WO2020215684A1 - Blockchain-based parameter configuration method and apparatus, blockchain-based parameter reconstruction method and apparatus, device, and medium - Google Patents

Blockchain-based parameter configuration method and apparatus, blockchain-based parameter reconstruction method and apparatus, device, and medium Download PDF

Info

Publication number
WO2020215684A1
WO2020215684A1 PCT/CN2019/117732 CN2019117732W WO2020215684A1 WO 2020215684 A1 WO2020215684 A1 WO 2020215684A1 CN 2019117732 W CN2019117732 W CN 2019117732W WO 2020215684 A1 WO2020215684 A1 WO 2020215684A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
configuration information
cluster
configuration
information
Prior art date
Application number
PCT/CN2019/117732
Other languages
French (fr)
Chinese (zh)
Inventor
杨天鹏
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020215684A1 publication Critical patent/WO2020215684A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Definitions

  • This application relates to the field of blockchain technology, and in particular to a method, device, device, and medium for parameter configuration and reconstruction based on blockchain.
  • the existing unified configuration service products are centralized, and each system needs to be uniformly connected to the configuration center server. If the centralized server goes down or other abnormalities occur, it will affect the normal use of all systems. Moreover, if the configuration center server data is lost, the data of all systems will likely be lost, which is not conducive to the stability of the data of each system.
  • the embodiments of the present application provide a parameter configuration method, device, computer equipment, and storage medium based on blockchain to solve the problem of low data stability.
  • the embodiments of the present application provide a method, device, computer equipment, and storage medium for parameter reconstruction based on blockchain to solve the problem of low node reconstruction efficiency.
  • a parameter configuration method based on blockchain including:
  • Acquiring node configuration information of a configuration node where there are at least two configuration nodes, and each configuration node includes node configuration information;
  • the public configuration information and the personalized encryption information of each configuration node are recorded in the blockchain.
  • a parameter configuration device based on blockchain includes:
  • a node configuration information obtaining module configured to obtain node configuration information of configuration nodes, where there are at least two configuration nodes, and each configuration node includes node configuration information;
  • the configuration information matching module is configured to perform configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
  • the asymmetric encryption module is configured to use the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
  • the block chain recording module is used to record the public configuration information and the personalized encrypted information of each configuration node in the block chain.
  • a method of parameter reconstruction based on blockchain including:
  • node reconstruction request includes node identification and node verification information
  • the node verification result is that the verification is passed, obtain corresponding personalized encrypted information from the blockchain according to the node identifier;
  • a parameter reconstruction device based on blockchain includes:
  • a node reconstruction request obtaining module configured to obtain a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
  • Node verification result obtaining module used to verify the node verification information to obtain the node verification result
  • a personalized encrypted information obtaining module configured to obtain corresponding personalized encrypted information from the blockchain according to the node identifier if the verification result of the node is a successful verification
  • the configuration information sending module is used to obtain public configuration information from the blockchain, and send the public configuration information and the personalized encryption information to the configuration node corresponding to the node identifier, where the public configuration information and the The personalized encrypted information is obtained by using the above-mentioned blockchain-based parameter configuration method.
  • a computer device including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor.
  • the processor implements the above-mentioned blockchain-based Parameter configuration method, or the above-mentioned blockchain-based parameter reconstruction method is implemented when the processor executes the computer-readable instruction.
  • One or more readable storage media storing computer readable instructions, which when executed by one or more processors, cause the one or more processors to execute the above-mentioned blockchain-based parameter configuration Method, or, when the computer-readable instruction is executed by one or more processors, the one or more processors execute the above-mentioned blockchain-based parameter reconstruction method.
  • FIG. 1 is a schematic diagram of an application environment of a blockchain-based parameter configuration method or a blockchain-based parameter reconstruction method in an embodiment of the present application;
  • FIG. 2 is an example diagram of a parameter configuration method based on blockchain in an embodiment of the present application
  • FIG. 3 is another example diagram of a parameter configuration method based on blockchain in an embodiment of the present application.
  • FIG. 4 is another example diagram of a parameter configuration method based on blockchain in an embodiment of the present application.
  • FIG. 5 is another example diagram of a parameter configuration method based on blockchain in an embodiment of the present application.
  • FIG. 6 is an example diagram of a parameter reconstruction method based on blockchain in an embodiment of the present application.
  • FIG. 7 is a functional block diagram of a parameter configuration device based on blockchain in an embodiment of the present application.
  • FIG. 8 is another principle block diagram of a parameter configuration device based on blockchain in an embodiment of the present application.
  • FIG. 9 is a functional block diagram of a parameter reconstruction device based on blockchain in an embodiment of the present application.
  • Fig. 10 is a schematic diagram of a computer device in an embodiment of the present application.
  • the block chain-based parameter configuration method provided by the embodiment of the present application can be applied in the application environment as shown in FIG. 1, wherein the client (computer equipment) communicates with the server through the network.
  • the server obtains the node configuration information of the configuration node (client), where there are at least two configuration nodes, and each configuration node includes one node configuration information; the node configuration information is matched with the configuration information to obtain the common configuration information and each Configure the personalized configuration information of the node; use the public key corresponding to each configuration node to asymmetrically encrypt the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node; combine the public configuration information with each configuration node Personalized encrypted information is recorded in the blockchain.
  • the client computer equipment
  • the server can be implemented with an independent server or a server cluster composed of multiple servers.
  • a method for parameter configuration based on blockchain is provided.
  • the method is applied to the server in FIG. 1 as an example for description, including the following steps:
  • S10 Obtain node configuration information of a configuration node, where there are at least two configuration nodes, and each configuration node includes node configuration information.
  • each configuration node corresponds to a terminal or system, and each terminal or system joins the blockchain network by setting up a server to become a node.
  • the configuration nodes correspond to different configuration terminals or systems in this embodiment.
  • different distributed nodes configure their parameters through a distributed configuration management platform to complete the node configuration.
  • the configuration of different configuration nodes can be implemented through open source configuration centers such as Diamond, disconf, or apollo.
  • Each configuration node includes node configuration information, and the node configuration information includes specific configuration parameter information of the terminal corresponding to the node.
  • the node configuration information may be a file in a data format such as XML, YML, json, and map.
  • S20 Perform configuration information matching on node configuration information to obtain public configuration information and personalized configuration information of each configuration node.
  • the node configuration information of different configuration nodes there may be part of the same configuration information and different node configuration information.
  • this step by matching the configuration information of the node configuration information, that is, the node information that is the same or has reference significance among all the configuration nodes is screened out as the common configuration information. And filter out the configuration information of each configuration node that is different from other nodes, as personalized configuration information.
  • each configuration information in the node configuration information can be matched in different node configuration information to check whether the same configuration information exists in each node configuration information. If, for one piece of configuration information, the same configuration information can be matched in different node configuration information, the configuration information can be used as common configuration information.
  • Each configuration information of each node configuration information is traversed and matched in different node configuration information, and then the number of successful matching is counted.
  • the number of successful matches can be used to determine whether the configuration information belongs to public configuration information.
  • the part of the configuration information of each node that is not part of the common configuration information is the personalized configuration information of each configuration node.
  • the matching method may be various string matching algorithms or regular expressions.
  • a similarity calculation algorithm or a vector distance calculation algorithm may be used to implement the configuration information matching process.
  • S30 Use the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node.
  • the security of the information is better guaranteed.
  • the private key is saved for each configuration node.
  • the public key can be stored in a unified server or management center.
  • a key management center (KMC, Key Management Center) is used to generate a key pair for each configuration node.
  • KMC Key Management Center
  • the key management center is an important part of the public key infrastructure. It is responsible for providing key services such as key generation, storage, backup, update, recovery or query for the certification authority (CA, Certification Authority) system to solve distribution Key management issues brought by large-scale cryptographic technology applications in a distributed enterprise application environment.
  • CA Certification Authority
  • the public key of each configuration node is used to asymmetrically encrypt the personalized configuration information of each configuration node, and the personalized encryption information of each configuration node can be obtained.
  • the asymmetric encryption can be implemented by RSA encryption algorithm, Elgamal encryption algorithm, knapsack algorithm, Rabin encryption algorithm, or D-H encryption algorithm.
  • S40 Record the public configuration information and the personalized encryption information of each configuration node in the blockchain.
  • the obtained public configuration information and the personalized encryption information of each configuration node are recorded in the blockchain, which completes the process of parameter configuration.
  • the server can call the corresponding data transmission interface to record the public configuration information and the personalized encryption information of each configuration node in the blockchain.
  • the personalized encrypted information of the node is recorded in the blockchain.
  • each node configuration information includes at least one sub-node configuration information
  • each sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value.
  • the node configuration information includes at least one sub-node configuration information, and each sub-node configuration information represents each parameter that needs to be configured, and each sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value.
  • the configuration parameter name can be the project name, project category, port, and IP address.
  • the configuration parameter value is the specific content corresponding to the configuration parameter name.
  • the child node configuration information may be formed in the form of key-value pairs, that is, the configuration parameter name is key and the configuration parameter value is value.
  • the configuration information matching is performed on the node configuration information to obtain the common configuration information and the personalized configuration information of each configuration node, including:
  • S21 Perform feature vector transformation on each sub-node configuration information to obtain the sub-node feature vector of each sub-node configuration information.
  • a reference feature vector table can be preset to set corresponding values for existing configuration parameter names and corresponding configuration parameter values, and different configuration parameter names and different configuration parameter values have unique values. Then, according to the reference feature vector table, the configuration information of each child node is transformed into feature vectors.
  • the configuration parameter name and the corresponding configuration parameter value in the configuration information of each sub-node may be respectively converted into word vectors to obtain the sub-node feature vector of each sub-node configuration information.
  • the word2vec tool can be used to implement word vector conversion.
  • cluster analysis is also called group analysis. It is a statistical analysis method for studying (sample or index) classification problems, and it is also an important analysis method for data mining.
  • the k-means classification algorithm may be used to perform cluster analysis to obtain clusters.
  • the K value is set according to the number of child node configuration information, and the initial center point of each cluster is set.
  • the cluster cluster is set with the configuration parameter name in the child node configuration information.
  • all points sub-node configuration information
  • recalculate all points in the cluster for example, calculate the average value
  • S23 Calculate the number of feature vectors of sub-nodes in each cluster according to the target center point and the preset distance threshold.
  • the distance threshold is a preset value, and different distance thresholds can be configured according to different distance algorithms.
  • the calculation of the number of feature vectors of the child nodes in each cluster can be specifically as follows: first calculate the configuration information of each child node in a cluster and the target center point Then, compare the vector distance with the distance threshold. If the vector distance is less than the distance threshold, the feature vector of the child node corresponding to the child node configuration information belongs to the cluster. Then calculate the number of feature vectors of child nodes belonging to the cluster to get the number of feature vectors of child nodes in each cluster.
  • the vector distance can be calculated using Euclidean distance algorithm, Manhatten distance algorithm, Chebyshev distance algorithm or Minkowski distance algorithm.
  • S24 Determine the target cluster according to the number of feature vectors of the child nodes in each cluster.
  • the target cluster is determined by the number of feature vectors of the child nodes in each cluster. Specifically, it can be measured according to the number of configured nodes. Exemplarily, if the number of configuration nodes is N, the cluster cluster whose number of feature vectors of the child nodes in the cluster cluster is N is determined as the target cluster cluster. Alternatively, a cluster cluster in which the number of feature vectors of child nodes in the cluster cluster reaches a preset ratio value of N is determined as the target cluster cluster. Exemplarily, the preset ratio value may be 95%, 90%, 85%, 80%, etc. Further, different number intervals can be set to further classify the target clusters. Each type of target cluster has a different number interval. The specific classification criteria can be set according to specific configuration requirements, and are not limited here.
  • S25 Determine the configuration information of the child nodes corresponding to the target cluster as the common configuration information.
  • the configuration information of the child nodes corresponding to the target cluster is determined as the common configuration information.
  • S26 Determine the configuration information of the child nodes in the configuration information of each node that is different from the common configuration information as the personalized configuration information of each configuration node.
  • the configuration information of the child nodes in each node configuration information that is different from the public configuration information is determined as the personalized configuration information of each configuration node.
  • the configuration information of each node can be filtered according to the configuration parameter name in the public configuration information, and the configuration information of the child node with a different configuration parameter name in the node configuration information of each configuration node and the configuration parameter name in the public configuration information can be determined as Personalized configuration information for each configuration node.
  • the feature vector transformation of each sub-node configuration information is first performed to obtain the sub-node feature vector of each sub-node configuration information; then based on the sub-node feature vector of each sub-node configuration information, the node configuration information Use clustering algorithm for cluster analysis to obtain clusters, each cluster includes the target center point; according to the target center point and the preset distance threshold, calculate the number of sub-node feature vectors in each cluster; The number of sub-node feature vectors in each cluster determines the target cluster; the configuration information of the sub-nodes corresponding to the target cluster is determined as the common configuration information; and the sub-nodes in the configuration information of each node are different from the common configuration information.
