WO2020187069A1 - 数据同步方法、装置、计算机设备以及可读存储介质 - Google Patents
数据同步方法、装置、计算机设备以及可读存储介质 Download PDFInfo
- Publication number
- WO2020187069A1 WO2020187069A1 PCT/CN2020/078348 CN2020078348W WO2020187069A1 WO 2020187069 A1 WO2020187069 A1 WO 2020187069A1 CN 2020078348 W CN2020078348 W CN 2020078348W WO 2020187069 A1 WO2020187069 A1 WO 2020187069A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- transaction data
- sensitive
- sensitive phrase
- identifier
- update operation
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1865—Transactional file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
- G06F16/24564—Applying rules; Deductive queries
- G06F16/24565—Triggers; Constraints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/248—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Definitions
- This application relates to the field of blockchain technology, and in particular to a data synchronization method, device, computer equipment and readable storage medium.
- a data synchronization method, device, computer equipment, and readable storage medium are provided.
- a data synchronization method executed by a computer device, the method including:
- the sensitive phrase database is updated.
- a data synchronization device which includes:
- the receiving module is configured to receive any transaction data, and the any transaction data carries an update operation identifier and a sensitive phrase corresponding to the update operation identifier;
- the obtaining module is used to obtain the update operation identifier and the sensitive phrase in the target block when the target block containing any transaction data is stored in the block chain of the blockchain system;
- the update module is used to update the sensitive phrase database according to the update operation identifier in the target block and the sensitive phrase.
- a non-volatile storage medium storing computer-readable instructions.
- the computer-readable instructions are executed by one or more processors, the one or more processors execute the steps of the data synchronization method.
- a computer device includes a memory and a processor.
- the memory stores computer readable instructions.
- the processor executes the steps of a data synchronization method.
- Figure 1 is a schematic diagram of a blockchain system provided by an embodiment of the present application.
- FIG. 2 is a flowchart of a data synchronization method provided by an embodiment of the present application
- Fig. 3 is a flowchart of a data query method based on data synchronization provided by an embodiment of the present application
- FIG. 4 is a schematic structural diagram of a data synchronization device provided by an embodiment of the present application.
- Fig. 5 is a schematic structural diagram of a node device provided by an embodiment of the present application.
- Fig. 1 is a schematic diagram of a blockchain system provided by an embodiment of the present application.
- the blockchain system consists of at least two node devices. Wherein, the at least two node devices may belong to different users. Any node device can generate or receive transaction data, package at least one transaction data, generate a block, and store the block passed by the consensus. Among them, the transaction data can be any type of data, and the transaction data can contain any content. Any data received or generated by any node device in the blockchain system can be called transaction data.
- each node device in the blockchain system in the blockchain system can be different, and can be divided into supervisory node devices and ordinary node devices.
- the supervisory node device can act as a supervisor to publish transaction data carrying sensitive phrases in the blockchain system, so that other node devices can update the local sensitive phrase database according to the sensitive phrases released by the supervisory node device.
- Any node device can provide users with query services, so that users can query transaction data in each block of the blockchain in the blockchain system on any node device.
- any node device shows the user to query For transaction data in a block
- the sensitive phrases in the transaction data in the block to be queried can be filtered out according to the sensitive phrases in the local sensitive phrase database, and finally, the filtered transaction data is displayed to the user.
- the supervisory node device generates any transaction data that carries an update operation identifier and a sensitive phrase corresponding to the update operation identifier.
- the supervisory node device can be any node device with supervisory authority in the blockchain system.
- the update operation identifier may be used to indicate the update operation that the node device needs to perform, and the update operation identifier may be an addition identifier or a deletion identifier.
- the addition mark is used to indicate to add a sensitive phrase in the sensitive phrase database
- the deletion mark is used to indicate to delete the sensitive phrase in the sensitive phrase database.
- the update operation identifier can be any character string, or can be expressed in other forms, and different character strings used to represent the update operation identifier can be used to represent different update operations.
- Add means add operation
- Delete means delete operation.
- Any node device in the blockchain system is equipped with a sensitive phrase database.
- the sensitive phrase database is used to store sensitive phrases.
- the sensitive phrase can be any phrase. The content of the sensitive phrase is not described in the embodiment of this application. limited.
- the supervisory node device executes this step 201, wherein the any transaction data generation request is used to request the generation of any transaction data carrying sensitive phrases.
- the supervisory node device receives any transaction data generation request, and the any transaction data generation request includes an update operation identifier and a sensitive phrase corresponding to the update operation identifier; the supervisory node device is based on any transaction data generation request; The update operation identifier in the transaction data generation request and the sensitive phrase corresponding to the update operation identifier are generated to generate any transaction data that meets the format requirements of the transaction data in the blockchain system.
- the supervising node device receiving any transaction data generation request can be triggered by the user's storage operation. For example, when the user selects the update option in the user interface of the supervisory node device, enters a sensitive phrase in the position of the phrase corresponding to the update option, and then clicks the storage option to trigger any transaction data generation request.
- the any transaction data may also include a supervision identifier to indicate that the any transaction data is generated by the supervision node device.
- the supervisory identification includes the signature of the supervisory node device or the address of the supervisory node device.
- the signature of the supervisory node device can be the signature of any transaction data by the supervisory node device using the private key.
- the address of the supervisory node device can be the IP (internet protocol) address of the supervisory node device, or it can represent the supervision For other addresses of the node device identity, this embodiment of the application does not specifically limit the supervision identity.
- the supervisory node device adds its own address to the initiation address field of any transaction data; the supervisory node device adds the update operation identifier and the sensitive phrase corresponding to the update operation identifier in the In the remark information field of any transaction data.
- the supervisory node device adds the update operation identifier and the sensitive phrase corresponding to the update operation identifier in the remark information field of any transaction data, and uses the private key of the supervisory node device to Any transaction data added with remarks is signed.
- the update operation identifier and the sensitive phrase corresponding to the update operation identifier can be in the remark information So that the update operation identifier corresponds to the sensitive phrase.
- Add as the addition identifier
- Delete as the deletion identifier
- Sensitive phrase 1 Sensitive phrase 2 ... Sensitive phrase n Add xxx yyy ... zzz Delete mmm nnn To ttt
- the implementation of this application does not specifically limit the form of the remark information and the number of sensitive phrases in the remark information.
- the supervisory node device may also add an update operation identifier and a sensitive phrase corresponding to the update operation identifier in other fields in any transaction data.
