确定每条信息的信息类型;
    若任一信息类型对应的发布次数超出预设阈值,则将该信息类型确定为筛选出的信息类型。
  8. 如权利要求6所述的终端设备,其特征在于,所述智能合约还包括联盟链内各组织节点的身份标识与读写权限的对应关系,所述读写权限包括写入权限和/或读取权限;
    所述将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息的发布之前,所述处理器执行所述计算机可读指令时还实现如下步骤:
    根据所述对应关系获取所述目标节点设备的目标读写权限;
    若所述目标读写权限包括写入权限和读取权限,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布;
    若所述目标读写权限仅包括读取权限,则将所述待发布信息发送至隔离存储服务器保存。
  9. 如权利要求6所述的终端设备,其特征在于,所述信息发布请求中还包括发布范围控制信息,所述发布范围控制信息包含多个记录节点设备标识;
    所述将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布,包括:
    根据所述发布范围控制信息获取多个记录节点设备标识;
    将所述待发布信息发送至所述多个记录节点设备标识对应的记录节点设备进行存储,完成待发布信息在所述联盟链的局部范围的发布。
  10. 如权利要求8所述的终端设备,其特征在于,若所述目标读写权限仅包括读取权限,则发送禁止发布信息的提示到所述目标节点设备。
  11. 一种联盟链信息发布控制装置,其特征在于,包括:
    信息类型筛选单元,用于根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
    智能合约建立单元,用于对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
    请求解析单元,用于当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
    发布信息识别单元,用于识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
    身份标识判断单元,用于若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
    发布信息发送单元,用于若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
  12. 如权利要求11所述的联盟链信息发布控制装置,其特征在于,所述信息类型筛选单元用于:
    获取预设时间段内联盟链内各组织节点发布的信息,根据每条信息中特征关键字出现的次数确定每条信息的信息类型;
    若任一信息类型对应的发布次数超出预设阈值,则将该信息类型确定为筛选出的信息类型。
  13. 如权利要求11所述的联盟链信息发布控制装置,其特征在于,所述智能合约还包括联盟链内各组织节点的身份标识与读写权限的对应关系,所述读写权限包括写入权限和/或读取权限;
    所述联盟链信息发布控制装置还包括:
    读写权限获取单元,用于根据所述对应关系获取所述目标节点设备的目标读写权限;
    所述发布信息发送单元,还用于若所述目标读写权限包括写入权限和读取权限,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布;
    发布信息隔离单元,用于若所述目标读写权限仅包括读取权限,则将所述待发布信息发送至隔离存储服务器保存。
  14. 如权利要求11所述的联盟链信息发布控制装置,其特征在于,所述信息发布请求中还包括发布范围控制信息,所述发布范围控制信息包含多个记录节点设备标识;
    所述发布信息发送单元用于:
    根据所述发布范围控制信息获取多个记录节点设备标识;
    将所述待发布信息发送至所述多个记录节点设备标识对应的记录节点设备进行存储,完成待发布信息在所述联盟链的局部范围的发布。
  15. 如权利要求11所述的联盟链信息发布控制装置,其特征在于,所述发布信息隔离单元还用于:若所述目标读写权限仅包括读取权限,则发送禁止发布信息的提示到所述目标节点设备。
  16. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如下步骤:
    根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选出多个信息类型,其中所述联盟链内包含多个组织节点,每个组织节点中包含多个节点设备;
    对筛选出的每个信息类型建立一个智能合约,所述智能合约包括信息类型标识、联盟链内各组织节点的身份标识列表;
    当接收到目标节点设备发送的信息发布请求时,解析出所述信息发布请求中包含的所述目标节点设备所属的组织节点的目标身份标识以及待发布信息;
    识别所述待发布信息的类型,并确定所述待发布信息的类型的目标信息类型标识;
    若目标智能合约中的信息类型标识中包含所述目标信息类型标识,则判断所述目标智能合约的联盟链内各组织节点的身份标识列表是否包含所述目标身份标识,其中所述目标智能合约为所有智能合约中的任一个;
    若所述目标智能合约的联盟链内各组织节点的身份标识列表包含所述目标身份标识,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布。
  17. 如权利要求16所述的计算机可读存储介质,其特征在于,所述根据预设时间段内联盟链内各组织节点发布各类型信息的次数,筛选多个信息类型,包括:
    获取预设时间段内联盟链内各组织节点发布的信息,根据每条信息中特征关键字出现的次数确定每条信息的信息类型;
    若任一信息类型对应的发布次数超出预设阈值,则将该信息类型确定为筛选出的信息类型。
  18. 如权利要求16所述的计算机可读存储介质,其特征在于,所述智能合约还包括联盟链内各组织节点的身份标识与读写权限的对应关系,所述读写权限包括写入权限和/或读取权限;
    所述将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息的发布之前,所述计算机可读指令被处理器执行时还实现如下步骤:
    根据所述对应关系获取所述目标节点设备的目标读写权限;
    若所述目标读写权限包括写入权限和读取权限,则将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布;
    若所述目标读写权限仅包括读取权限,则将所述待发布信息发送至隔离存储服务器保存。
  19. 如权利要求16所述的计算机可读存储介质,其特征在于,所述信息发布请求中还包括发布范围控制信息,所述发布范围控制信息包含多个记录节点设备标识;
    所述将所述待发布信息发送至所述联盟链内的各记录节点设备进行存储,完成待发布信息在所述联盟链的发布,包括:
    根据所述发布范围控制信息获取多个记录节点设备标识;
    将所述待发布信息发送至所述多个记录节点设备标识对应的记录节点设备进行存储,完成待发布信息在所述联盟链的局部范围的发布。
  20. 如权利要求18所述的计算机可读存储介质,其特征在于,若所述目标读写权限仅包括读取权限,则发送禁止发布信息的提示到所述目标节点设备。
PCT/CN2019/121861 2018-12-14 2019-11-29 联盟链信息发布控制方法及终端设备 WO2020119476A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811529440.0A CN109600441B (zh) 2018-12-14 2018-12-14 联盟链信息发布控制方法及终端设备
CN201811529440.0 2018-12-14