  • the node configuration information is determined as the personalized configuration information of each configuration node. The determination of the public configuration information and the personalized configuration information of each configuration node through the above steps ensures the efficiency and accuracy of the above configuration information determination.
  • determining the target cluster cluster according to the number of feature vectors of the child nodes in each cluster cluster includes:
  • S241 Acquire a preset first quantity threshold and a preset second quantity threshold.
  • the first number threshold and the second number threshold are preset in order to specifically classify the target cluster.
  • the first number threshold and the second number threshold can be set according to the number of configuration nodes. If the number of configuration nodes is N, for example, the number of the first number threshold is set to N, and the number of the second number threshold is 0.8N. Understandably, the first number threshold and the second number threshold can be adjusted according to actual needs. Preferably, the first number threshold is greater than the second number threshold.
  • S242 Determine cluster clusters whose number of feature vectors of child nodes in the cluster cluster meets the first number threshold as a common cluster cluster, and determine cluster clusters whose number of feature vectors of child nodes in the cluster cluster meets the second number threshold It is recommended to cluster clusters.
  • the common cluster cluster and the recommended cluster cluster are determined according to the first number threshold and the second number threshold, respectively. Specifically, it may be judged first whether the number of feature vectors of the child nodes in each cluster meets the first number threshold, and if the first number threshold is met, the corresponding cluster is determined as a common cluster cluster. If the first number threshold is not met, it is further determined whether the number of feature vectors of the child nodes in the cluster meets the second number threshold, and if the second number threshold is met, the corresponding cluster is determined as the recommended cluster. Specifically, whether the number of sub-node feature vectors in each cluster meets the first number threshold or the second number threshold may be whether the number of sub-node feature vectors in each cluster is greater than or equal to the corresponding number threshold.
  • the public cluster cluster and the recommended cluster cluster are formed into the target cluster cluster.
  • first obtain the preset first number threshold and second number threshold and then determine the cluster cluster whose number of feature vectors of the child nodes in the cluster cluster meets the first number threshold as a common cluster cluster.
  • the cluster cluster whose number of feature vectors of the child nodes in the cluster cluster meets the second number threshold is determined as the recommended cluster cluster; finally, the common cluster cluster and the recommended cluster cluster form the target cluster cluster.
  • Different number thresholds are used to divide the target cluster cluster into different cluster cluster types to better adapt to different configuration parameter types and improve the flexibility of parameter configuration.
  • determining the configuration information of the child nodes corresponding to the target cluster cluster as the common configuration information includes:
  • S251 Determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information.
  • S252 Determine the child node configuration information corresponding to the recommended cluster as the recommended configuration information.
  • S253 Combine the same configuration information and recommended configuration information into common configuration information.
  • the configuration information of the child nodes corresponding to the common cluster cluster in the target cluster is determined to be the same configuration information
  • the configuration information of the child nodes corresponding to the recommended cluster cluster is determined to be the recommended configuration information
  • the same configuration information is configuration information with the same content in different configuration nodes
  • the recommended configuration information is configuration information with the same content in most configuration nodes.
  • the embodiment of the present application also provides a parameter reconstruction method based on the blockchain, which can also be applied in the application environment as shown in FIG. 1, in which the client (computer equipment) communicates with the server through the network.
  • the client computer equipment
  • the server can be implemented with an independent server or a server cluster composed of multiple servers. As shown in Figure 6, the method is applied to the server in Figure 1 as an example for description, including the following steps:
  • the node reconstruction request is a trigger request for a configuration node to perform node reconstruction.
  • the node reconstruction request can be initiated when the node reconstruction is required.
  • the node reconstruction request is sent to the server, and the server obtains the node reconstruction request.
  • the node reconstruction request includes node identification and node verification information.
  • the node identifier is an identifier to distinguish different configuration nodes.
  • the node identification can be composed of at least one of numbers, letters, Chinese, or symbols.
  • the node verification information is verification information for the authority or identity of the configured node to better ensure the security of the information.
  • the node verification information may be embodied in the form of a pre-registered account and password, or embodied in the form of a digital certificate.
  • the node verification information is verified to obtain the node verification result.
  • the node verification information is account information
  • the consistency verification of the node verification information can be performed according to the pre-stored standard account information, and if the two are consistent, the node verification result is the verification passed. Otherwise, the node verification result is not passed.
  • the node verification information is a digital certificate number
  • a CA (Certificate Authority) node can be preset to verify the node verification information to obtain the corresponding node verification result.
  • the node verification result includes verification passed and verification failed.
  • the corresponding personalized encrypted information is obtained from the blockchain according to the node identifier.
  • the blockchain contains the personalized encrypted information of each configuration node, and different personalized encrypted information can be queried through the node ID, that is, the personalized encrypted information is stored in association with the corresponding node ID.
  • a prompt message is issued. By sending a prompt message to the corresponding configuration node, to give a better reminder.
  • S80 Obtain public configuration information from the blockchain, and send the public configuration information and personalized encrypted information to the configuration node corresponding to the node ID, where the public configuration information and personalized encrypted information adopt a blockchain-based parameter configuration method owned.
  • the public configuration information is obtained from the blockchain, and the public configuration information and the personalized encryption information are sent to the configuration node corresponding to the node identifier, to complete the issuance of the configuration parameters of the configuration node.
  • the public configuration information and the personalized encryption information are obtained by using the blockchain-based parameter configuration method in the foregoing embodiment.
  • the configuration node After the configuration node obtains the personalized encrypted information, it decrypts the personalized encrypted information through the private key of the configuration node to obtain the personalized configuration information of the configuration node, so as to be based on the public configuration information and the personalized configuration The information obtains the complete configuration information of the configuration node for subsequent efficient completion of node reconstruction.
  • the node verification information is verified to obtain the node verification result; if the node verification result is the verification passed, the corresponding personalized encrypted information is obtained from the blockchain according to the node identification ;
  • a block chain-based parameter configuration device is provided, and the block chain-based parameter configuration device corresponds to the block chain-based parameter configuration method in the foregoing embodiment in a one-to-one correspondence.
  • the block chain-based parameter configuration device includes a node configuration information acquisition module 10, a configuration information matching module 20, an asymmetric encryption module 30 and a blockchain recording module 40.
  • the detailed description of each functional module is as follows:
  • the node configuration information obtaining module 10 is configured to obtain node configuration information of configuration nodes, wherein there are at least two configuration nodes, and each configuration node includes node configuration information;
  • the configuration information matching module 20 is configured to perform configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
  • the asymmetric encryption module 30 is configured to use the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
  • the block chain recording module 40 is used for recording the public configuration information and the personalized encryption information of each configuration node in the block chain.
  • each node configuration information includes at least one sub-node configuration information, and each sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value;
  • the configuration information matching module 20 includes a feature vector conversion submodule 21, a cluster cluster acquisition submodule 22, a feature vector calculation submodule 23, a target cluster cluster determination submodule 24, and a common The configuration information determining sub-module 25 and the personalized configuration information determining sub-module 26.
  • the feature vector conversion sub-module 21 is configured to perform feature vector conversion on each of the sub-node configuration information to obtain the sub-node feature vector of each of the sub-node configuration information;
  • the cluster cluster obtaining sub-module 22 is configured to perform cluster analysis on the node configuration information using a clustering algorithm based on the sub-node feature vector of each sub-node configuration information, and obtain cluster clusters.
  • the cluster includes the target center point;
  • the feature vector calculation sub-module 23 is configured to calculate the number of feature vectors of sub-nodes in each cluster according to the target center point and a preset distance threshold;
  • the target cluster determining sub-module 24 is configured to determine the target cluster according to the number of feature vectors of the sub-nodes in each cluster;
  • the public configuration information determining submodule 25 is configured to determine the sub-node configuration information corresponding to the target cluster cluster as public configuration information
  • the personalized configuration information determining sub-module 26 is used to determine the configuration information of the sub-nodes of each node configuration information that is different from the public configuration information as the personalized configuration information of each configuration node.
  • the target cluster cluster determination sub-module 24 includes a quantity threshold acquisition unit, a cluster cluster classification unit, and a target cluster cluster constituent unit.
  • a quantity threshold value obtaining unit configured to obtain a preset first quantity threshold value and a preset second quantity threshold value
  • the cluster classification unit is used to determine the cluster cluster whose number of feature vectors of sub-nodes in the cluster cluster meets the first number threshold as a common cluster cluster, and set the number of feature vectors of sub-nodes in the cluster cluster to meet the second number
  • the threshold cluster is determined as the recommended cluster
  • the target cluster cluster forming unit is used to form the common cluster cluster and the recommended cluster cluster into the target cluster cluster.
  • the common configuration information determining submodule 25 includes a same configuration information determining unit, a recommended configuration information determining unit, and a common configuration information forming unit.
  • the same configuration information determining unit is used to determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information.
  • the recommended configuration information determining unit is configured to determine the configuration information of the child nodes corresponding to the recommended cluster cluster as the recommended configuration information.
  • the common configuration information forming unit is used to combine the same configuration information and recommended configuration information into common configuration information.
  • Each module in the above-mentioned block chain-based parameter configuration device can be implemented in whole or in part by software, hardware and a combination thereof.
  • the foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
  • a parameter reconstruction device based on blockchain corresponds to the parameter reconstruction method based on blockchain in the above-mentioned embodiment one to one.
  • the block chain-based parameter reconstruction device includes a node reconstruction request obtaining module 50, a node verification result obtaining module 60, a personalized encryption information obtaining module 70, and a configuration information sending module 80.
  • the detailed description of each functional module is as follows:
  • the node reconstruction request obtaining module 50 is configured to obtain a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
  • the node verification result obtaining module 60 is configured to verify the node verification information to obtain the node verification result;
  • the personalized encrypted information obtaining module 70 is configured to obtain corresponding personalized encrypted information from the blockchain according to the node identifier if the verification result of the node is a successful verification;
  • the configuration information sending module 80 is configured to obtain public configuration information from the blockchain, and send the public configuration information and the personalized encryption information to the configuration node corresponding to the node identifier, where the public configuration information and The personalized encrypted information is obtained by using a parameter configuration method based on blockchain.
  • Each module in the above-mentioned block chain-based parameter reconstruction device can be implemented in whole or in part by software, hardware, and a combination thereof.
  • the foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
  • a computer device is provided.
  • the computer device may be a server, and its internal structure diagram may be as shown in FIG. 10.
  • the computer equipment includes a processor, a memory, a network interface and a database connected through a system bus. Among them, the processor of the computer device is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, computer readable instructions, and a database.
  • the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the database of the computer device is used to store the data used in the blockchain-based parameter configuration method in the above embodiment, or the database of the computer device is used to store the data used in the blockchain-based parameter reconstruction method in the above embodiment Data.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer-readable instruction is executed by the processor to implement a blockchain-based parameter configuration method, or the computer-readable instruction is executed by the processor to implement a blockchain-based parameter reconstruction method.
  • a computer device including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor.
  • the processor executes the computer-readable instructions
  • the blockchain-based parameter configuration method, or the processor executes the computer-readable instructions to implement the blockchain-based parameter reconstruction method in the foregoing embodiment.
  • one or more readable storage media storing computer readable instructions are provided, and when the computer readable instructions are executed by one or more processors, the one or more processors execute The block chain-based parameter configuration method in the foregoing embodiment, or when the computer-readable instructions are executed by one or more processors, cause the one or more processors to execute the block-based The parameter reconstruction method of the chain.
  • the readable storage medium includes a non-volatile readable storage medium and a volatile readable storage medium.
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • ROM read only memory
  • PROM programmable ROM
  • EPROM electrically programmable ROM
  • EEPROM electrically erasable programmable ROM
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Disclosed are a blockchain-based parameter configuration method and apparatus, a blockchain-based parameter reconstruction method and apparatus, a device, and a medium. The blockchain-based parameter configuration method comprises: obtaining the node configuration information of a configuration node; performing configuration information matching on the node configuration information to obtain public configuration information and the personalized configuration information of each configuration node; using a public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node; and finally, recording the public configuration information and the personalized encryption information of each configuration node into a blockchain. The public configuration information and the personalized configuration information of each configuration node are obtained from different node configuration information by means of configuration information matching, and the personalized configuration information is separately encrypted, thereby ensuring the security of the information, finally recording the corresponding information into the blockchain, and better ensuring the stability of data.