- the embodiment of the present application is sensitive to the update operation identifier and the sensitive phrase corresponding to the update operation identifier.
- the position of the phrase in any transaction data is not limited.
- the supervisory node device can also encrypt the sensitive phrase corresponding to the update operation identifier.
- the supervisory node device uses a preset encryption algorithm to detect sensitive phrases corresponding to the update operation identifier.
- the phrase is encrypted to obtain the encrypted sensitive phrase.
- the supervisory node device generates any transaction data based on the encrypted sensitive phrase and the update operation identifier. This embodiment of the application does not specifically limit the preset encryption algorithm.
- the supervisory node device broadcasts any transaction data on the blockchain system.
- This step 202 can enable other node devices except the supervisory node device to receive any transaction data.
- the node device receives any transaction data.
- the node device verifies any transaction data.
- the node device is a node device other than the supervisory node device in the blockchain system.
- the node device can verify any transaction data by verifying the update operation identifier carried by any transaction data. When the verification of the update operation identifier carried in the data passes, the verification of any transaction data is passed, otherwise the verification fails.
- blockchain node devices may not verify any transaction data, and have not packaged any transaction data into the block.
- the node device can verify any transaction data by verifying the regulatory identifier carried by any transaction data.
- the regulatory identifier carried by any transaction data passes the verification At the time, the verification of any transaction data is passed, otherwise the verification fails.
- the node device can verify the regulatory identification in the target transaction data by any of the following methods 1-2.
- the node device verifies the regulatory identifier carried by any transaction data through the regulatory information of the regulatory node device stored in the genesis block in the blockchain configured on the node device.
- the supervision information includes the public keys of all supervision node devices or the addresses of all supervision node devices in the blockchain system, and is used to indicate the identity of the node device with supervision authority.
- the supervision information of the supervision node device can be stored in the genesis block, so that any node device in the blockchain system can know which node device has supervision authority.
- the regulatory identifier carried by any transaction data is the signature of the regulatory node device, and the public key of the regulatory node device is stored in the genesis block of the blockchain configured by the node device At the time, the regulatory identification passed the verification, otherwise the verification failed.
- the supervision identifier carried by any transaction data is the address of the supervision node
- the creation block of the blockchain configured by the node device stores the address of the supervision node device
- Manner 2 The node device verifies the supervision identifier in any transaction data by executing the first contract.
- the first contract is a smart contract used to verify the regulatory identification in the blockchain system.
- the node device receives any transaction data carrying the regulatory identification, it can trigger the node device to execute the first contract to perform the first contract.
- a supervisory identification carried by transaction data is verified.
- the supervisory identification passes the verification, otherwise The verification failed.
- the supervisory identifier in any transaction data is the address of the supervisory node, and the address of the supervisory node device is stored in the first contract, the supervisory identifier passes the verification, otherwise the verification fails. by.
- the node device in the blockchain system verifies any transaction data through the supervisory identifier, so that the transaction data carrying the update operation identifier and the sensitive phrase corresponding to the update operation identifier on the blockchain are all generated by the supervisory node device, thereby ensuring The reliability of the transaction data carrying the update operation identifier and the sensitive phrase corresponding to the update operation identifier in the blockchain system.
- the node device stores the target block containing the any transaction data on the blockchain of the blockchain system.
- step 205 there may be step 205. It can be understood that only the node device that has executed step 204 will execute step 205. When most node devices in the blockchain system verify any transaction data, it can be considered that any transaction data is passed by consensus in the blockchain system. In a possible implementation manner, this step 205 can be implemented through the process shown in the following steps 205A-205B.
- Step 205A When multiple node devices in the blockchain system pass the verification of any transaction data, the node device packs the any transaction data into the target block.
- the target when the node device in the blockchain system packages the transaction data carrying the update operation identifier and the sensitive phrase corresponding to the update operation identifier into the target block, the target can be added to the target block. Identification, so that the node device in the blockchain system can obtain the target block on the blockchain based on the target identification.
- the embodiment of the application does not specifically limit the target identifier.
- Step 205B After multiple node devices in the blockchain system agree on the target block, the node device stores the target block on the blockchain configured by the node device.
- the multiple node devices When multiple node devices in the blockchain system have all verified the target block, the multiple node devices reach a consensus on the target block. Any node device in the blockchain system can verify the block through the attributes of the target block.
- the attributes of the target block include the block number, the root hash value, and the number of transaction data in the block Wait.
- the node device passes the verification of the target block, otherwise the verification fails. For example, the block number of the target block is greater than that of the node. If the block number of the last block on the block chain configured by the device is greater than 1, the node device passes the verification of the target block.
- the node device obtains the update operation identifier in the target block and the sensitive phrase corresponding to the update operation identifier.
- this step 206 can obtain the update operation identifier carrying the update operation identifier and the sensitive phrase corresponding to the update operation identifier in the target block.
- this step 206 may be implemented in any of the following manners 3-4.
- Method 3 The node device obtains at least one piece of transaction data in the target block; when any piece of transaction data in the target block carries an update operation identifier, the node device obtains the data content of any piece of transaction data. Update the operation identifier and the sensitive phrase.
- the node device can detect the content of the remark information field of all transaction data in the target block, and when it is detected in the remark information field of any transaction data in the target block When the operation identifier is updated, the node device acquires the data content in the remark information field of any piece of transaction data as the update operation identifier and the sensitive phrase.
- the node device obtains at least one piece of transaction data of the target block; when any piece of transaction data in the target block carries a supervision identifier, the node device obtains the update from the data content of any piece of transaction data Operation identification and the sensitive phrase.
- the node device can query the initiator address of all transaction data in the target block. When any transaction data is queried in the address of the supervisory node device stored in the genesis block When the initiation address in, the node device obtains the update operation identifier and the sensitive phrase from the data content of any piece of transaction data.
- the node device can query the signatures in all transaction data in the target block.
- the public key of the supervisory node device stored in the genesis block is queried with any transaction
- the node device obtains the update operation identifier and the sensitive phrase from the data content of any piece of transaction data.
- the node device needs to obtain the target block on the blockchain configured by the node device before obtaining the update operation identifier and the sensitive phrase corresponding to the update operation identifier in the target block.
- the node device can obtain the target block on the blockchain through the following methods 5 and 6.
- Method 5 Whenever a block is stored on the blockchain configured by the node device, the transaction data in the block is detected, when any transaction data in the block carries the update operation identification or the supervision identification , The node device obtains the block as the target block.