Publications (1)

Publication Number Publication Date
WO2020119476A1 true WO2020119476A1 (zh) 2020-06-18

Family

ID=65961863

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/121861 WO2020119476A1 (zh) 2018-12-14 2019-11-29 联盟链信息发布控制方法及终端设备

Country Status (2)

Country Link
CN (1) CN109600441B (zh)
WO (1) WO2020119476A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351420A (zh) * 2020-07-28 2021-02-09 深圳Tcl新技术有限公司 终端设备的组网身份创建方法、设备及可读存储介质
CN113159955A (zh) * 2021-05-13 2021-07-23 银清科技有限公司 联盟链区块链管理系统及管理方法
CN114760325A (zh) * 2020-12-25 2022-07-15 中移动信息技术有限公司 业务数据处理方法、设备、存储介质及共享平台

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109600441B (zh) * 2018-12-14 2022-04-29 深圳壹账通智能科技有限公司 联盟链信息发布控制方法及终端设备
CN110210961A (zh) * 2019-05-21 2019-09-06 平安普惠企业管理有限公司 基于联盟链的数据获取方法、服务器及计算机存储介质
CN110266648A (zh) * 2019-05-21 2019-09-20 平安普惠企业管理有限公司 基于联盟链的数据获取方法、服务器及计算机存储介质
CN113362074A (zh) * 2020-03-07 2021-09-07 陕西尚品信息科技有限公司 产品跟踪管理系统、方法、跟踪信息记录方法及跟踪方法
CN111625873B (zh) * 2020-05-27 2023-11-10 山东师范大学 一种基于混合区块链的可控信息公示方法及系统
CN114205233B (zh) * 2021-11-30 2022-07-12 北京大学 一种面向数据管控的智能合约自适应配置与执行的系统
CN114978529A (zh) * 2022-05-10 2022-08-30 平安国际智慧城市科技股份有限公司 基于区块链的身份核验方法及相关设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100981A (zh) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 社交网络数据交互方法及装置
US20170310653A1 (en) * 2016-04-22 2017-10-26 Sony Corporation Client, server, method and identity verification system
CN107517256A (zh) * 2017-08-24 2017-12-26 李昊星 信息发布方法以及装置
CN108989357A (zh) * 2018-09-12 2018-12-11 中国人民解放军国防科技大学 一种基于区块链的用户授权与数据共享访问控制方法
CN108984768A (zh) * 2018-07-21 2018-12-11 江苏飞搏软件股份有限公司 分布链式数据资源目录和索引管理方法
CN109600441A (zh) * 2018-12-14 2019-04-09 深圳壹账通智能科技有限公司 联盟链信息发布控制方法及终端设备