Description

基于区块链的参数配置、重构方法、装置、设备及介质Blockchain-based parameter configuration, reconstruction method, device, equipment and medium
本申请以2019年04月26日提交的申请号为201910344995.6,名称为“基于区块链的参数配置、重构方法、装置、设备及介质”的中国发明专利申请为基础,并要求其优先权。This application is based on the Chinese invention patent application filed on April 26, 2019 with the application number 201910344995.6, titled "Blockchain-based parameter configuration, reconstruction method, device, equipment and medium", and claims its priority .
技术领域Technical field
本申请涉及区块链技术领域,尤其涉及一种基于区块链的参数配置、重构方法、装置、设备及介质。This application relates to the field of blockchain technology, and in particular to a method, device, device, and medium for parameter configuration and reconstruction based on blockchain.
背景技术Background technique
现有的统一配置服务产品都是中心化的,各个系统需统一地连接到配置中心服务器中,如果中心化服务器宕机或者出现其他异常,会影响所有的系统的正常使用。而且,如果配置中心服务器数据丢失,则所有系统的数据将都很可能也会丢失,不利于各个系统数据的稳定性。The existing unified configuration service products are centralized, and each system needs to be uniformly connected to the configuration center server. If the centralized server goes down or other abnormalities occur, it will affect the normal use of all systems. Moreover, if the configuration center server data is lost, the data of all systems will likely be lost, which is not conducive to the stability of the data of each system.
发明内容Summary of the invention
本申请实施例提供一种基于区块链的参数配置方法、装置、计算机设备及存储介质,以解决数据稳定性不高的问题。The embodiments of the present application provide a parameter configuration method, device, computer equipment, and storage medium based on blockchain to solve the problem of low data stability.
本申请实施例提供一种基于区块链的参数重构方法、装置、计算机设备及存储介质,以解决节点重构效率不高的问题。The embodiments of the present application provide a method, device, computer equipment, and storage medium for parameter reconstruction based on blockchain to solve the problem of low node reconstruction efficiency.
一种基于区块链的参数配置方法,包括:A parameter configuration method based on blockchain, including:
获取配置节点的节点配置信息,其中,所述配置节点为至少两个,每一所述配置节点包括节点配置信息;Acquiring node configuration information of a configuration node, where there are at least two configuration nodes, and each configuration node includes node configuration information;
对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息;Performing configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
采用每一所述配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一所述配置节点的个性化加密信息;Using the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
将所述公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。The public configuration information and the personalized encryption information of each configuration node are recorded in the blockchain.
一种基于区块链的参数配置装置,包括:A parameter configuration device based on blockchain includes:
节点配置信息获取模块,用于获取配置节点的节点配置信息,其中,所述配置节点为至少两个,每一所述配置节点包括节点配置信息;A node configuration information obtaining module, configured to obtain node configuration information of configuration nodes, where there are at least two configuration nodes, and each configuration node includes node configuration information;
配置信息匹配模块,用于对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息;The configuration information matching module is configured to perform configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
非对称加密模块,用于采用每一所述配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一所述配置节点的个性化加密信息;The asymmetric encryption module is configured to use the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
区块链记录模块,用于将所述公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。The block chain recording module is used to record the public configuration information and the personalized encrypted information of each configuration node in the block chain.
一种基于区块链的参数重构方法,包括:A method of parameter reconstruction based on blockchain, including:
获取节点重构请求,所述节点重构请求包括节点标识和节点验证信息;Acquiring a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
对所述节点验证信息进行验证,得到节点验证结果;Verifying the node verification information to obtain a node verification result;
若所述节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息;If the node verification result is that the verification is passed, obtain corresponding personalized encrypted information from the blockchain according to the node identifier;
从区块链中获取公共配置信息,将所述公共配置信息和所述个性化加密信息发送至所述节点标识对应的配置节点,其中,所述公共配置信息和所述个性化加密信息是采用上述基于区块链的参数配置方法得到的。Obtain public configuration information from the blockchain, and send the public configuration information and the personalized encrypted information to the configuration node corresponding to the node identifier, where the public configuration information and the personalized encrypted information are Obtained from the above parameter configuration method based on blockchain.
一种基于区块链的参数重构装置,包括:A parameter reconstruction device based on blockchain includes:
节点重构请求获取模块,用于获取节点重构请求,所述节点重构请求包括节点标识和节点验证信息;A node reconstruction request obtaining module, configured to obtain a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
节点验证结果获取模块,用于对所述节点验证信息进行验证,得到节点验证结果;Node verification result obtaining module, used to verify the node verification information to obtain the node verification result;
个性化加密信息获取模块,用于若所述节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息;A personalized encrypted information obtaining module, configured to obtain corresponding personalized encrypted information from the blockchain according to the node identifier if the verification result of the node is a successful verification;
配置信息发送模块,用于从区块链中获取公共配置信息,将所述公共配置信息和所述个性化加密信息发送至所述节点标识对应的配置节点,其中,所述公共配置信息和所述个性化加密信息是采用上述基于区块链的参数配置方法得到的 。The configuration information sending module is used to obtain public configuration information from the blockchain, and send the public configuration information and the personalized encryption information to the configuration node corresponding to the node identifier, where the public configuration information and the The personalized encrypted information is obtained by using the above-mentioned blockchain-based parameter configuration method.
一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现上述基于区块链的参数配置方法,或者,所述处理器执行所述计算机可读指令时实现上述基于区块链的参数重构方法。A computer device including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor. The processor implements the above-mentioned blockchain-based Parameter configuration method, or the above-mentioned blockchain-based parameter reconstruction method is implemented when the processor executes the computer-readable instruction.
一个或多个存储有计算机可读指令的可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行上述基于区块链的参数配置方法,或者,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行上述基于区块链的参数重构方法。One or more readable storage media storing computer readable instructions, which when executed by one or more processors, cause the one or more processors to execute the above-mentioned blockchain-based parameter configuration Method, or, when the computer-readable instruction is executed by one or more processors, the one or more processors execute the above-mentioned blockchain-based parameter reconstruction method.
本申请的一个或多个实施例的细节在下面的附图和描述中提出,本申请的其他特征和优点将从说明书、附图以及权利要求变得明显。The details of one or more embodiments of the present application are presented in the following drawings and description, and other features and advantages of the present application will become apparent from the description, drawings and claims.
附图说明Description of the drawings
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to explain the technical solutions of the embodiments of the present application more clearly, the following will briefly introduce the drawings that need to be used in the description of the embodiments of the present application. Obviously, the drawings in the following description are only some embodiments of the present application. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative labor.
图1是本申请一实施例中基于区块链的参数配置方法或基于区块链的参数重构方法的一应用环境示意图;FIG. 1 is a schematic diagram of an application environment of a blockchain-based parameter configuration method or a blockchain-based parameter reconstruction method in an embodiment of the present application;
图2是本申请一实施例中基于区块链的参数配置方法的一示例图;FIG. 2 is an example diagram of a parameter configuration method based on blockchain in an embodiment of the present application;
图3是本申请一实施例中基于区块链的参数配置方法的另一示例图;FIG. 3 is another example diagram of a parameter configuration method based on blockchain in an embodiment of the present application;
图4是本申请一实施例中基于区块链的参数配置方法的另一示例图;FIG. 4 is another example diagram of a parameter configuration method based on blockchain in an embodiment of the present application;
图5是本申请一实施例中基于区块链的参数配置方法的另一示例图;FIG. 5 is another example diagram of a parameter configuration method based on blockchain in an embodiment of the present application;
图6是本申请一实施例中基于区块链的参数重构方法的一示例图;FIG. 6 is an example diagram of a parameter reconstruction method based on blockchain in an embodiment of the present application;
图7是本申请一实施例中基于区块链的参数配置装置的一原理框图;FIG. 7 is a functional block diagram of a parameter configuration device based on blockchain in an embodiment of the present application;
图8是本申请一实施例中基于区块链的参数配置装置的另一原理框图;FIG. 8 is another principle block diagram of a parameter configuration device based on blockchain in an embodiment of the present application;
图9是本申请一实施例中基于区块链的参数重构装置的一原理框图;FIG. 9 is a functional block diagram of a parameter reconstruction device based on blockchain in an embodiment of the present application;
图10是本申请一实施例中计算机设备的一示意图。Fig. 10 is a schematic diagram of a computer device in an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, rather than all of them. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.
本申请实施例提供的基于区块链的参数配置方法,可应用在如图1的应用环境中,其中,客户端(计算机设备)通过网络与服务端进行通信。服务端获取配置节点(客户端)的节点配置信息,其中,配置节点为至少两个,每一配置节点的包括一节点配置信息;对节点配置信息进行配置信息匹配,得到公共配置信息和每一配置节点的个性化配置信息;采用每一配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一配置节点的个性化加密信息;将公共配置信息和每一配置节点的个性化加密信息记录至区块链中。其中,客户端(计算机设备)可以但不限于各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备。服务端可以用独立的服务器或者是多个服务器组成的服务器集群来实现。The block chain-based parameter configuration method provided by the embodiment of the present application can be applied in the application environment as shown in FIG. 1, wherein the client (computer equipment) communicates with the server through the network. The server obtains the node configuration information of the configuration node (client), where there are at least two configuration nodes, and each configuration node includes one node configuration information; the node configuration information is matched with the configuration information to obtain the common configuration information and each Configure the personalized configuration information of the node; use the public key corresponding to each configuration node to asymmetrically encrypt the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node; combine the public configuration information with each configuration node Personalized encrypted information is recorded in the blockchain. Among them, the client (computer equipment) can be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The server can be implemented with an independent server or a server cluster composed of multiple servers.
在一实施例中,如图2所示,提供一种基于区块链的参数配置方法,以该方法应用在图1中的服务端为例进行说明,包括如下步骤:In one embodiment, as shown in FIG. 2, a method for parameter configuration based on blockchain is provided. The method is applied to the server in FIG. 1 as an example for description, including the following steps:
S10:获取配置节点的节点配置信息,其中,配置节点为至少两个,每一配置节点包括节点配置信息。S10: Obtain node configuration information of a configuration node, where there are at least two configuration nodes, and each configuration node includes node configuration information.
其中,每一个配置节点(客户端)对应于一个终端或者系统,每一个终端或者系统通过架设服务器,加入区块链网络,即成为一个节点。而配置节点对应于本实施例中不同配置终端或者系统。在分布式架构中,不同的分布式节点通过一个分布式配置管理平台进行各自参数的配置,完成节点的配置。示例性地,可以通过Diamond、disconf或apollo等开源的配置中心来实现不同配置节点的配置。在每一配置节点中都包括了节点配置信息,节点配置信息包括该节点对应的终端的具体的配置参数的信息。可选地,该节点配置信息可以为XML、YML、json、map等数据格式的文件。Among them, each configuration node (client) corresponds to a terminal or system, and each terminal or system joins the blockchain network by setting up a server to become a node. The configuration nodes correspond to different configuration terminals or systems in this embodiment. In the distributed architecture, different distributed nodes configure their parameters through a distributed configuration management platform to complete the node configuration. Exemplarily, the configuration of different configuration nodes can be implemented through open source configuration centers such as Diamond, disconf, or apollo. Each configuration node includes node configuration information, and the node configuration information includes specific configuration parameter information of the terminal corresponding to the node. Optionally, the node configuration information may be a file in a data format such as XML, YML, json, and map.
S20:对节点配置信息进行配置信息匹配,得到公共配置信息和每一配置节点的个性化配置信息。S20: Perform configuration information matching on node configuration information to obtain public configuration information and personalized configuration information of each configuration node.
在不同配置节点的节点配置信息中,可能会存在部分相同的配置信息,也存在不同的节点配置信息。在该步骤中,通过对节点配置信息进行配置信息匹配,即筛选出所有配置节点中相同的或者具有参考意义的节点信息,作为公共配置信息。并且筛选出每一个配置节点不同于其他节点的配置信息,作为个性化配置信息。具体地,可以将节点配置信息中每一个配置信息在不同的节点配置信息中进行匹配,查看是否在每一个节点配置信息中均存在相同的配置信息。若对于一个配置信息,在不同的节点配置信息中均可以匹配到相同的配置信息,则该配置信息就可以作为公共配置信息。将每个节点配置信息中的每一个配置信息在不同的节点配置信息中进行遍历匹配,然后统计匹配成功的数量。通过匹配成功的数量即可以确定该配置信息是否属于公共配置信息。相对应地,每一节点配置信息中不属于公共配置信息的部分,即为每一配置节点的个性化配置信息。可选地,该匹配方式可以是各种字符串匹配算法或者正则表达式等。In the node configuration information of different configuration nodes, there may be part of the same configuration information and different node configuration information. In this step, by matching the configuration information of the node configuration information, that is, the node information that is the same or has reference significance among all the configuration nodes is screened out as the common configuration information. And filter out the configuration information of each configuration node that is different from other nodes, as personalized configuration information. Specifically, each configuration information in the node configuration information can be matched in different node configuration information to check whether the same configuration information exists in each node configuration information. If, for one piece of configuration information, the same configuration information can be matched in different node configuration information, the configuration information can be used as common configuration information. Each configuration information of each node configuration information is traversed and matched in different node configuration information, and then the number of successful matching is counted. The number of successful matches can be used to determine whether the configuration information belongs to public configuration information. Correspondingly, the part of the configuration information of each node that is not part of the common configuration information is the personalized configuration information of each configuration node. Optionally, the matching method may be various string matching algorithms or regular expressions.