- the node device may also not perform real-time detection of the blocks on the blockchain.
- the node device detects the blockchain configured by the node device within the preset time period every time the node device has passed a preset period of time. At least one piece of transaction data in at least one block is newly stored, and when any transaction data in any block carries an update operation identifier or a supervision identifier, the block is acquired as the target block. For example, every hour that a node device has passed, at least one piece of transaction data in at least one block newly stored on the blockchain configured by the node device within the hour is detected. When any transaction data in any block carries an update When operating the identification or supervision identification, the block is acquired as the target block.
- Method 6 When the node device detects that any block on the blockchain carries a target identifier, the block is acquired as a target block.
- the target identifier is used to indicate that the block carries an update operation identifier and is related to the update.
- the sensitive phrase corresponding to the operation identifier is used to indicate that the block carries an update operation identifier and is related to the update.
- the node device updates the sensitive phrase database according to the update operation identifier in the target block and the sensitive phrase.
- the node device Since the update operation identifier in any transaction data may be an addition identifier or a deletion identifier, for different update operation identifiers, the node device updates the sensitive phrase to the sensitive phrase database in different ways.
- the node device when the update operation identifier in any transaction data is an increase identifier, the node device adds a sensitive phrase corresponding to the increase identifier in the sensitive phrase database. Still taking Table 1 in step 201 as an example, the sensitive phrase 1-n in the first row of Table 1 all correspond to the addition identifier Add, and the node device adds the sensitive phrase 1-n in the first row of Table 1 to the Sensitive phrase database.
- the node device Before the node device updates the sensitive phrase database, there may be a sensitive phrase corresponding to the added identifier in the sensitive phrase database, or there may be no sensitive phrase corresponding to the added identifier, when there is no sensitive phrase corresponding to the added identifier in the sensitive phrase database , The node device adds the sensitive phrase corresponding to the added identifier in the sensitive phrase database.
- the node device queries the sensitive phrase database according to the sensitive phrase corresponding to the added identifier, and when the sensitive phrase database does not contain the When adding a sensitive phrase corresponding to an identifier, the node device adds a sensitive phrase corresponding to the increased identifier in the sensitive phrase database. When the sensitive phrase database contains the sensitive phrase corresponding to the increased identifier, the node device may not execute Increase operation.
- the node device when the update operation identifier in any transaction data is a deletion identifier, the node device deletes the sensitive phrase corresponding to the deletion identifier from the sensitive phrase database. Still taking Table 1 in step 201 as an example, the sensitive phrases 1-n in the second row of Table 1 all correspond to the delete identifier Delete, and the node device deletes the sensitive phrases in the second row of Table 1 from the sensitive phrase database 1-n.
- the node device can also set a weight for the sensitive phrase in the sensitive phrase database to indicate the sensitivity of the sensitive phrase.
- the weight of the sensitive phrase is greater, the sensitivity of the sensitive phrase is higher. The smaller the weight, the lower the sensitivity of the sensitive phrase.
- the node device adds the weight of the sensitive phrase corresponding to the increased identifier in the sensitive phrase database.
- the weight of the sensitive phrase can be determined according to the number of times that the sensitive phrase is added. In a possible implementation, for any sensitive phrase, every time the node device obtains an increase identifier corresponding to the sensitive phrase, the node The device increases the weight of the sensitive phrase by a preset value.
- the node device can decrypt the encrypted sensitive phrase according to a preset decryption algorithm to obtain the decrypted sensitive phrase After that, the node device updates the decrypted sensitive phrase into the sensitive phrase database.
- the preset decryption algorithm corresponds to the preset encryption algorithm for encrypting the sensitive phrase.
- the block Any node device in the chain system can obtain the sensitive phrase in the target block from the blockchain of the blockchain system, and update its own sensitive phrase database according to the update operation identifier corresponding to the sensitive phrase, so that The sensitive phrase database can be updated synchronously on any node device.
- the node device in the blockchain system verifies any transaction data through the supervision identification, so that the transaction data carrying the update operation identification and the sensitive phrase corresponding to the update operation identification on the blockchain are all generated by the supervision node device.
- weights are set for sensitive phrases in the sensitive phrase database.
- the sensitivity of sensitive phrases is expressed by the weight of sensitive words, and the sensitivity of sensitive phrases can be visually expressed through quantified data, so that subsequent data query based on the sensitive phrase database can be performed.
- the node device when the node device stores a target block each time, it can obtain the update operation identifier and the sensitive phrase corresponding to the update operation identifier from the target block, so that each node device can perform its own sensitive phrase database. Real-time update can avoid the situation that the node device cannot accurately filter the block content of the block to be queried because the sensitive phrase database is not updated in time.
- the sensitive phrase in any transaction data is an encrypted sensitive phrase, for ordinary users who do not know the decryption algorithm, it is impossible to decrypt the encrypted sensitive phrase in any transaction data. Avoid mass dissemination of sensitive phrases in any transaction data.
- the node device in Figure 2 stores a sensitive phrase database locally, so that the node device can filter the block content of the block to be queried according to the sensitive phrase database.
- Fig. 3 is a flowchart of a data query method based on data synchronization provided by an embodiment of the present application, and the method specifically includes:
- the node device receives a query request, and the block query request carries the block number of the block to be queried.
- the node device is any node device in the blockchain system.
- the block number can be the number of the block on the blockchain configured by the blockchain system, and the number can also be the height of the block, for example, the block Block 001, block 002, etc.
- the node device determines the block corresponding to the block number on the block chain of the blockchain system.
- the node device can determine the block corresponding to the block number carried in the query request by querying the block number of each block on the blockchain configured by the node device.
- the block where the queried block number is located is obtained as the first target block. , That is, the block that the node device needs to determine.
- the node device analyzes the determined block, and obtains at least one piece of transaction data in the block.
- the node device compares at least one piece of transaction data in the block corresponding to the block number with the sensitive phrase in the sensitive phrase database.
- the node device can be compared based on the weights of sensitive phrases.
- the node device can compare the weights of multiple sensitive phrases in the sensitive phrase database from high to low. At least one piece of transaction data is compared with the plurality of sensitive phrases one by one, and the weight is determined according to the number of times that the sensitive phrase is added.
- the node device Before the comparison, the node device obtains the weight of each sensitive phrase in the sensitive phrase database. After that, the weight of each sensitive phrase is sorted in the order from high to bottom. Finally, the node device will sort the sensitive words according to the sorting. The group is compared with at least one transaction data in the block.