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10497037B2 (en) * 2014-03-31 2019-12-03 Monticello Enterprises LLC System and method for managing cryptocurrency payments via the payment request API
CN105719172A (zh) * 2016-01-19 2016-06-29 布比(北京)网络技术有限公司 一种信息发布方法及装置
CN107733855B (zh) * 2017-08-31 2019-11-05 中国科学院信息工程研究所 一种可同时支持公有链、联盟链及私有链的区块链系统及应用方法
CN107862548A (zh) * 2017-11-03 2018-03-30 国云科技股份有限公司 一种基于区块链的大范围数据分享方法
CN108460290A (zh) * 2017-12-27 2018-08-28 江苏省卫生统计信息中心 一种电子健康档案管理系统及方法
CN108510315B (zh) * 2018-03-16 2019-12-06 深圳慧通商务有限公司 一种资源发布方法及相关设备
CN108650519B (zh) * 2018-05-17 2020-07-07 立旃(上海)科技有限公司 基于区块链的发布信息的方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170310653A1 (en) * 2016-04-22 2017-10-26 Sony Corporation Client, server, method and identity verification system
CN106100981A (zh) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 社交网络数据交互方法及装置
CN107517256A (zh) * 2017-08-24 2017-12-26 李昊星 信息发布方法以及装置
CN108984768A (zh) * 2018-07-21 2018-12-11 江苏飞搏软件股份有限公司 分布链式数据资源目录和索引管理方法
CN108989357A (zh) * 2018-09-12 2018-12-11 中国人民解放军国防科技大学 一种基于区块链的用户授权与数据共享访问控制方法
CN109600441A (zh) * 2018-12-14 2019-04-09 深圳壹账通智能科技有限公司 联盟链信息发布控制方法及终端设备

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351420A (zh) * 2020-07-28 2021-02-09 深圳Tcl新技术有限公司 终端设备的组网身份创建方法、设备及可读存储介质
CN112351420B (zh) * 2020-07-28 2023-07-25 深圳Tcl新技术有限公司 终端设备的组网身份创建方法、设备及可读存储介质
CN114760325A (zh) * 2020-12-25 2022-07-15 中移动信息技术有限公司 业务数据处理方法、设备、存储介质及共享平台
CN113159955A (zh) * 2021-05-13 2021-07-23 银清科技有限公司 联盟链区块链管理系统及管理方法
CN113159955B (zh) * 2021-05-13 2024-04-09 银清科技有限公司 联盟链区块链管理系统及管理方法

Also Published As

Publication number Publication date
CN109600441A (zh) 2019-04-09
CN109600441B (zh) 2022-04-29

Similar Documents

Publication Publication Date Title
WO2020119476A1 (zh) 联盟链信息发布控制方法及终端设备
WO2020119536A1 (zh) 联盟链信息发布控制方法及终端设备
WO2020062793A1 (zh) 基于消息队列的请求处理方法、装置、设备及存储介质
US10110671B2 (en) Method, system, and device for managing server hardware resources in a cloud scheduling environment
US8813225B1 (en) Provider-arbitrated mandatory access control policies in cloud computing environments
CN110661658B (zh) 一种区块链网络的节点管理方法、装置及计算机存储介质
CN108134764B (zh) 一种分布式数据共享交换方法及系统
JP2022529967A (ja) ブロックチェーン・ネットワークからのデータの抽出
CN110855777B (zh) 一种基于区块链的节点管理方法及装置
CN111460458B (zh) 一种数据处理方法、相关装置及计算机可存储介质
CN111741017B (zh) 内外网之间的数据传输方法及相关设备
WO2021042849A1 (zh) 一种云平台、业务处理方法、命令接口及计算机设备
CN107465687B (zh) 一种权限配置的实现方法、装置及终端
WO2020156135A1 (zh) 一种访问控制策略的处理方法、装置及计算机可读存储介质
CN110597918A (zh) 一种账户管理方法、装置及计算机可读存储介质
WO2020224100A1 (zh) 区块链配置文件的处理装置、系统、方法及存储介质
WO2019174190A1 (zh) 数据回导方法、装置、计算机设备及存储介质
WO2023040453A1 (zh) 一种交易信息处理方法及装置
CN111538757A (zh) 数据存储方法、查询方法、装置、服务器及介质
CN114244568B (zh) 基于终端访问行为的安全接入控制方法、装置和设备
WO2021179944A1 (zh) 设备分享方法及服务器
WO2023185043A1 (zh) 一种可调用资源的分配方法和装置
WO2022133827A1 (zh) 一种任务处理请求的处理方法、装置以及区块链节点设备
CN113839949B (zh) 一种访问权限管控系统、方法、芯片及电子设备
CN112380411B (zh) 敏感词处理方法、装置、电子设备、系统及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19897434

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 29/09/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19897434

Country of ref document: EP

Kind code of ref document: A1