在一个具体实施方式中,也可以将节点配置信息转化为特征向量之后,通过相似度计算算法或者向量距离计算算法来实现配置信息匹配的过程。In a specific embodiment, after the node configuration information is converted into a feature vector, a similarity calculation algorithm or a vector distance calculation algorithm may be used to implement the configuration information matching process.
S30:采用每一配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一配置节点的个性化加密信息。S30: Use the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node.
在该步骤中,通过对每一个配置节点的个性化配置信息进行加密处理,更好地保证了信息的安全性。预先为每一个配置节点分配一对密钥对,包括公钥和私钥。私钥为每一配置节点各自保存。而公钥可以保存在统一的一个服务端或者管理中心。例如,通过一个密钥管理中心(KMC,Key Management Center)来生成每一个配置节点的密钥对。密钥管理中心是公钥基础设施中的一个重要组成部分,负责为认证中心(CA,Certification Authority)系统提供密钥的生成、保存、备份、更新、恢复或查询等密钥服务,以解决分布式企业应用环境中大规模密码技术应用所带来的密钥管理问题。In this step, by encrypting the personalized configuration information of each configuration node, the security of the information is better guaranteed. Pre-allocate a pair of key pairs for each configuration node, including public and private keys. The private key is saved for each configuration node. The public key can be stored in a unified server or management center. For example, a key management center (KMC, Key Management Center) is used to generate a key pair for each configuration node. The key management center is an important part of the public key infrastructure. It is responsible for providing key services such as key generation, storage, backup, update, recovery or query for the certification authority (CA, Certification Authority) system to solve distribution Key management issues brought by large-scale cryptographic technology applications in a distributed enterprise application environment.
在得到每一配置节点的个性化配置信息之后,采用每一配置节点的公钥分别对每一个配置节点的个性化配置信息进行非对称加密,即可得到每一配置节点的 个性化加密信息。该非对称加密可以通过RSA加密算法、Elgamal加密算法、背包算法、Rabin加密算法或者D-H加密算法等实现。After obtaining the personalized configuration information of each configuration node, the public key of each configuration node is used to asymmetrically encrypt the personalized configuration information of each configuration node, and the personalized encryption information of each configuration node can be obtained. The asymmetric encryption can be implemented by RSA encryption algorithm, Elgamal encryption algorithm, knapsack algorithm, Rabin encryption algorithm, or D-H encryption algorithm.
S40:将公共配置信息和每一配置节点的个性化加密信息记录至区块链中。S40: Record the public configuration information and the personalized encryption information of each configuration node in the blockchain.
在该步骤中,将得到的公共配置信息和每一配置节点的个性化加密信息记录至区块链中,即完成参数配置的过程。具体地,服务端可以调用对应的数据传输接口,将公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。In this step, the obtained public configuration information and the personalized encryption information of each configuration node are recorded in the blockchain, which completes the process of parameter configuration. Specifically, the server can call the corresponding data transmission interface to record the public configuration information and the personalized encryption information of each configuration node in the blockchain.
在本实施例中,先获取配置节点的节点配置信息,其中,配置节点为至少两个,每一配置节点的包括一节点配置信息;对节点配置信息进行配置信息匹配,得到公共配置信息和每一配置节点的个性化配置信息;采用每一配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一配置节点的个性化加密信息;最后将公共配置信息和每一配置节点的个性化加密信息记录至区块链中。通过配置信息匹配从不同的节点配置信息中得到公共配置信息和每一配置节点的个性化配置信息;并对个性化配置信息进行分别加密,保证了信息的安全性,并且最终将对应的信息记录至区块链中,更好地保证了数据的稳定性。In this embodiment, first obtain the node configuration information of the configuration node, where there are at least two configuration nodes, and each configuration node includes one node configuration information; the node configuration information is matched with the configuration information to obtain the common configuration information and each configuration node. 1. Configure the personalized configuration information of the node; use the public key corresponding to each configuration node to asymmetrically encrypt the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node; finally combine the public configuration information with each configuration The personalized encrypted information of the node is recorded in the blockchain. Through configuration information matching, obtain the public configuration information and the personalized configuration information of each configuration node from different node configuration information; and separately encrypt the personalized configuration information to ensure the security of the information, and finally record the corresponding information In the blockchain, the stability of data is better guaranteed.
在一个实施例中,每一节点配置信息包括至少一个子节点配置信息,且每一子节点配置信息包括配置参数名和对应的配置参数值。In one embodiment, each node configuration information includes at least one sub-node configuration information, and each sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value.
在节点配置信息中,包括至少一个子节点配置信息,而每一子节点配置信息则代表每一项需要配置的参数,每一子节点配置信息包括配置参数名和对应的配置参数值。例如,配置参数名可以为项目名称、项目类别、端口和IP地址等。而配置参数值就是配置参数名对应的具体内容。可选地,子节点配置信息可以由键值对(key-value)的形式构成,即配置参数名为key,而配置参数值为value。The node configuration information includes at least one sub-node configuration information, and each sub-node configuration information represents each parameter that needs to be configured, and each sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value. For example, the configuration parameter name can be the project name, project category, port, and IP address. The configuration parameter value is the specific content corresponding to the configuration parameter name. Optionally, the child node configuration information may be formed in the form of key-value pairs, that is, the configuration parameter name is key and the configuration parameter value is value.
在本实施例中,如图3所示,对节点配置信息进行配置信息匹配,得到公共配置信息和每一配置节点的个性化配置信息,包括:In this embodiment, as shown in FIG. 3, the configuration information matching is performed on the node configuration information to obtain the common configuration information and the personalized configuration information of each configuration node, including:
S21:对每一子节点配置信息进行特征向量转化,得到每一子节点配置信息的子节点特征向量。S21: Perform feature vector transformation on each sub-node configuration information to obtain the sub-node feature vector of each sub-node configuration information.
对节点配置信息中的每一子节点配置信息进行特征向量转化,得到每一子节点 配置信息的子节点特征向量。具体地,可以预设一个基准特征向量表,为已有的配置参数名和对应的配置参数值设置对应的数值,并且不同的配置参数名以及不同的配置参数值均具有唯一数值。然后根据该基准特征向量表将每一子节点配置信息进行特征向量转化。Perform feature vector transformation on each sub-node configuration information in the node configuration information to obtain the sub-node feature vector of each sub-node configuration information. Specifically, a reference feature vector table can be preset to set corresponding values for existing configuration parameter names and corresponding configuration parameter values, and different configuration parameter names and different configuration parameter values have unique values. Then, according to the reference feature vector table, the configuration information of each child node is transformed into feature vectors.
可选地,可以分别将每一子节点配置信息中的配置参数名和对应的配置参数值分别进行词向量的转化,得到每一子节点配置信息的子节点特征向量。具体地,可以采用word2vec工具实现词向量的转化。Optionally, the configuration parameter name and the corresponding configuration parameter value in the configuration information of each sub-node may be respectively converted into word vectors to obtain the sub-node feature vector of each sub-node configuration information. Specifically, the word2vec tool can be used to implement word vector conversion.
S22:基于每一子节点配置信息的子节点特征向量,将节点配置信息采用聚类算法进行聚类分析,获取聚类簇,每一聚类簇包括目标中心点。S22: Based on the sub-node feature vector of each sub-node configuration information, cluster analysis is performed on the node configuration information using a clustering algorithm to obtain clusters, each of which includes a target center point.
其中,聚类分析又称群分析,它是研究(样品或指标)分类问题的一种统计分析方法,同时也是数据挖掘的一个重要分析方法。可选地,可以采用k-means据类算法进行聚类分析,获取聚类簇。具体地,根据子节点配置信息的数量设定K值,并设定每个聚类簇的初始中心点。示例性地,以子节点配置信息中的配置参数名来设置聚类簇。当所有点(子节点配置信息)都分配完毕后,对这个聚类簇中的所有点重新计算(例如计算平均值)得到该簇的新的中心点,即计算相同配置参数名中对应的配置参数值之间的向量距离。然后再通过迭代的方式进行分配中心点和更新聚类簇的中心点的步骤,直至聚类簇的中心点的变化很小,或者达到指定的迭代次数,然后获取此时的聚类簇和每一聚类簇对应的目标中心点。Among them, cluster analysis is also called group analysis. It is a statistical analysis method for studying (sample or index) classification problems, and it is also an important analysis method for data mining. Optionally, the k-means classification algorithm may be used to perform cluster analysis to obtain clusters. Specifically, the K value is set according to the number of child node configuration information, and the initial center point of each cluster is set. Exemplarily, the cluster cluster is set with the configuration parameter name in the child node configuration information. When all points (sub-node configuration information) are allocated, recalculate all points in the cluster (for example, calculate the average value) to obtain the new center point of the cluster, that is, calculate the corresponding configuration in the same configuration parameter name The vector distance between parameter values. Then iteratively assign the center point and update the center point of the cluster cluster until the center point of the cluster cluster changes little or reaches the specified number of iterations, and then obtain the cluster cluster and each cluster at this time. The target center point corresponding to a cluster.
S23:根据目标中心点和预设的距离阈值,计算每一聚类簇中子节点特征向量的数量。S23: Calculate the number of feature vectors of sub-nodes in each cluster according to the target center point and the preset distance threshold.
其中,距离阈值为预先设定的一个数值,具体可以根据不同的距离算法来配置不同的距离阈值。在该步骤中,根据目标中心点和预设的距离阈值,计算每一聚类簇中子节点特征向量的数量具体可以为:先计算一个聚类簇中每一个子节点配置信息和目标中心点的向量距离,再将该向量距离和距离阈值进行比较,若向量距离小于该距离阈值,则该子节点配置信息对应的子节点特征向量就属于该聚类簇。再计算属于该聚类簇的子节点特征向量的数量即可得到每一聚类簇中子节点特征向量的数量。可选地,该向量距离可以采用欧式距离算法、曼 哈顿距离算法、切比雪夫距离算法或者闵可夫斯基距离算法等计算得到。Among them, the distance threshold is a preset value, and different distance thresholds can be configured according to different distance algorithms. In this step, according to the target center point and the preset distance threshold, the calculation of the number of feature vectors of the child nodes in each cluster can be specifically as follows: first calculate the configuration information of each child node in a cluster and the target center point Then, compare the vector distance with the distance threshold. If the vector distance is less than the distance threshold, the feature vector of the child node corresponding to the child node configuration information belongs to the cluster. Then calculate the number of feature vectors of child nodes belonging to the cluster to get the number of feature vectors of child nodes in each cluster. Optionally, the vector distance can be calculated using Euclidean distance algorithm, Manhatten distance algorithm, Chebyshev distance algorithm or Minkowski distance algorithm.
S24:根据每一聚类簇中子节点特征向量的数量确定目标聚类簇。S24: Determine the target cluster according to the number of feature vectors of the child nodes in each cluster.
在该步骤中,通过每一聚类簇中子节点特征向量的数量来确定目标聚类簇。具体地,可以根据配置节点的数量来衡量。示例性地,若配置节点地数量为N,则将聚类簇中子节点特征向量的数量为N的聚类簇确定为目标聚类簇。或者,将聚类簇中子节点特征向量的数量达到N的预设比例值的聚类簇确定为目标聚类簇。示例性地,该预设比例值可以为95%、90%、85%或者80%等。进一步地,可以设定不同的数量区间,从而对目标聚类簇进行进一步的分类。每一类型的目标聚类簇的数量区间不同。具体地分类标准可以根据具体的配置需求而设定,在此不进行限定。In this step, the target cluster is determined by the number of feature vectors of the child nodes in each cluster. Specifically, it can be measured according to the number of configured nodes. Exemplarily, if the number of configuration nodes is N, the cluster cluster whose number of feature vectors of the child nodes in the cluster cluster is N is determined as the target cluster cluster. Alternatively, a cluster cluster in which the number of feature vectors of child nodes in the cluster cluster reaches a preset ratio value of N is determined as the target cluster cluster. Exemplarily, the preset ratio value may be 95%, 90%, 85%, 80%, etc. Further, different number intervals can be set to further classify the target clusters. Each type of target cluster has a different number interval. The specific classification criteria can be set according to specific configuration requirements, and are not limited here.
S25:将目标聚类簇对应的子节点配置信息确定为公共配置信息。S25: Determine the configuration information of the child nodes corresponding to the target cluster as the common configuration information.
在得到目标聚类簇之后,将目标聚类簇对应的子节点配置信息确定为公共配置信息。After the target cluster is obtained, the configuration information of the child nodes corresponding to the target cluster is determined as the common configuration information.
S26:将每一节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。S26: Determine the configuration information of the child nodes in the configuration information of each node that is different from the common configuration information as the personalized configuration information of each configuration node.
确定公共配置信息之后,将每一个节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。具体地,可以根据公共配置信息中的配置参数名来从每一节点配置信息中筛选,将每一配置节点的节点配置信息中和公共配置信息中的配置参数名不同的子节点配置信息确定为每一配置节点的个性化配置信息。After the public configuration information is determined, the configuration information of the child nodes in each node configuration information that is different from the public configuration information is determined as the personalized configuration information of each configuration node. Specifically, the configuration information of each node can be filtered according to the configuration parameter name in the public configuration information, and the configuration information of the child node with a different configuration parameter name in the node configuration information of each configuration node and the configuration parameter name in the public configuration information can be determined as Personalized configuration information for each configuration node.
在本实施例中,先对每一子节点配置信息进行特征向量转化,得到每一子节点配置信息的子节点特征向量;再基于每一子节点配置信息的子节点特征向量,将节点配置信息采用聚类算法进行聚类分析,获取聚类簇,每一聚类簇包括目标中心点;根据目标中心点和预设的距离阈值,计算每一聚类簇中子节点特征向量的数量;根据每一聚类簇中子节点特征向量的数量确定目标聚类簇;将目标聚类簇对应的子节点配置信息确定为公共配置信息;并且将每一节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。通过上述步骤确定公共配置信息和每一所述配置节点的个性化配置信息 ,保证了上述配置信息确定的效率和准确性。In this embodiment, the feature vector transformation of each sub-node configuration information is first performed to obtain the sub-node feature vector of each sub-node configuration information; then based on the sub-node feature vector of each sub-node configuration information, the node configuration information Use clustering algorithm for cluster analysis to obtain clusters, each cluster includes the target center point; according to the target center point and the preset distance threshold, calculate the number of sub-node feature vectors in each cluster; The number of sub-node feature vectors in each cluster determines the target cluster; the configuration information of the sub-nodes corresponding to the target cluster is determined as the common configuration information; and the sub-nodes in the configuration information of each node are different from the common configuration information. The node configuration information is determined as the personalized configuration information of each configuration node. The determination of the public configuration information and the personalized configuration information of each configuration node through the above steps ensures the efficiency and accuracy of the above configuration information determination.