- the node device sorts the sensitive phrases in the sensitive lexicon. As: sensitive phrase C, sensitive phrase B, and sensitive phrase A, then, first, the node device compares at least one transaction data in the block with sensitive phrase C, and secondly, at least one transaction data in the block Compare with sensitive phrase B, and finally, compare at least one piece of transaction data in the block with sensitive phrase A.
- the node device filters out the sensitive phrases in the sensitive phrase database from the first transaction data to obtain query feedback information, and the query feedback information includes filtered At least one piece of transaction data, and the first transaction data is transaction data including any sensitive phrase in the sensitive phrase database.
- the node device can filter sensitive words in the transaction data by deleting sensitive phrases or replacing sensitive phrases. Then, this step 304 can be implemented in any of the following modes 7 and 8.
- the node device deletes the sensitive phrase in the sensitive phrase database from the first transaction data to obtain query feedback information, and the query feedback information includes deleted At least one transaction data.
- the first transaction data carries the sensitive phrase A in the sensitive phrase database
- the node device deletes the sensitive phrase A from the first transaction data
- the first transaction data in the obtained query feedback information is the deleted first transaction data 1.
- the node device replaces the sensitive phrase in the first transaction data with the target warning phrase to obtain query feedback information, and the query feedback information includes deleted At least one transaction data.
- the target warning phrase can be represented by any character string, such as "******" or "the information here is sensitive information", which is used to indicate a sensitive phrase.
- the content of the target warning phrase is not affected by the embodiment of this application. Make specific restrictions.
- the first transaction data carries the sensitive phrase A in the sensitive phrase database, and the node device replaces the sensitive phrase A in the first transaction data with the sensitive phrase "******", and finally, the obtained query
- the first transaction data in the feedback information is the first transaction data after replacement.
- the node device can also display the query feedback information on the display interface of the node device for the user to refer to.
- the embodiment of the present application does not limit the specific form of displaying the query feedback information.
- the above process is a process in which the node device filters the sensitive phrases in the query block based on the local sensitive phrase database.
- the node device can also execute the blockchain system The smart contract in, to filter the sensitive phrases in the query block.
- the embodiment of the present application does not specifically limit the smart contract for filtering the sensitive phrases in the query block, and the smart contract can be maintained by a user with supervisory authority, without the need for other node devices to maintain.
- the method provided by the embodiment of the present application compares the transaction data in the block to be queried with the sensitive phrase in the sensitive phrase database, and filters the transaction data carrying the sensitive phrase in the query block, so that the node device is The user displays the filtered transaction data. Since each node device in the blockchain system stores a sensitive phrase database, any node device in the blockchain system can treat the query area based on its own sensitive phrase database Sensitive phrases in the block are filtered, so as to prevent the sensitive phrases in the blockchain from being widely spread.
- the node devices in the blockchain system filter the sensitive phrases in the query block through the smart contract, only users with supervisory authority need to maintain the smart contract without the need for other node devices to maintain, which can reduce other The service burden of the node device, and when the node device filters the data to be queried, it only needs to filter according to the local sensitive phrase database, without spending a lot of time, thereby improving the filtering efficiency of the node device.
- FIG. 4 is a schematic structural diagram of a data synchronization device provided by an embodiment of the present application. Referring to FIG. 4, it includes a receiving module 401, an acquiring module 402, and an updating module 403. Each module included in the data synchronization device can be implemented in whole or in part by software, hardware or a combination thereof.
- the receiving module 401 is connected to the storage module 402 to receive any transaction data, and the any transaction data carries an update operation identifier and a sensitive phrase corresponding to the update operation identifier.
- the obtaining module 402 is connected to the update module 403, and is used to obtain the update operation identifier and the sensitive phrase in the target block when the target block containing any transaction data is stored in the blockchain of the blockchain system .
- the update module 403 is configured to update the sensitive phrase database according to the update operation identifier in the target block and the sensitive phrase.
- the update module 403 includes:
- the adding unit is used to add a sensitive phrase corresponding to the added identifier in the sensitive phrase database when the update operation identifier in any transaction data is an adding identifier; or,
- the deletion unit is used for deleting the sensitive phrase corresponding to the deletion identification from the sensitive phrase database when the update operation identification in any transaction data is the deletion identification.
- the adding unit is configured to query the sensitive phrase database according to the sensitive phrase corresponding to the added tag when the update operation identifier in any transaction data is an increase tag, and when the sensitive phrase database does not contain the increase tag When the corresponding sensitive phrase is identified, the sensitive phrase corresponding to the increased identification is added to the sensitive phrase database.
- the acquisition module 402 is configured to acquire the data content of any transaction data as the update operation identifier and the sensitive phrase when any piece of transaction data in the target block carries a supervision identifier.
- the supervision identification includes the signature of the supervision node device or the address of the supervision node device.
- the device further includes:
- the determining module is used to determine the block corresponding to the block number on the block chain of the block chain system according to the block number carried in the query request.
- the comparison module is used to compare at least one piece of transaction data in the block corresponding to the block number with the sensitive phrase in the sensitive phrase database.
- the filtering module is used to filter the sensitive phrases in the sensitive phrase database from the first transaction data when the at least one piece of transaction data includes the first transaction data to obtain query feedback information.
- the query feedback information includes filtered At least one piece of transaction data, and the first transaction data is transaction data including any sensitive phrase in the sensitive phrase database.
- the comparison module is configured to compare at least one piece of transaction data in the block with the multiple sensitive phrases in the order of the weights of the multiple sensitive phrases in the sensitive phrase database from high to low. , The weight is determined based on the number of times that the sensitive phrase has been added.
- the filtering module is used for any of the following:
- the at least one piece of transaction data includes the first transaction data
- the at least one piece of transaction data includes the first transaction data
- replace the sensitive phrase in the first transaction data with the target warning phrase to obtain query feedback information
- the query feedback information includes the replaced at least one piece of transaction data
- the Any node device in the blockchain system can obtain the sensitive phrase in the target block from the blockchain of the blockchain system, and update its own sensitive phrase database according to the update operation identifier corresponding to the sensitive phrase. So that any node device can synchronize the update of the sensitive phrase database.
- the node device in the blockchain system verifies any transaction data through the supervision identification, so that the transaction data carrying the update operation identification and the sensitive phrase corresponding to the update operation identification on the blockchain are all generated by the supervision node device.