在一个实施例中,如图4所示,根据每一聚类簇中子节点特征向量的数量确定目标聚类簇,包括:In one embodiment, as shown in FIG. 4, determining the target cluster cluster according to the number of feature vectors of the child nodes in each cluster cluster includes:
S241:获取预设的第一数量阈值和预设的第二数量阈值。S241: Acquire a preset first quantity threshold and a preset second quantity threshold.
预先设定第一数量阈值和第二数量阈值两个不同的阈值,以为目标聚类簇进行具体地分类。该第一数量阈值和第二数量阈值可以根据配置节点的数量来设定。若配置节点的数量为N,示例性地,设置第一数量阈值的数量为N,第二数量阈值的数量为0.8N。可以理解地,第一数量阈值和第二数量阈值可以根据实际需要进行调整。优选地,第一数量阈值大于第二数量阈值。Two different thresholds, the first number threshold and the second number threshold, are preset in order to specifically classify the target cluster. The first number threshold and the second number threshold can be set according to the number of configuration nodes. If the number of configuration nodes is N, for example, the number of the first number threshold is set to N, and the number of the second number threshold is 0.8N. Understandably, the first number threshold and the second number threshold can be adjusted according to actual needs. Preferably, the first number threshold is greater than the second number threshold.
S242:将聚类簇中子节点特征向量的数量满足第一数量阈值的聚类簇确定为公共聚类簇,将聚类簇中子节点特征向量的数量满足第二数量阈值的聚类簇确定为推荐聚类簇。S242: Determine cluster clusters whose number of feature vectors of child nodes in the cluster cluster meets the first number threshold as a common cluster cluster, and determine cluster clusters whose number of feature vectors of child nodes in the cluster cluster meets the second number threshold It is recommended to cluster clusters.
在该步骤中,分别根据第一数量阈值和第二数量阈值来确定公共聚类簇和推荐聚类簇。具体地,可以先判断每一聚类簇中子节点特征向量的数量是否满足第一数量阈值,若满足第一数量阈值,则将对应的聚类簇确定为公共聚类簇。若不满足第一数量阈值,则进一步判断该聚类簇中子节点特征向量的数量是否满足第二数量阈值,若满足第二数量阈值,则将对应的聚类簇确定为推荐聚类簇。具体地,每一聚类簇中子节点特征向量的数量是否满足第一数量阈值或第二数量阈值可以为每一聚类簇中子节点特征向量的数量是否大于等于对应的数量阈值。In this step, the common cluster cluster and the recommended cluster cluster are determined according to the first number threshold and the second number threshold, respectively. Specifically, it may be judged first whether the number of feature vectors of the child nodes in each cluster meets the first number threshold, and if the first number threshold is met, the corresponding cluster is determined as a common cluster cluster. If the first number threshold is not met, it is further determined whether the number of feature vectors of the child nodes in the cluster meets the second number threshold, and if the second number threshold is met, the corresponding cluster is determined as the recommended cluster. Specifically, whether the number of sub-node feature vectors in each cluster meets the first number threshold or the second number threshold may be whether the number of sub-node feature vectors in each cluster is greater than or equal to the corresponding number threshold.
优选地,也可以直接判断聚类簇中子节点特征向量的数量和第一数量阈值以及第二数量阈值的关系来直接为每一聚类簇进行分类。Preferably, it is also possible to directly determine the relationship between the number of feature vectors of the child nodes in the cluster and the first number threshold and the second number threshold to directly classify each cluster.
S243:将公共聚类簇和推荐聚类簇组成目标聚类簇。S243: Combine the public cluster cluster and the recommended cluster cluster to form a target cluster cluster.
在得到公共聚类簇和推荐聚类簇之后,将公共聚类簇和推荐聚类簇组成目标聚类簇。After obtaining the public cluster cluster and the recommended cluster cluster, the public cluster cluster and the recommended cluster cluster are formed into the target cluster cluster.
在本实施例中,先获取获取预设的第一数量阈值和第二数量阈值,再将聚类簇中子节点特征向量的数量满足第一数量阈值的聚类簇确定为公共聚类簇,将聚类簇中子节点特征向量的数量满足第二数量阈值的聚类簇确定为推荐聚类簇; 最后将公共聚类簇和推荐聚类簇组成目标聚类簇。通过不同的数量阈值为目标聚类簇划分不同的聚类簇类型,以更好地适配不同的配置参数类型,提高了参数配置的灵活性。In this embodiment, first obtain the preset first number threshold and second number threshold, and then determine the cluster cluster whose number of feature vectors of the child nodes in the cluster cluster meets the first number threshold as a common cluster cluster. The cluster cluster whose number of feature vectors of the child nodes in the cluster cluster meets the second number threshold is determined as the recommended cluster cluster; finally, the common cluster cluster and the recommended cluster cluster form the target cluster cluster. Different number thresholds are used to divide the target cluster cluster into different cluster cluster types to better adapt to different configuration parameter types and improve the flexibility of parameter configuration.
在一个实施例中,如图5所示,将目标聚类簇对应的子节点配置信息确定为公共配置信息,包括:In one embodiment, as shown in FIG. 5, determining the configuration information of the child nodes corresponding to the target cluster cluster as the common configuration information includes:
S251:将公共聚类簇对应的子节点配置信息确定为相同配置信息。S251: Determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information.
S252:将推荐聚类簇对应的子节点配置信息确定为推荐配置信息。S252: Determine the child node configuration information corresponding to the recommended cluster as the recommended configuration information.
S253:将相同配置信息和推荐配置信息组成公共配置信息。S253: Combine the same configuration information and recommended configuration information into common configuration information.
在该实施例中,将目标聚类簇中公共聚类簇对应的子节点配置信息确定为相同配置信息,推荐聚类簇对应的子节点配置信息确定为推荐配置信息,再将相同配置信息和推荐配置信息组成公共配置信息,实现从聚类簇到配置信息的转化。可以理解地,相同配置信息为不同配置节点中内容都相同的配置信息,而推荐配置信息为大部分配置节点中内容都相同的配置信息。在存在新的节点要进行参数配置时,通过相同配置信息和推荐配置信息可以更快地帮助该节点完成参数的配置过程,可以提高参数配置的效率。In this embodiment, the configuration information of the child nodes corresponding to the common cluster cluster in the target cluster is determined to be the same configuration information, the configuration information of the child nodes corresponding to the recommended cluster cluster is determined to be the recommended configuration information, and the same configuration information and It is recommended that the configuration information composes the common configuration information to realize the transformation from clusters to configuration information. Understandably, the same configuration information is configuration information with the same content in different configuration nodes, and the recommended configuration information is configuration information with the same content in most configuration nodes. When there is a new node for parameter configuration, the same configuration information and recommended configuration information can help the node to complete the parameter configuration process faster, and can improve the efficiency of parameter configuration.
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that the size of the sequence number of each step in the foregoing embodiment does not mean the order of execution. The execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation to the implementation process of the embodiment of the present application.
本申请实施例还提供一种基于区块链的参数重构方法,也可应用在如图1的应用环境中,其中,客户端(计算机设备)通过网络与服务端进行通信。其中,客户端(计算机设备)可以但不限于各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备。服务端可以用独立的服务器或者是多个服务器组成的服务器集群来实现。如图6所示,以该方法应用在图1中的服务端为例进行说明,包括如下步骤:The embodiment of the present application also provides a parameter reconstruction method based on the blockchain, which can also be applied in the application environment as shown in FIG. 1, in which the client (computer equipment) communicates with the server through the network. Among them, the client (computer equipment) can be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The server can be implemented with an independent server or a server cluster composed of multiple servers. As shown in Figure 6, the method is applied to the server in Figure 1 as an example for description, including the following steps:
S50:获取节点重构请求,节点重构请求包括节点标识和节点验证信息。S50: Obtain a node reconstruction request, where the node reconstruction request includes node identification and node verification information.
其中,节点重构请求为一个配置节点需要进行节点重构的触发请求。具体地,一个配置节点需要重新初始化或者一个配置节点崩溃或者出现问题之后需要进行节点重构时可以发起该节点重构请求。对应的配置节点触发该节点重构请求 之后,将该节点重构请求发送至服务端,服务端即获取到该节点重构请求。节点重构请求包括节点标识和节点验证信息。节点标识为区分不同配置节点的标识。该节点标识可以由数字、字母、中文或符号中的至少一项组成。节点验证信息为对该配置节点的权限或者身份的验证信息,以更好地保证信息的安全性。具体地,节点验证信息可以通过预先注册的账号和密码的方式来体现,或者通过数字证书的方式来体现。Among them, the node reconstruction request is a trigger request for a configuration node to perform node reconstruction. Specifically, when a configuration node needs to be re-initialized, or a configuration node crashes or has a problem, the node reconstruction request can be initiated when the node reconstruction is required. After the corresponding configuration node triggers the node reconstruction request, the node reconstruction request is sent to the server, and the server obtains the node reconstruction request. The node reconstruction request includes node identification and node verification information. The node identifier is an identifier to distinguish different configuration nodes. The node identification can be composed of at least one of numbers, letters, Chinese, or symbols. The node verification information is verification information for the authority or identity of the configured node to better ensure the security of the information. Specifically, the node verification information may be embodied in the form of a pre-registered account and password, or embodied in the form of a digital certificate.
S60:对节点验证信息进行验证,得到节点验证结果。S60: Verify the node verification information to obtain a node verification result.
在该步骤中,通过对节点验证信息进行验证,以得到节点验证结果。具体地,若该节点验证信息为账号信息,则可以根据预存的标准账号信息对节点验证信息进行一致性验证,若两者一致,节点验证结果为验证通过。反之,节点验证结果为不通过。若该节点验证信息为数字证数,则可以预设一CA(Certificate Authority)节点来对该节点验证信息进行验证,以得到对应的节点验证结果。可选地,节点验证结果包括验证通过和验证未通过。In this step, the node verification information is verified to obtain the node verification result. Specifically, if the node verification information is account information, the consistency verification of the node verification information can be performed according to the pre-stored standard account information, and if the two are consistent, the node verification result is the verification passed. Otherwise, the node verification result is not passed. If the node verification information is a digital certificate number, a CA (Certificate Authority) node can be preset to verify the node verification information to obtain the corresponding node verification result. Optionally, the node verification result includes verification passed and verification failed.
S70:若节点验证结果为验证通过,则根据节点标识从区块链中获取对应的个性化加密信息。S70: If the verification result of the node is that the verification is passed, obtain corresponding personalized encrypted information from the blockchain according to the node identifier.
若节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息。具体地,区块链中包含了每一配置节点的个性化加密信息,而不同的个性化加密信息可以通过节点标识进行查询,即个性化加密信息是和对应的节点标识关联存储的。If the node verification result is that the verification is passed, the corresponding personalized encrypted information is obtained from the blockchain according to the node identifier. Specifically, the blockchain contains the personalized encrypted information of each configuration node, and different personalized encrypted information can be queried through the node ID, that is, the personalized encrypted information is stored in association with the corresponding node ID.
在一个具体实施方式中,若节点验证结果为验证不通过,则发出提示信息。通过发出提示信息至对应的配置节点,以进行更好地提醒。In a specific implementation, if the node verification result is that the verification fails, a prompt message is issued. By sending a prompt message to the corresponding configuration node, to give a better reminder.
S80:从区块链中获取公共配置信息,将公共配置信息和个性化加密信息发送至节点标识对应的配置节点,其中,公共配置信息和个性化加密信息是采用基于区块链的参数配置方法得到的。S80: Obtain public configuration information from the blockchain, and send the public configuration information and personalized encrypted information to the configuration node corresponding to the node ID, where the public configuration information and personalized encrypted information adopt a blockchain-based parameter configuration method owned.
进一步地,从区块链中获取公共配置信息,并将公共配置信息和个性化加密信息发送至节点标识对应的配置节点中,完成该配置节点的配置参数的发放。其中,公共配置信息和个性化加密信息是采用上述实施例中基于区块链的参数配置方法得到的。Further, the public configuration information is obtained from the blockchain, and the public configuration information and the personalized encryption information are sent to the configuration node corresponding to the node identifier, to complete the issuance of the configuration parameters of the configuration node. Among them, the public configuration information and the personalized encryption information are obtained by using the blockchain-based parameter configuration method in the foregoing embodiment.
优选地,该配置节点在得到个性化加密信息之后,通过该配置节点的私钥对个性化加密信息进行解密,即可得到该配置节点的个性化配置信息,从而根据公共配置信息和个性化配置信息得到该配置节点的完整配置信息,以供后续高效地完成节点的重构。Preferably, after the configuration node obtains the personalized encrypted information, it decrypts the personalized encrypted information through the private key of the configuration node to obtain the personalized configuration information of the configuration node, so as to be based on the public configuration information and the personalized configuration The information obtains the complete configuration information of the configuration node for subsequent efficient completion of node reconstruction.
在本实施例中,在获取节点重构请求之后,对节点验证信息进行验证,得到节点验证结果;若节点验证结果为验证通过,则根据节点标识从区块链中获取对应的个性化加密信息;从区块链中获取公共配置信息,将公共配置信息和个性化加密信息发送至节点标识对应的节点,其中,公共配置信息和个性化加密信息是采用上述基于区块链的参数配置方法得到的。通过从区块链中获取公共配置信息和个性化加密信息来快速完成节点重构的配置参数的获取,避免配置参数的遗失,提高了节点重构的效率。In this embodiment, after obtaining the node reconstruction request, the node verification information is verified to obtain the node verification result; if the node verification result is the verification passed, the corresponding personalized encrypted information is obtained from the blockchain according to the node identification ; Obtain public configuration information from the blockchain, and send the public configuration information and personalized encrypted information to the node corresponding to the node ID, where the public configuration information and personalized encrypted information are obtained using the above-mentioned blockchain-based parameter configuration method of. By obtaining public configuration information and personalized encryption information from the blockchain, the configuration parameters for node reconstruction can be quickly obtained, avoiding the loss of configuration parameters, and improving the efficiency of node reconstruction.
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that the size of the sequence number of each step in the foregoing embodiment does not mean the order of execution. The execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation to the implementation process of the embodiment of the present application.
在一实施例中,提供一种基于区块链的参数配置装置,该基于区块链的参数配置装置与上述实施例中基于区块链的参数配置方法一一对应。如图7所示,该基于区块链的参数配置装置包括节点配置信息获取模块10、配置信息匹配模块20、非对称加密模块30和区块链记录模块40。各功能模块详细说明如下:In one embodiment, a block chain-based parameter configuration device is provided, and the block chain-based parameter configuration device corresponds to the block chain-based parameter configuration method in the foregoing embodiment in a one-to-one correspondence. As shown in FIG. 7, the block chain-based parameter configuration device includes a node configuration information acquisition module 10, a configuration information matching module 20, an asymmetric encryption module 30 and a blockchain recording module 40. The detailed description of each functional module is as follows:
节点配置信息获取模块10,用于获取配置节点的节点配置信息,其中,所述配置节点为至少两个,每一所述配置节点包括节点配置信息;The node configuration information obtaining module 10 is configured to obtain node configuration information of configuration nodes, wherein there are at least two configuration nodes, and each configuration node includes node configuration information;
配置信息匹配模块20,用于对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息;The configuration information matching module 20 is configured to perform configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
非对称加密模块30,用于采用每一所述配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一所述配置节点的个性化加密信息;The asymmetric encryption module 30 is configured to use the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
区块链记录模块40,用于将所述公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。The block chain recording module 40 is used for recording the public configuration information and the personalized encryption information of each configuration node in the block chain.
优选地,每一节点配置信息包括至少一个子节点配置信息,且每一子节点配置信息包括配置参数名和对应的配置参数值;Preferably, each node configuration information includes at least one sub-node configuration information, and each sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value;
在本实施例中,如图8所示,配置信息匹配模块20包括特征向量转化子模块21、聚类簇获取子模块22、特征向量计算子模块23、目标聚类簇确定子模块24、公共配置信息确定子模块25和个性化配置信息确定子模块26。In this embodiment, as shown in FIG. 8, the configuration information matching module 20 includes a feature vector conversion submodule 21, a cluster cluster acquisition submodule 22, a feature vector calculation submodule 23, a target cluster cluster determination submodule 24, and a common The configuration information determining sub-module 25 and the personalized configuration information determining sub-module 26.
特征向量转化子模块21,用于对每一所述子节点配置信息进行特征向量转化,得到每一所述子节点配置信息的子节点特征向量;The feature vector conversion sub-module 21 is configured to perform feature vector conversion on each of the sub-node configuration information to obtain the sub-node feature vector of each of the sub-node configuration information;
聚类簇获取子模块22,用于基于每一所述子节点配置信息的所述子节点特征向量,将节点配置信息采用聚类算法进行聚类分析,获取聚类簇,每一所述聚类簇包括目标中心点;The cluster cluster obtaining sub-module 22 is configured to perform cluster analysis on the node configuration information using a clustering algorithm based on the sub-node feature vector of each sub-node configuration information, and obtain cluster clusters. The cluster includes the target center point;
特征向量计算子模块23,用于根据所述目标中心点和预设的距离阈值,计算每一所述聚类簇中子节点特征向量的数量;The feature vector calculation sub-module 23 is configured to calculate the number of feature vectors of sub-nodes in each cluster according to the target center point and a preset distance threshold;
目标聚类簇确定子模块24,用于根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇;The target cluster determining sub-module 24 is configured to determine the target cluster according to the number of feature vectors of the sub-nodes in each cluster;
公共配置信息确定子模块25,用于将所述目标聚类簇对应的子节点配置信息确定为公共配置信息;The public configuration information determining submodule 25 is configured to determine the sub-node configuration information corresponding to the target cluster cluster as public configuration information;
个性化配置信息确定子模块26,用于将每一所述节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。The personalized configuration information determining sub-module 26 is used to determine the configuration information of the sub-nodes of each node configuration information that is different from the public configuration information as the personalized configuration information of each configuration node.
优选地,目标聚类簇确定子模块24包括数量阈值获取单元、聚类簇分类单元和目标聚类簇组成单元。Preferably, the target cluster cluster determination sub-module 24 includes a quantity threshold acquisition unit, a cluster cluster classification unit, and a target cluster cluster constituent unit.
数量阈值获取单元,用于获取预设的第一数量阈值和预设的第二数量阈值;A quantity threshold value obtaining unit, configured to obtain a preset first quantity threshold value and a preset second quantity threshold value;
聚类簇分类单元,用于将聚类簇中子节点特征向量的数量满足第一数量阈值的聚类簇确定为公共聚类簇,将聚类簇中子节点特征向量的数量满足第二数量阈值的聚类簇确定为推荐聚类簇;The cluster classification unit is used to determine the cluster cluster whose number of feature vectors of sub-nodes in the cluster cluster meets the first number threshold as a common cluster cluster, and set the number of feature vectors of sub-nodes in the cluster cluster to meet the second number The threshold cluster is determined as the recommended cluster;
目标聚类簇组成单元,用于将公共聚类簇和推荐聚类簇组成目标聚类簇。The target cluster cluster forming unit is used to form the common cluster cluster and the recommended cluster cluster into the target cluster cluster.
优选地,公共配置信息确定子模块25包括相同配置信息确定单元、推荐配置信息确定单元和公共配置信息组成单元。Preferably, the common configuration information determining submodule 25 includes a same configuration information determining unit, a recommended configuration information determining unit, and a common configuration information forming unit.
相同配置信息确定单元,用于将公共聚类簇对应的子节点配置信息确定为相同配置信息。The same configuration information determining unit is used to determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information.
推荐配置信息确定单元,用于将推荐聚类簇对应的子节点配置信息确定为推荐 配置信息。The recommended configuration information determining unit is configured to determine the configuration information of the child nodes corresponding to the recommended cluster cluster as the recommended configuration information.
公共配置信息组成单元,用于将相同配置信息和推荐配置信息组成公共配置信息。The common configuration information forming unit is used to combine the same configuration information and recommended configuration information into common configuration information.
关于基于区块链的参数配置装置的具体限定可以参见上文中对于基于区块链的参数配置方法的限定,在此不再赘述。上述基于区块链的参数配置装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。Regarding the specific limitation of the parameter configuration device based on the blockchain, please refer to the above limitation on the parameter configuration method based on the blockchain, which will not be repeated here. Each module in the above-mentioned block chain-based parameter configuration device can be implemented in whole or in part by software, hardware and a combination thereof. The foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
在一实施例中,提供一种基于区块链的参数重构装置,该基于区块链的参数重构装置与上述实施例中基于区块链的参数重构方法一一对应。如图9所示,该基于区块链的参数重构装置包括节点重构请求获取模块50、节点验证结果获取模块60、个性化加密信息获取模块70和配置信息发送模块80。各功能模块详细说明如下:In one embodiment, a parameter reconstruction device based on blockchain is provided, and the parameter reconstruction device based on blockchain corresponds to the parameter reconstruction method based on blockchain in the above-mentioned embodiment one to one. As shown in FIG. 9, the block chain-based parameter reconstruction device includes a node reconstruction request obtaining module 50, a node verification result obtaining module 60, a personalized encryption information obtaining module 70, and a configuration information sending module 80. The detailed description of each functional module is as follows:
节点重构请求获取模块50,用于获取节点重构请求,所述节点重构请求包括节点标识和节点验证信息;The node reconstruction request obtaining module 50 is configured to obtain a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
节点验证结果获取模块60,用于对所述节点验证信息进行验证,得到节点验证结果;The node verification result obtaining module 60 is configured to verify the node verification information to obtain the node verification result;
个性化加密信息获取模块70,用于若所述节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息;The personalized encrypted information obtaining module 70 is configured to obtain corresponding personalized encrypted information from the blockchain according to the node identifier if the verification result of the node is a successful verification;
配置信息发送模块80,用于从区块链中获取公共配置信息,将所述公共配置信息和所述个性化加密信息发送至所述节点标识对应的配置节点,其中,所述公共配置信息和所述个性化加密信息是采用基于区块链的参数配置方法得到的。The configuration information sending module 80 is configured to obtain public configuration information from the blockchain, and send the public configuration information and the personalized encryption information to the configuration node corresponding to the node identifier, where the public configuration information and The personalized encrypted information is obtained by using a parameter configuration method based on blockchain.
关于基于区块链的参数重构装置的具体限定可以参见上文中对于基于区块链的参数重构方法的限定,在此不再赘述。上述基于区块链的参数重构装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。Regarding the specific limitation of the parameter reconstruction device based on the blockchain, please refer to the above limitation on the parameter reconstruction method based on the blockchain, which will not be repeated here. Each module in the above-mentioned block chain-based parameter reconstruction device can be implemented in whole or in part by software, hardware, and a combination thereof. The foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
在一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内 部结构图可以如图10所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的数据库用于存储上述实施例中基于区块链的参数配置方法所使用到的数据,或者该计算机设备的数据库用于存储上述实施例中基于区块链的参数重构方法所使用到的数据。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种基于区块链的参数配置方法,或者该计算机可读指令被处理器执行时以实现一种基于区块链的参数重构方法。In one embodiment, a computer device is provided. The computer device may be a server, and its internal structure diagram may be as shown in FIG. 10. The computer equipment includes a processor, a memory, a network interface and a database connected through a system bus. Among them, the processor of the computer device is used to provide calculation and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer readable instructions, and a database. The internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium. The database of the computer device is used to store the data used in the blockchain-based parameter configuration method in the above embodiment, or the database of the computer device is used to store the data used in the blockchain-based parameter reconstruction method in the above embodiment Data. The network interface of the computer device is used to communicate with an external terminal through a network connection. The computer-readable instruction is executed by the processor to implement a blockchain-based parameter configuration method, or the computer-readable instruction is executed by the processor to implement a blockchain-based parameter reconstruction method.
在一个实施例中,提供了一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机可读指令,处理器执行计算机可读指令时实现上述实施例中的基于区块链的参数配置方法,或者,处理器执行计算机可读指令时实现上述实施例中的基于区块链的参数重构方法。In one embodiment, a computer device is provided, including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor. When the processor executes the computer-readable instructions, The blockchain-based parameter configuration method, or the processor executes the computer-readable instructions to implement the blockchain-based parameter reconstruction method in the foregoing embodiment.
在一个实施例中,提供了一个或多个存储有计算机可读指令的可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行上述实施例中的基于区块链的参数配置方法,或者,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行上述实施例中的基于区块链的参数重构方法。其中,所述可读存储介质包括非易失性可读存储介质和易失性可读存储介质。In one embodiment, one or more readable storage media storing computer readable instructions are provided, and when the computer readable instructions are executed by one or more processors, the one or more processors execute The block chain-based parameter configuration method in the foregoing embodiment, or when the computer-readable instructions are executed by one or more processors, cause the one or more processors to execute the block-based The parameter reconstruction method of the chain. Wherein, the readable storage medium includes a non-volatile readable storage medium and a volatile readable storage medium.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为 说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。A person of ordinary skill in the art can understand that all or part of the processes in the above-mentioned embodiment methods can be implemented by instructing relevant hardware through computer-readable instructions, which can be stored in a non-volatile computer. In a readable storage medium, when the computer-readable instructions are executed, they may include the processes of the above-mentioned method embodiments. Wherein, any reference to memory, storage, database or other media used in the embodiments provided in this application may include non-volatile and/or volatile memory. Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory. Volatile memory may include random access memory (RAM) or external cache memory. As an illustration and not a limitation, RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。Those skilled in the art can clearly understand that for the convenience and conciseness of description, only the division of the above-mentioned functional units and modules is used as an example. In practical applications, the above-mentioned functions can be allocated to different functional units and modules as required. Module completion means dividing the internal structure of the device into different functional units or modules to complete all or part of the functions described above.
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。The above-mentioned embodiments are only used to illustrate the technical solutions of the present application, not to limit them; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that it can still implement the foregoing The technical solutions recorded in the examples are modified, or some of the technical features are equivalently replaced; these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the embodiments of the application, and should be included in Within the scope of protection of this application.