- the node device when the node device stores a target block each time, it can obtain the update operation identifier and the sensitive phrase corresponding to the update operation identifier from the target block, so that each node device can perform its own sensitive phrase database. Real-time update can avoid the situation that the node device cannot accurately filter the block content of the block to be queried because the sensitive phrase database is not updated in time.
- the transaction data carrying the sensitive phrases in the block to be queried is filtered, so that the node device displays the filtered transaction data to the user .
- any node device in the blockchain system can filter the sensitive phrases in the query block based on its own sensitive phrase database , So as to avoid the mass spread of sensitive phrases in the blockchain.
- the node devices in the blockchain system filter the sensitive phrases in the query block through the smart contract, only users with supervisory authority need to maintain the smart contract without the need for other node devices to maintain, which can reduce other The service burden of the node device.
- the data synchronization device provided in the above embodiment performs data synchronization
- only the division of the above functional modules is used as an example.
- the above functions can be allocated by different functional modules according to needs. That is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
- the data synchronization device provided in the foregoing embodiment and the data synchronization method embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment.
- FIG. 5 is a schematic structural diagram of a computer device provided by an embodiment of the present application.
- the computer device may specifically be the node device in FIG. 1.
- the node device 500 may have relatively large differences due to different configurations or performances, and may include one or more CPUs (central processing units, processors) 501 and one or more memories 502, wherein the memory 502 stores There is at least one instruction, and the at least one instruction is loaded and executed by the processor 501 to implement the methods provided in the foregoing method embodiments.
- the node device may also have components such as a wired or wireless network interface, a keyboard, an input and output interface for input and output, and the node device may also include other components for implementing device functions, which will not be repeated here.
- a computer-readable storage medium such as a memory including instructions, which may be executed by a processor in a terminal to complete the data synchronization method or data query method in the foregoing embodiment.
- a computer device including a memory and a processor, the memory stores computer readable instructions, and when the computer readable instructions are executed by the processor, the processor executes the steps of the image processing method.
- the steps of the image processing method may be the steps in the image processing method of each of the foregoing embodiments.
- a computer-readable storage medium which stores computer-readable instructions.
- the processor executes the steps of the image processing method.
- the steps of the image processing method may be the steps in the image processing method of each of the foregoing embodiments.
- Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- Volatile memory may include random access memory (RAM) or external cache memory.
- RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Computational Linguistics (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
更新操作标识 | 敏感词组1 | 敏感词组2 | ... | 敏感词组n |
Add | xxx | yyy | ... | zzz |
Delete | mmm | nnn | ttt |
Claims (21)
- 一种数据同步方法,其特征在于,由计算机设备执行,所述方法包括:接收任一交易数据,所述任一交易数据携带更新操作标识以及与所述更新操作标识对应的敏感词组;当包含所述任一交易数据的目标区块存储至区块链系统的区块链中时,获取所述目标区块中的所述更新操作标识以及所述敏感词组;及根据所述目标区块中的所述更新操作标识以及所述敏感词组,对敏感词组数据库进行更新。
- 根据权利要求1所述的方法,其特征在于,所述根据所述目标区块中的所述更新操作标识以及所述敏感词组,对敏感词组数据库进行更新,包括:当所述任一交易数据中的更新操作标识为增加标识时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组;或,当所述任一交易数据中的更新操作标识为删除标识时,从所述敏感词组数据库中删除与所述删除标识对应的敏感词组。
- 根据权利要求2所述的方法,其特征在于,所述当所述任一交易数据中的更新操作标识为增加标识时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组,包括:当所述任一交易数据中的更新操作标识为增加标识时,根据所述增加标识对应的敏感词组查询所述敏感词组数据库,当所述敏感词组数据库中未包含所述增加标识对应的敏感词组时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组。
- 根据权利要求1所述的方法,其特征在于,所述获取所述目标区块中的所述更新操作标识以及所述敏感词组,包括:当所述目标区块中的任一条交易数据中携带监管标识时,获取所述任一条交易数据中的所述更新操作标识以及所述敏感词组。