Claims (20)

  1. 一种基于区块链的参数配置方法,其特征在于,包括:A parameter configuration method based on blockchain, which is characterized in that it includes:
    获取配置节点的节点配置信息,其中,所述配置节点为至少两个,每一所述配置节点包括节点配置信息;Acquiring node configuration information of a configuration node, where there are at least two configuration nodes, and each configuration node includes node configuration information;
    对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息;Performing configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
    采用每一所述配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一所述配置节点的个性化加密信息;Using the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
    将所述公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。The public configuration information and the personalized encryption information of each configuration node are recorded in the blockchain.
  2. 如权利要求1所述的基于区块链的参数配置方法,其特征在于,每一所述节点配置信息包括至少一个子节点配置信息,且每一所述子节点配置信息包括配置参数名和对应的配置参数值;The block chain-based parameter configuration method of claim 1, wherein each of the node configuration information includes at least one sub-node configuration information, and each of the sub-node configuration information includes a configuration parameter name and a corresponding Configuration parameter value;
    所述对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息,包括:The performing configuration information matching on the node configuration information to obtain the common configuration information and the personalized configuration information of each configuration node includes:
    对每一所述子节点配置信息进行特征向量转化,得到每一所述子节点配置信息的子节点特征向量;Performing feature vector transformation on each of the sub-node configuration information to obtain the sub-node feature vector of each of the sub-node configuration information;
    基于每一所述子节点配置信息的所述子节点特征向量,将节点配置信息采用聚类算法进行聚类分析,获取聚类簇,每一所述聚类簇包括目标中心点;Based on the sub-node feature vector of each of the sub-node configuration information, clustering the node configuration information using a clustering algorithm to obtain cluster clusters, each of the cluster clusters including a target center point;
    根据所述目标中心点和预设的距离阈值,计算每一所述聚类簇中子节点特征向量的数量;Calculating the number of feature vectors of child nodes in each cluster according to the target center point and a preset distance threshold;
    根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇;Determining the target cluster cluster according to the number of feature vectors of the child nodes in each cluster;
    将所述目标聚类簇对应的子节点配置信息确定为公共配置信息;Determining the configuration information of the child nodes corresponding to the target cluster cluster as common configuration information;
    将每一所述节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。The sub-node configuration information of each node configuration information that is different from the public configuration information is determined as the personalized configuration information of each configuration node.
  3. 如权利要求2所述的基于区块链的参数配置方法,其特征在于,所述根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇 ,包括:The method for configuring parameters based on blockchain according to claim 2, wherein said determining a target cluster cluster according to the number of feature vectors of sub-nodes in each cluster cluster comprises:
    获取预设的第一数量阈值和预设的第二数量阈值;Acquiring the preset first quantity threshold and the preset second quantity threshold;
    将聚类簇中子节点特征向量的数量满足第一数量阈值的聚类簇确定为公共聚类簇,将聚类簇中子节点特征向量的数量满足第二数量阈值的聚类簇确定为推荐聚类簇;Determine the cluster cluster with the number of sub-node feature vectors in the cluster cluster meeting the first number threshold as a common cluster cluster, and determine the cluster cluster with the number of sub-node feature vectors in the cluster cluster meeting the second number threshold as the recommendation Cluster cluster
    将公共聚类簇和推荐聚类簇组成目标聚类簇。The common cluster cluster and the recommended cluster cluster are formed into the target cluster cluster.
  4. 如权利要求3所述的基于区块链的参数配置方法,其特征在于,所述将目标聚类簇对应的子节点配置信息确定为公共配置信息,包括:The method for parameter configuration based on blockchain according to claim 3, wherein the determining the configuration information of the child nodes corresponding to the target cluster cluster as the common configuration information comprises:
    将公共聚类簇对应的子节点配置信息确定为相同配置信息;Determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information;
    将推荐聚类簇对应的子节点配置信息确定为推荐配置信息;Determine the configuration information of the child nodes corresponding to the recommended cluster as the recommended configuration information;
    将所述相同配置信息和所述推荐配置信息组成公共配置信息。The same configuration information and the recommended configuration information form common configuration information.
  5. 一种基于区块链的参数重构方法,其特征在于,包括:A parameter reconstruction method based on blockchain, which is characterized in that it includes:
    获取节点重构请求,所述节点重构请求包括节点标识和节点验证信息;Acquiring a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
    对所述节点验证信息进行验证,得到节点验证结果;Verifying the node verification information to obtain a node verification result;
    若所述节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息;If the node verification result is that the verification is passed, obtain corresponding personalized encrypted information from the blockchain according to the node identifier;
    从区块链中获取公共配置信息,将所述公共配置信息和所述个性化加密信息发送至所述节点标识对应的配置节点,其中,所述公共配置信息和所述个性化加密信息是采用如权利要求1-4中任一项所述的基于区块链的参数配置方法得到的。Obtain public configuration information from the blockchain, and send the public configuration information and the personalized encrypted information to the configuration node corresponding to the node identifier, where the public configuration information and the personalized encrypted information are Obtained by the method of parameter configuration based on blockchain according to any one of claims 1-4.
  6. 一种基于区块链的参数配置装置,其特征在于,包括:A block chain-based parameter configuration device is characterized in that it includes:
    节点配置信息获取模块,用于获取配置节点的节点配置信息,其中,所述配置节点为至少两个,每一所述配置节点包括节点配置信息;A node configuration information obtaining module, configured to obtain node configuration information of configuration nodes, where there are at least two configuration nodes, and each configuration node includes node configuration information;
    配置信息匹配模块,用于对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息;The configuration information matching module is configured to perform configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
    非对称加密模块,用于采用每一所述配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一所述配置节点的个性化加密信息;The asymmetric encryption module is configured to use the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
    区块链记录模块,用于将所述公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。The block chain recording module is used to record the public configuration information and the personalized encrypted information of each configuration node in the block chain.
  7. 如权利要求6所述的基于区块链的参数配置装置,其特征在于,每一所述节点配置信息包括至少一个子节点配置信息,且每一所述子节点配置信息包括配置参数名和对应的配置参数值;The block chain-based parameter configuration device of claim 6, wherein each of the node configuration information includes at least one sub-node configuration information, and each of the sub-node configuration information includes a configuration parameter name and a corresponding Configuration parameter value;
    所述配置信息匹配模块包括:The configuration information matching module includes:
    特征向量转化子模块,用于对每一所述子节点配置信息进行特征向量转化,得到每一所述子节点配置信息的子节点特征向量;The feature vector conversion sub-module is used to perform feature vector conversion on each of the sub-node configuration information to obtain the sub-node feature vector of each of the sub-node configuration information;
    聚类簇获取子模块,用于基于每一所述子节点配置信息的所述子节点特征向量,将节点配置信息采用聚类算法进行聚类分析,获取聚类簇,每一所述聚类簇包括目标中心点;The cluster cluster acquisition sub-module is used to perform cluster analysis on the node configuration information using a clustering algorithm based on the sub-node feature vector of each of the sub-node configuration information to obtain cluster clusters. The cluster includes the target center point;
    特征向量计算子模块,用于根据所述目标中心点和预设的距离阈值,计算每一所述聚类簇中子节点特征向量的数量;The feature vector calculation sub-module is configured to calculate the number of feature vectors of sub-nodes in each cluster according to the target center point and a preset distance threshold;
    目标聚类簇确定子模块,用于根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇;The target cluster determination sub-module is configured to determine the target cluster according to the number of feature vectors of the sub-nodes in each cluster;
    公共配置信息确定子模块,用于将所述目标聚类簇对应的子节点配置信息确定为公共配置信息;The public configuration information determining sub-module is used to determine the sub-node configuration information corresponding to the target cluster cluster as public configuration information;
    个性化配置信息确定子模块,用于将每一所述节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。The personalized configuration information determining sub-module is used to determine the configuration information of the sub-nodes of each node configuration information that is different from the public configuration information as the personalized configuration information of each configuration node.
  8. 如权利要求7所述的基于区块链的参数配置装置,其特征在于,所述目标聚类簇确定子模块包括数量阈值获取单元、聚类簇分类单元和目标聚类簇组成单元;8. The block chain-based parameter configuration device according to claim 7, wherein the target cluster cluster determination sub-module includes a quantity threshold acquisition unit, a cluster cluster classification unit, and a target cluster cluster constituent unit;
    数量阈值获取单元,用于获取预设的第一数量阈值和预设的第二数量阈值;A quantity threshold value obtaining unit, configured to obtain a preset first quantity threshold value and a preset second quantity threshold value;
    聚类簇分类单元,用于将聚类簇中子节点特征向量的数量满足第一数量阈值的聚类簇确定为公共聚类簇,将聚类簇中子节点特征向量的数量满足第二数量阈值的聚类簇确定为推荐聚类簇;The cluster classification unit is used to determine the cluster cluster whose number of feature vectors of sub-nodes in the cluster cluster meets the first number threshold as a common cluster cluster, and set the number of feature vectors of sub-nodes in the cluster cluster to meet the second number The threshold cluster is determined as the recommended cluster;
    目标聚类簇组成单元,用于将公共聚类簇和推荐聚类簇组成目标聚类簇。The target cluster cluster forming unit is used to form the common cluster cluster and the recommended cluster cluster into the target cluster cluster.
  9. 如权利要求8所述的基于区块链的参数配置装置,其特征在于,所述公共配置信息确定子模块包括相同配置信息确定单元、推荐配置信息确定单元和公共配置信息组成单元。The block chain-based parameter configuration device according to claim 8, wherein the common configuration information determining sub-module includes a same configuration information determining unit, a recommended configuration information determining unit, and a common configuration information component unit.
    相同配置信息确定单元,用于将公共聚类簇对应的子节点配置信息确定为相同配置信息;The same configuration information determining unit is used to determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information;
    推荐配置信息确定单元,用于将推荐聚类簇对应的子节点配置信息确定为推荐配置信息;The recommended configuration information determining unit is configured to determine the configuration information of the child nodes corresponding to the recommended cluster cluster as the recommended configuration information;
    公共配置信息组成单元,用于将相同配置信息和推荐配置信息组成公共配置信息。The common configuration information forming unit is used to combine the same configuration information and recommended configuration information into common configuration information.
  10. 一种基于区块链的参数重构装置,其特征在于,包括:A block chain-based parameter reconstruction device is characterized in that it includes:
    节点重构请求获取模块,用于获取节点重构请求,所述节点重构请求包括节点标识和节点验证信息;A node reconstruction request obtaining module, configured to obtain a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
    节点验证结果获取模块,用于对所述节点验证信息进行验证,得到节点验证结果;Node verification result obtaining module, used to verify the node verification information to obtain the node verification result;
    个性化加密信息获取模块,用于若所述节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息;A personalized encrypted information obtaining module, configured to obtain corresponding personalized encrypted information from the blockchain according to the node identifier if the verification result of the node is a successful verification;
    配置信息发送模块,用于从区块链中获取公共配置信息,将所述公共配置信息和所述个性化加密信息发送至所述节点标识对应的配置节点,其中,所述公共配置信息和所述个性化加密信息是采用如权利要求1-4中任一项所述的基于区块链的参数配置方法得到的。The configuration information sending module is used to obtain public configuration information from the blockchain, and send the public configuration information and the personalized encryption information to the configuration node corresponding to the node identifier, where the public configuration information and the The personalized encrypted information is obtained by using the blockchain-based parameter configuration method according to any one of claims 1-4.
  11. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述 处理器执行所述计算机可读指令时实现如下步骤:A computer device comprising a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor, wherein the processor executes the computer-readable instructions as follows step:
    获取配置节点的节点配置信息,其中,所述配置节点为至少两个,每一所述配置节点包括节点配置信息;Acquiring node configuration information of a configuration node, where there are at least two configuration nodes, and each configuration node includes node configuration information;
    对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息;Performing configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
    采用每一所述配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一所述配置节点的个性化加密信息;Using the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
    将所述公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。The public configuration information and the personalized encryption information of each configuration node are recorded in the blockchain.
  12. 如权利要求11所述的计算机设备,其特征在于,每一所述节点配置信息包括至少一个子节点配置信息,且每一所述子节点配置信息包括配置参数名和对应的配置参数值;11. The computer device of claim 11, wherein each of the node configuration information includes at least one sub-node configuration information, and each of the sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value;
    所述对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息,包括:The performing configuration information matching on the node configuration information to obtain the common configuration information and the personalized configuration information of each configuration node includes:
    对每一所述子节点配置信息进行特征向量转化,得到每一所述子节点配置信息的子节点特征向量;Performing feature vector transformation on each of the sub-node configuration information to obtain the sub-node feature vector of each of the sub-node configuration information;
    基于每一所述子节点配置信息的所述子节点特征向量,将节点配置信息采用聚类算法进行聚类分析,获取聚类簇,每一所述聚类簇包括目标中心点;Based on the sub-node feature vector of each of the sub-node configuration information, clustering the node configuration information using a clustering algorithm to obtain cluster clusters, each of the cluster clusters including a target center point;
    根据所述目标中心点和预设的距离阈值,计算每一所述聚类簇中子节点特征向量的数量;Calculating the number of feature vectors of child nodes in each cluster according to the target center point and a preset distance threshold;
    根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇;Determining the target cluster cluster according to the number of feature vectors of the child nodes in each cluster;
    将所述目标聚类簇对应的子节点配置信息确定为公共配置信息;Determining the configuration information of the child nodes corresponding to the target cluster cluster as common configuration information;
    将每一所述节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。The sub-node configuration information of each node configuration information that is different from the public configuration information is determined as the personalized configuration information of each configuration node.
  13. 如权利要求12所述的计算机设备,其特征在于,所述根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇,包括:The computer device according to claim 12, wherein the determining the target cluster cluster according to the number of feature vectors of the sub-nodes in each cluster cluster comprises:
    获取预设的第一数量阈值和预设的第二数量阈值;Acquiring the preset first quantity threshold and the preset second quantity threshold;
    将聚类簇中子节点特征向量的数量满足第一数量阈值的聚类簇确定为公共聚类簇,将聚类簇中子节点特征向量的数量满足第二数量阈值的聚类簇确定为推荐聚类簇;Determine the cluster cluster with the number of sub-node feature vectors in the cluster cluster meeting the first number threshold as a common cluster cluster, and determine the cluster cluster with the number of sub-node feature vectors in the cluster cluster meeting the second number threshold as the recommendation Cluster cluster
    将公共聚类簇和推荐聚类簇组成目标聚类簇。The common cluster cluster and the recommended cluster cluster are formed into the target cluster cluster.
  14. 如权利要求13所述的计算机设备,其特征在于,所述将目标聚类簇对应的子节点配置信息确定为公共配置信息,包括:The computer device according to claim 13, wherein the determining the configuration information of the child nodes corresponding to the target cluster cluster as the common configuration information comprises:
    将公共聚类簇对应的子节点配置信息确定为相同配置信息;Determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information;
    将推荐聚类簇对应的子节点配置信息确定为推荐配置信息;Determine the configuration information of the child nodes corresponding to the recommended cluster as the recommended configuration information;
    将所述相同配置信息和所述推荐配置信息组成公共配置信息。The same configuration information and the recommended configuration information form common configuration information.
  15. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:A computer device comprising a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor, wherein the processor executes the computer-readable instructions as follows step:
    获取节点重构请求,所述节点重构请求包括节点标识和节点验证信息;Acquiring a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
    对所述节点验证信息进行验证,得到节点验证结果;Verifying the node verification information to obtain a node verification result;
    若所述节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息;If the node verification result is that the verification is passed, obtain corresponding personalized encrypted information from the blockchain according to the node identifier;
    从区块链中获取公共配置信息,将所述公共配置信息和所述个性化加密信息发送至所述节点标识对应的配置节点,其中,所述公共配置信息和所述个性化加密信息是采用如权利要求1-4中任一项所述的基于区块链的参数配置方法得到的。Obtain public configuration information from the blockchain, and send the public configuration information and the personalized encrypted information to the configuration node corresponding to the node identifier, where the public configuration information and the personalized encrypted information are Obtained by the method of parameter configuration based on blockchain according to any one of claims 1-4.
  16. 一个或多个存储有计算机可读指令的可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:One or more readable storage media storing computer readable instructions, when the computer readable instructions are executed by one or more processors, the one or more processors execute the following steps:
    获取配置节点的节点配置信息,其中,所述配置节点为至少两个,每一所述配置节点包括节点配置信息;Acquiring node configuration information of a configuration node, where there are at least two configuration nodes, and each configuration node includes node configuration information;
    对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息;Performing configuration information matching on the node configuration information to obtain public configuration information and personalized configuration information of each configuration node;
    采用每一所述配置节点对应的公钥对对应的个性化配置信息进行非对称加密,得到每一所述配置节点的个性化加密信息;Using the public key corresponding to each configuration node to perform asymmetric encryption on the corresponding personalized configuration information to obtain the personalized encryption information of each configuration node;
    将所述公共配置信息和每一所述配置节点的个性化加密信息记录至区块链中。The public configuration information and the personalized encryption information of each configuration node are recorded in the blockchain.
  17. 如权利要求16所述的可读存储介质,其特征在于,每一所述节点配置信息包括至少一个子节点配置信息,且每一所述子节点配置信息包括配置参数名和对应的配置参数值;16. The readable storage medium of claim 16, wherein each of the node configuration information includes at least one sub-node configuration information, and each of the sub-node configuration information includes a configuration parameter name and a corresponding configuration parameter value;
    所述对所述节点配置信息进行配置信息匹配,得到公共配置信息和每一所述配置节点的个性化配置信息,包括:The performing configuration information matching on the node configuration information to obtain the common configuration information and the personalized configuration information of each configuration node includes:
    对每一所述子节点配置信息进行特征向量转化,得到每一所述子节点配置信息的子节点特征向量;Performing feature vector transformation on each of the sub-node configuration information to obtain the sub-node feature vector of each of the sub-node configuration information;
    基于每一所述子节点配置信息的所述子节点特征向量,将节点配置信息采用聚类算法进行聚类分析,获取聚类簇,每一所述聚类簇包括目标中心点;Based on the sub-node feature vector of each of the sub-node configuration information, clustering the node configuration information using a clustering algorithm to obtain cluster clusters, each of the cluster clusters including a target center point;
    根据所述目标中心点和预设的距离阈值,计算每一所述聚类簇中子节点特征向量的数量;Calculating the number of feature vectors of child nodes in each cluster according to the target center point and a preset distance threshold;
    根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇;Determining the target cluster cluster according to the number of feature vectors of the child nodes in each cluster;
    将所述目标聚类簇对应的子节点配置信息确定为公共配置信息;Determining the configuration information of the child nodes corresponding to the target cluster cluster as common configuration information;
    将每一所述节点配置信息中不同于公共配置信息的子节点配置信息确定为每一配置节点的个性化配置信息。The sub-node configuration information of each node configuration information that is different from the public configuration information is determined as the personalized configuration information of each configuration node.
  18. 如权利要求17所述的可读存储介质,其特征在于,所述根据每一所述聚类簇中子节点特征向量的数量确定目标聚类簇,包括:17. The readable storage medium according to claim 17, wherein the determining the target cluster cluster according to the number of feature vectors of the child nodes in each cluster cluster comprises:
    获取预设的第一数量阈值和预设的第二数量阈值;Acquiring the preset first quantity threshold and the preset second quantity threshold;
    将聚类簇中子节点特征向量的数量满足第一数量阈值的聚类簇确定为公共聚类簇,将聚类簇中子节点特征向量的数量满足第二数量阈值的聚类簇确定为推荐聚类簇;Determine the cluster cluster with the number of sub-node feature vectors in the cluster cluster meeting the first number threshold as a common cluster cluster, and determine the cluster cluster with the number of sub-node feature vectors in the cluster cluster meeting the second number threshold as the recommendation Cluster cluster
    将公共聚类簇和推荐聚类簇组成目标聚类簇。The common cluster cluster and the recommended cluster cluster are formed into the target cluster cluster.
  19. 如权利要求18所述的可读存储介质,其特征在于,所述将目标聚 类簇对应的子节点配置信息确定为公共配置信息,包括:The readable storage medium according to claim 18, wherein the determining the configuration information of the child node corresponding to the target cluster as the common configuration information comprises:
    将公共聚类簇对应的子节点配置信息确定为相同配置信息;Determine the configuration information of the child nodes corresponding to the common cluster cluster as the same configuration information;
    将推荐聚类簇对应的子节点配置信息确定为推荐配置信息;Determine the configuration information of the child nodes corresponding to the recommended cluster as the recommended configuration information;
    将所述相同配置信息和所述推荐配置信息组成公共配置信息。The same configuration information and the recommended configuration information form common configuration information.
  20. 一个或多个存储有计算机可读指令的可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:One or more readable storage media storing computer readable instructions, when the computer readable instructions are executed by one or more processors, the one or more processors execute the following steps:
    获取节点重构请求,所述节点重构请求包括节点标识和节点验证信息;Acquiring a node reconstruction request, where the node reconstruction request includes node identification and node verification information;
    对所述节点验证信息进行验证,得到节点验证结果;Verifying the node verification information to obtain a node verification result;
    若所述节点验证结果为验证通过,则根据所述节点标识从区块链中获取对应的个性化加密信息;If the node verification result is that the verification is passed, obtain corresponding personalized encrypted information from the blockchain according to the node identifier;
    从区块链中获取公共配置信息,将所述公共配置信息和所述个性化加密信息发送至所述节点标识对应的配置节点,其中,所述公共配置信息和所述个性化加密信息是采用如权利要求1-4中任一项所述的基于区块链的参数配置方法得到的。Obtain public configuration information from the blockchain, and send the public configuration information and the personalized encrypted information to the configuration node corresponding to the node identifier, where the public configuration information and the personalized encrypted information are Obtained by the method of parameter configuration based on blockchain according to any one of claims 1-4.
PCT/CN2019/117732 2019-04-26 2019-11-13 Blockchain-based parameter configuration method and apparatus, blockchain-based parameter reconstruction method and apparatus, device, and medium WO2020215684A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910344995.6A CN110149202B (en) 2019-04-26 2019-04-26 Parameter configuration and reconstruction method, device, equipment and medium based on block chain
CN201910344995.6 2019-04-26