- 根据权利要求4所述的方法,其特征在于,所述监管标识包括监管节点设备的签名或监管节点设备的地址。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:根据查询请求所携带的区块编号,在所述区块链系统的区块链上确定所述区块编号对应的区块;将所述区块编号对应的区块内的至少一条交易数据与敏感词组数据库中的敏感词组进行比对;及当所述至少一条交易数据中包括第一交易数据时,从所述第一交易数据中过滤掉所述敏感词组数据库中的敏感词组,得到查询反馈信息,所述查询反馈信息包括经过过滤的至少一条交易数据,所述第一交易数据为包括所述敏感词组数据库中的任一敏感词组的交易数据。
- 根据权利要求6所述的方法,其特征在于,所述将所述区块编号对应的区块内的至少一条交易数据与敏感词组数据库中的敏感词组进行比对,包括:按照所述敏感词组数据库中多个敏感词组的权重从高到低的顺序,将所述区块内的至少一条交易数据与所述多个敏感词组进行一一比对,所述权重根据敏感词组被执行增加操作的次数确定。
- 根据权利要求6所述的方法,其特征在于,所述当所述至少一条交易数据中包括第一交易数据时,从所述第一交易数据中过滤掉所述敏感词组数据库中的敏感词组,得到查询反馈信息,所述查询反馈信息包括经过过滤的至少一条交易数据,包括下述任一项:当所述至少一条交易数据中包括第一交易数据时,从所述第一交易数据中删除所述敏感词组数据库中的敏感词组,得到查询反馈信息,所述查询反馈信息包括删除后的至少一条交易数据;及当所述至少一条交易数据中包括第一交易数据时,将所述第一交易数据中的敏感词组替换为目标警示词组,得到查询反馈信息,所述查询反馈信息包括替换后的至少一条交易数据。
- 一种数据同步装置,其特征在于,所述装置包括:接收模块,用于接收任一交易数据,所述任一交易数据携带更新操作标 识以及与所述更新操作标识对应的敏感词组;获取模块,用于当包含所述任一交易数据的目标区块存储至区块链系统的区块链中时,获取所述目标区块中的所述更新操作标识以及所述敏感词组;及更新模块,用于根据所述目标区块中的所述更新操作标识以及所述敏感词组,对敏感词组数据库进行更新。
- 根据权利要求9所述的装置,其特征在于,所述更新模块包括:增加单元,用于当所述任一交易数据中的更新操作标识为增加标识时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组;或,删除单元,用于当所述任一交易数据中的更新操作标识为删除标识时,从所述敏感词组数据库中删除与所述删除标识对应的敏感词组。
- 根据权利要求10所述的装置,其特征在于,所述增加单元,用于当所述任一交易数据中的更新操作标识为增加标识时,根据所述增加标识对应的敏感词组查询所述敏感词组数据库,当所述敏感词组数据库中未包含所述增加标识对应的敏感词组时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组。
- 根据权利要求9所述的装置,其特征在于,所述获取模块,用于当所述目标区块中的任一条交易数据中携带监管标识时,获取所述任一条交易数据中的所述更新操作标识以及所述敏感词组。
- 根据权利要求9所述的装置,其特征在于,所述装置还包括:确定模块,用于根据查询请求所携带的区块编号,在所述区块链系统的区块链上确定所述区块编号对应的区块;对比模块,用于将所述区块编号对应的区块内的至少一条交易数据与敏感词组数据库中的敏感词组进行比对;及过滤模块,用于当所述至少一条交易数据中包括第一交易数据时,从所述第一交易数据中过滤掉所述敏感词组数据库中的敏感词组,得到查询反馈信息,所述查询反馈信息包括经过过滤的至少一条交易数据,所述第一交易 数据为包括所述敏感词组数据库中的任一敏感词组的交易数据。
- 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行以下步骤:接收任一交易数据,所述任一交易数据携带更新操作标识以及与所述更新操作标识对应的敏感词组;当包含所述任一交易数据的目标区块存储至区块链系统的区块链中时,获取所述目标区块中的所述更新操作标识以及所述敏感词组;及根据所述目标区块中的所述更新操作标识以及所述敏感词组,对敏感词组数据库进行更新。
- 根据权利要求14所述的计算机设备,其特征在于,所述根据所述目标区块中的所述更新操作标识以及所述敏感词组,对敏感词组数据库进行更新,包括:当所述任一交易数据中的更新操作标识为增加标识时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组;或,当所述任一交易数据中的更新操作标识为删除标识时,从所述敏感词组数据库中删除与所述删除标识对应的敏感词组。
- 根据权利要求15所述的计算机设备,其特征在于,所述当所述任一交易数据中的更新操作标识为增加标识时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组,包括:当所述任一交易数据中的更新操作标识为增加标识时,根据所述增加标识对应的敏感词组查询所述敏感词组数据库,当所述敏感词组数据库中未包含所述增加标识对应的敏感词组时,在所述敏感词组数据库中增加与所述增加标识对应的敏感词组。
- 根据权利要求14所述的计算机设备,其特征在于,所述获取所述目标区块中的所述更新操作标识以及所述敏感词组,包括:当所述目标区块中的任一条交易数据中携带监管标识时,获取所述任一 条交易数据中的所述更新操作标识以及所述敏感词组。
- 根据权利要求14所述的计算机设备,其特征在于,所述计算机可读指令被所述处理器执行时,还使得所述处理器执行以下步骤:根据查询请求所携带的区块编号,在所述区块链系统的区块链上确定所述区块编号对应的区块;将所述区块编号对应的区块内的至少一条交易数据与敏感词组数据库中的敏感词组进行比对;及当所述至少一条交易数据中包括第一交易数据时,从所述第一交易数据中过滤掉所述敏感词组数据库中的敏感词组,得到查询反馈信息,所述查询反馈信息包括经过过滤的至少一条交易数据,所述第一交易数据为包括所述敏感词组数据库中的任一敏感词组的交易数据。
- 根据权利要求18所述的计算机设备,其特征在于,所述将所述区块编号对应的区块内的至少一条交易数据与敏感词组数据库中的敏感词组进行比对,包括:按照所述敏感词组数据库中多个敏感词组的权重从高到低的顺序,将所述区块内的至少一条交易数据与所述多个敏感词组进行一一比对,所述权重根据敏感词组被执行增加操作的次数确定。
- 根据权利要求18所述的计算机设备,其特征在于,所述当所述至少一条交易数据中包括第一交易数据时,从所述第一交易数据中过滤掉所述敏感词组数据库中的敏感词组,得到查询反馈信息,所述查询反馈信息包括经过过滤的至少一条交易数据,包括下述任一项:当所述至少一条交易数据中包括第一交易数据时,从所述第一交易数据中删除所述敏感词组数据库中的敏感词组,得到查询反馈信息,所述查询反馈信息包括删除后的至少一条交易数据;及当所述至少一条交易数据中包括第一交易数据时,将所述第一交易数据中的敏感词组替换为目标警示词组,得到查询反馈信息,所述查询反馈信息包括替换后的至少一条交易数据。
- 一种存储有计算机可读指令的非易失性存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行如权利要求1至8中任一项所述的方法的步骤。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG11202101569VA SG11202101569VA (en) | 2019-03-15 | 2020-03-09 | Data synchronization method and apparatus, computer device and readable storage medium |
KR1020217006086A KR102545615B1 (ko) | 2019-03-15 | 2020-03-09 | 데이터 동기화 방법 및 장치, 컴퓨터 디바이스 및 판독가능 저장 매체 |
JP2021505803A JP7066240B2 (ja) | 2019-03-15 | 2020-03-09 | データ同期方法、装置、コンピュータデバイス、およびコンピュータプログラム |
US17/145,829 US11985251B2 (en) | 2019-03-15 | 2021-01-11 | Data synchronization method and apparatus, computer device, and readable storage medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910196407.9A CN109933629B (zh) | 2019-03-15 | 2019-03-15 | 数据同步方法、装置、计算机设备以及可读存储介质 |
CN201910196407.9 | 2019-03-15 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/145,829 Continuation US11985251B2 (en) | 2019-03-15 | 2021-01-11 | Data synchronization method and apparatus, computer device, and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020187069A1 true WO2020187069A1 (zh) | 2020-09-24 |
Family
ID=66987163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/078348 WO2020187069A1 (zh) | 2019-03-15 | 2020-03-09 | 数据同步方法、装置、计算机设备以及可读存储介质 |
Country Status (6)
Country | Link |
---|---|
US (1) | US11985251B2 (zh) |
JP (1) | JP7066240B2 (zh) |
KR (1) | KR102545615B1 (zh) |
CN (1) | CN109933629B (zh) |
SG (1) | SG11202101569VA (zh) |
WO (1) | WO2020187069A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113364874A (zh) * | 2021-06-09 | 2021-09-07 | 网易(杭州)网络有限公司 | 基于区块链的节点同步方法、装置、存储介质及服务器 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109697367B (zh) * | 2019-01-09 | 2021-08-24 | 腾讯科技(深圳)有限公司 | 显示区块链数据的方法、区块链浏览器、用户节点和介质 |
CN109933629B (zh) | 2019-03-15 | 2021-07-30 | 腾讯科技(深圳)有限公司 | 数据同步方法、装置、计算机设备以及可读存储介质 |
US11251966B2 (en) | 2019-06-28 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
CN112003703B (zh) * | 2019-06-28 | 2023-08-22 | 创新先进技术有限公司 | 一种跨链发送可认证消息的方法和装置 |
US11356282B2 (en) | 2019-06-28 | 2022-06-07 | Advanced New Technologies Co., Ltd. | Sending cross-chain authenticatable messages |
CN110580625A (zh) * | 2019-07-30 | 2019-12-17 | 上海数据交易中心有限公司 | 流通数据监管方法及装置、存储介质、终端 |
CN110572450B (zh) * | 2019-09-05 | 2022-09-30 | 腾讯科技(深圳)有限公司 | 数据同步方法、装置、计算机可读存储介质和计算机设备 |
CN110659441B (zh) * | 2019-09-26 | 2024-01-12 | 腾讯科技(深圳)有限公司 | 一种基于区块链的信息发布管理方法及装置 |
CN111988396A (zh) * | 2020-08-19 | 2020-11-24 | 中国银行股份有限公司 | 基于区块链的内容安全检测同步方法、装置及系统 |
CN115396443B (zh) * | 2022-10-31 | 2022-12-27 | 安徽中科晶格技术有限公司 | 基于时间因子的联盟链共识方法、装置、设备及存储介质 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103490978A (zh) * | 2013-09-02 | 2014-01-01 | 用友软件股份有限公司 | 终端、服务器和消息监视方法 |
US20170358168A1 (en) * | 2016-06-08 | 2017-12-14 | Sichuan Energy Internet Research Institute, Tsinghua University | Systems and methods for wireless charging stations |
CN107623714A (zh) * | 2017-07-28 | 2018-01-23 | 平安科技(深圳)有限公司 | 数据共享方法、装置及计算机可读存储介质 |
CN108985772A (zh) * | 2018-07-02 | 2018-12-11 | 上海达家迎信息科技有限公司 | 一种区块链的验证方法、装置、设备及存储介质 |
KR20180137250A (ko) * | 2017-06-16 | 2018-12-27 | 서강대학교산학협력단 | 비공개적 분산형 데이터베이스 네트워크 환경에서의 브로드캐스팅을 이용한 계약 참조 방식의 스마트 가로등 시스템 및 제어 방법 |
CN109241768A (zh) * | 2018-08-03 | 2019-01-18 | 百度在线网络技术(北京)有限公司 | 爱情信息处理方法、装置、设备及存储介质 |
CN109933629A (zh) * | 2019-03-15 | 2019-06-25 | 腾讯科技(深圳)有限公司 | 数据同步方法、装置、计算机设备以及可读存储介质 |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4031264B2 (ja) | 2002-03-06 | 2008-01-09 | 株式会社富士通ソーシアルサイエンスラボラトリ | フィルタリング管理方法、フィルタリング管理プログラム、フィルタリング装置のフィルタリング管理方法、およびフィルタリング装置用フィルタリング管理プログラム |
US8589346B2 (en) * | 2011-04-26 | 2013-11-19 | Oracle International Corporation | Techniques for combining statement level, procedural, and row level replication |
JP2011204178A (ja) | 2010-03-26 | 2011-10-13 | Nomura Research Institute Ltd | 発言制御装置およびコンピュータプログラム |
US20190171650A1 (en) * | 2017-12-01 | 2019-06-06 | Chavdar Botev | System and method to improve data synchronization and integration of heterogeneous databases distributed across enterprise and cloud using bi-directional transactional bus of asynchronous change data system |
US10223369B2 (en) * | 2013-08-16 | 2019-03-05 | Sanebox, Inc. | Processing electronic messages |
US9600193B2 (en) * | 2015-02-04 | 2017-03-21 | Delphix Corporation | Replicating snapshots from a source storage system to a target storage system |
US20180144292A1 (en) * | 2016-11-22 | 2018-05-24 | Wal-Mart Stores, Inc. | Apparatus and method for tracking consumer premises inventory |
US11631077B2 (en) * | 2017-01-17 | 2023-04-18 | HashLynx Inc. | System for facilitating secure electronic communications between entities and processing resource transfers |
US10158479B2 (en) * | 2017-02-06 | 2018-12-18 | Northern Trust Corporation | Systems and methods for generating, uploading and executing code blocks within distributed network nodes |
US10621150B2 (en) * | 2017-03-05 | 2020-04-14 | Jonathan Sean Callan | System and method for enforcing the structure and content of databases synchronized over a distributed ledger |
JP6814094B2 (ja) | 2017-05-22 | 2021-01-13 | Kddi株式会社 | 合意形成システム、プログラム、及び生成方法 |
US10061937B1 (en) | 2017-06-28 | 2018-08-28 | International Business Machines Corporation | Protecting confidential information |
US20190050810A1 (en) * | 2017-08-14 | 2019-02-14 | Honeywell International Inc. | Terminal automation solutions supporting blockchain technology |
US20190052453A1 (en) * | 2017-08-14 | 2019-02-14 | Honeywell International Inc. | Apparatus and method for using blockchains with secure custody transfer data, sealing data, and other data associated with material transfers |
CN108052529A (zh) * | 2017-11-09 | 2018-05-18 | 福建省天奕网络科技有限公司 | 一种敏感词过滤方法及终端 |
CN107862076A (zh) * | 2017-11-29 | 2018-03-30 | 四川九鼎智远知识产权运营有限公司 | 一种敏感词汇监控平台 |
US10810314B1 (en) * | 2017-12-22 | 2020-10-20 | Architecture Technology Corporation | Database connector using attribute-based encryption |
CN109246179B (zh) * | 2018-06-30 | 2021-06-01 | 华为技术有限公司 | 维护区块链的方法和装置、服务器和计算机可读存储介质 |