Publications (1)

Publication Number Publication Date
WO2020215684A1 true WO2020215684A1 (en) 2020-10-29

Family

ID=67594712

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/117732 WO2020215684A1 (en) 2019-04-26 2019-11-13 Blockchain-based parameter configuration method and apparatus, blockchain-based parameter reconstruction method and apparatus, device, and medium

Country Status (2)

Country Link
CN (1) CN110149202B (en)
WO (1) WO2020215684A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112907871A (en) * 2021-04-07 2021-06-04 湖南航天智远科技有限公司 Thunder and fire early warning identification method based on satellite remote sensing

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149202B (en) * 2019-04-26 2022-04-05 平安科技(深圳)有限公司 Parameter configuration and reconstruction method, device, equipment and medium based on block chain
CN110941676B (en) * 2019-11-27 2021-12-21 腾讯科技(深圳)有限公司 Configuration method, device, equipment and medium
CN112394934A (en) * 2020-11-27 2021-02-23 完美世界(北京)软件科技发展有限公司 File processing method and device, electronic equipment and readable medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108139964A (en) * 2017-12-06 2018-06-08 深圳达闼科技控股有限公司 Cloud service configuration method and device, storage medium and cloud service system
CN109032694A (en) * 2018-07-03 2018-12-18 郑州云海信息技术有限公司 A kind of data load method and terminal
WO2019018282A1 (en) * 2017-07-17 2019-01-24 Cryptowerk Corp. Method and system of secure configuration of at least one electronic device
US20190075022A1 (en) * 2016-10-28 2019-03-07 International Business Machines Corporation Changing an existing blockchain trust configuration
CN110149202A (en) * 2019-04-26 2019-08-20 平安科技(深圳)有限公司 Parameter configuration, reconstructing method, device, equipment and medium based on block chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10657526B2 (en) * 2016-10-28 2020-05-19 International Business Machines Corporation System and method to dynamically setup a private sub-blockchain based on agility of transaction processing
US10102265B1 (en) * 2017-04-12 2018-10-16 Vijay K. Madisetti Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing
CN109255685A (en) * 2018-09-21 2019-01-22 中链科技有限公司 The sharing method and device of battery status data based on block chain
CN109634679B (en) * 2018-10-16 2023-04-11 平安科技(深圳)有限公司 Block chain configuration updating method, device, equipment and storage medium
CN109544158B (en) * 2018-11-02 2021-04-30 北京新唐思创教育科技有限公司 Block data processing method and computer storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190075022A1 (en) * 2016-10-28 2019-03-07 International Business Machines Corporation Changing an existing blockchain trust configuration
WO2019018282A1 (en) * 2017-07-17 2019-01-24 Cryptowerk Corp. Method and system of secure configuration of at least one electronic device
CN108139964A (en) * 2017-12-06 2018-06-08 深圳达闼科技控股有限公司 Cloud service configuration method and device, storage medium and cloud service system
CN109032694A (en) * 2018-07-03 2018-12-18 郑州云海信息技术有限公司 A kind of data load method and terminal
CN110149202A (en) * 2019-04-26 2019-08-20 平安科技(深圳)有限公司 Parameter configuration, reconstructing method, device, equipment and medium based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112907871A (en) * 2021-04-07 2021-06-04 湖南航天智远科技有限公司 Thunder and fire early warning identification method based on satellite remote sensing
CN112907871B (en) * 2021-04-07 2022-06-17 湖南航天智远科技有限公司 Thunder and fire early warning identification method based on satellite remote sensing

Also Published As

Publication number Publication date
CN110149202B (en) 2022-04-05
CN110149202A (en) 2019-08-20

Similar Documents

Publication Publication Date Title
WO2020215684A1 (en) Blockchain-based parameter configuration method and apparatus, blockchain-based parameter reconstruction method and apparatus, device, and medium
WO2019214311A1 (en) Blockchain-based information supervision method and device
WO2021003968A1 (en) Data checking method and apparatus, and computer device and storage medium
US20220224513A1 (en) Blockchain-incorporating distributed authentication system
US9781109B2 (en) Method, terminal device, and network device for improving information security
WO2021082863A1 (en) Method and device for evaluating consensus node
WO2020215685A1 (en) Block chain-based information processing and acquisition methods and apparatus, device, and medium
CN109361517A (en) A kind of virtualization cloud cipher machine system and its implementation based on cloud computing
US11941155B2 (en) Secure data management in a network computing environment
WO2022174533A1 (en) Federated learning method and apparatus based on self-organized cluster, device, and storage medium
WO2020253122A1 (en) Data verification method and device, computer equipment and storage medium
KR102295593B1 (en) Automatically generating certification documents
WO2021139467A1 (en) Federated learning method and system, and computer device and storage medium
US20210216622A1 (en) Password Reset for Multi-Domain Environment
WO2020233012A1 (en) Distributed smart api asynchronous callback method, device, client terminal, service terminal, and storage medium
CN111865691B (en) Alarm file distribution method, device, equipment and medium based on artificial intelligence
WO2021164194A1 (en) Reward point management method based on blockchain, and related apparatus
CN111680900A (en) Work order issuing method and device, electronic equipment and storage medium
CN114218322A (en) Data display method, device, equipment and medium based on ciphertext transmission
CN111698328A (en) Enterprise big data analysis and processing platform based on hybrid cloud
WO2021139476A1 (en) Intersection data generation method, and federated model training method based on intersection data
US11902284B2 (en) Tenant user management in cloud database operation
WO2022011946A1 (en) Data prediction method, apparatus, computer device, and storage medium
WO2019214071A1 (en) Communication method for users on blockchain, device, terminal device, and storage medium
CN114490704A (en) Data processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19926380

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19926380

Country of ref document: EP

Kind code of ref document: A1