CN108921556B (zh) * | 2018-07-02 | 2022-04-19 | 上海达家迎信息科技有限公司 | 一种区块链的验证方法、装置、设备及存储介质 |
CN110740113B (zh) * | 2018-07-20 | 2021-10-29 | 富士通株式会社 | 通过多个主体协作进行信息处理的方法和装置 |
US20210174432A1 (en) * | 2018-08-07 | 2021-06-10 | Perpetual Altruism Limited | Computer implemented method and system for updating a database system for a blockchain version control system; computer implemented methods of auctioning an item for a seller, and computer implemented method of updating a smart contract |
CN109194633B (zh) * | 2018-08-21 | 2021-08-10 | 山东智慧云链网络科技有限公司 | 通讯录备份方法及系统 |
CN109325764B (zh) | 2018-09-12 | 2022-05-27 | 江苏南大数码科技有限公司 | 基于区块链的敏感数据交易系统及方法 |
CN109241192B (zh) * | 2018-09-18 | 2021-06-15 | 百度在线网络技术(北京)有限公司 | 区块链的数据修改及区块验证方法、装置、设备和介质 |
CN109284119B (zh) * | 2018-09-27 | 2021-12-28 | 维沃移动通信有限公司 | 一种应用功能控制参数处理方法、装置及设备 |
EP3912121A4 (en) * | 2018-11-19 | 2022-11-30 | Rare Bits, Inc. | LAZY UPDATING AND STATE PREDICTION FOR BLOCKCHAIN-BASED APPLICATIONS |
US10810183B1 (en) * | 2019-02-19 | 2020-10-20 | Mythical, Inc. | Systems and methods for synchronizing database operations with a distributed blockchain |
-
2019
- 2019-03-15 CN CN201910196407.9A patent/CN109933629B/zh active Active
-
2020
- 2020-03-09 SG SG11202101569VA patent/SG11202101569VA/en unknown
- 2020-03-09 WO PCT/CN2020/078348 patent/WO2020187069A1/zh active Application Filing
- 2020-03-09 JP JP2021505803A patent/JP7066240B2/ja active Active
- 2020-03-09 KR KR1020217006086A patent/KR102545615B1/ko active IP Right Grant
-
2021
- 2021-01-11 US US17/145,829 patent/US11985251B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103490978A (zh) * | 2013-09-02 | 2014-01-01 | 用友软件股份有限公司 | 终端、服务器和消息监视方法 |
US20170358168A1 (en) * | 2016-06-08 | 2017-12-14 | Sichuan Energy Internet Research Institute, Tsinghua University | Systems and methods for wireless charging stations |
KR20180137250A (ko) * | 2017-06-16 | 2018-12-27 | 서강대학교산학협력단 | 비공개적 분산형 데이터베이스 네트워크 환경에서의 브로드캐스팅을 이용한 계약 참조 방식의 스마트 가로등 시스템 및 제어 방법 |
CN107623714A (zh) * | 2017-07-28 | 2018-01-23 | 平安科技(深圳)有限公司 | 数据共享方法、装置及计算机可读存储介质 |
CN108985772A (zh) * | 2018-07-02 | 2018-12-11 | 上海达家迎信息科技有限公司 | 一种区块链的验证方法、装置、设备及存储介质 |
CN109241768A (zh) * | 2018-08-03 | 2019-01-18 | 百度在线网络技术(北京)有限公司 | 爱情信息处理方法、装置、设备及存储介质 |
CN109933629A (zh) * | 2019-03-15 | 2019-06-25 | 腾讯科技(深圳)有限公司 | 数据同步方法、装置、计算机设备以及可读存储介质 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113364874A (zh) * | 2021-06-09 | 2021-09-07 | 网易(杭州)网络有限公司 | 基于区块链的节点同步方法、装置、存储介质及服务器 |
CN113364874B (zh) * | 2021-06-09 | 2022-06-10 | 网易(杭州)网络有限公司 | 基于区块链的节点同步方法、装置、存储介质及服务器 |
Also Published As
Publication number | Publication date |
---|---|
US11985251B2 (en) | 2024-05-14 |
CN109933629A (zh) | 2019-06-25 |
SG11202101569VA (en) | 2021-03-30 |
CN109933629B (zh) | 2021-07-30 |
JP7066240B2 (ja) | 2022-05-13 |
US20210167970A1 (en) | 2021-06-03 |
KR20210035290A (ko) | 2021-03-31 |
JP2021533475A (ja) | 2021-12-02 |
KR102545615B1 (ko) | 2023-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020187069A1 (zh) | 数据同步方法、装置、计算机设备以及可读存储介质 | |
US11615210B1 (en) | Third-party platform for tokenization and detokenization of network packet data | |
US10860725B2 (en) | Increasing search ability of private, encrypted data | |
CN109474578B (zh) | 报文消息校验方法、装置、计算机设备和存储介质 | |
CN111563365B (zh) | 试验标准工单修改信息处理方法、装置和计算机设备 | |
CN110224833B (zh) | 票据数据处理方法和系统 | |
CN106899563B (zh) | 鉴权方法及装置、鉴权码生成方法及装置、鉴权系统 | |
WO2019114137A1 (zh) | 密码调用方法、服务器及存储介质 | |
CN112506481A (zh) | 业务数据交互方法、装置、计算机设备和存储介质 | |
CN111507706B (zh) | 数据浏览、存储的方法、装置、计算机设备以及存储介质 | |
US11232190B2 (en) | Device attestation techniques | |
JP7100563B2 (ja) | 匿名化システムおよび匿名化方法 | |
WO2021169469A1 (zh) | 声纹数据处理方法、装置、计算机设备和存储介质 | |
WO2021012903A1 (zh) | 数据存储方法、装置、计算机设备和存储介质 | |
WO2020233086A1 (zh) | 区块处理方法、装置、计算机设备和存储介质 | |
CN111143399A (zh) | 数据处理方法、装置、存储介质和计算机设备 | |
CN112069522B (zh) | 电子处方的处理方法、装置、计算机设备和存储介质 | |
US10586034B2 (en) | Network communication method and network communication system | |
CN110599386A (zh) | 身份认证方法、装置、存储介质和计算机设备 | |
CN117251883B (zh) | 数据可靠性验证方法、装置、计算机设备和存储介质 | |
US11609975B1 (en) | Identity verification | |
CN113407213B (zh) | 资源包更新方法、装置、设备及存储介质 | |
CN115168907B (zh) | 保护数据隐私的数据匹配方法、系统、设备及存储介质 | |
CN113076318A (zh) | 一种用户id分配方法、装置、计算机设备及存储介质 | |
CN117828565A (zh) | 基于堡垒机的资源处理方法、装置和计算机设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20772567 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021505803 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20217006086 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20772567 Country of ref document: EP Kind code of ref document: A1 |