WO2023061295A1 - 数据处理方法、装置、电子设备和存储介质 - Google Patents

数据处理方法、装置、电子设备和存储介质 Download PDF

Info

Publication number
WO2023061295A1
WO2023061295A1 PCT/CN2022/124128 CN2022124128W WO2023061295A1 WO 2023061295 A1 WO2023061295 A1 WO 2023061295A1 CN 2022124128 W CN2022124128 W CN 2022124128W WO 2023061295 A1 WO2023061295 A1 WO 2023061295A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
target
metafunction
meta
algorithm
Prior art date
Application number
PCT/CN2022/124128
Other languages
English (en)
French (fr)
Inventor
邱炜伟
李伟
汪小益
刘敬
姚文豪
Original Assignee
杭州趣链科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州趣链科技有限公司 filed Critical 杭州趣链科技有限公司
Publication of WO2023061295A1 publication Critical patent/WO2023061295A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present application relates to the technical field of data processing, and in particular to a data processing method, device, electronic equipment, and storage medium.
  • MPC Secure Multi-Party Computation Computation
  • MPC must ensure the independence of input, the correctness of calculation, decentralization and other characteristics, and at the same time do not disclose each input value to the participants. other members of the calculation. It is mainly aimed at the problem of how to safely calculate an agreed function in the absence of a trusted third party, and at the same time requires that each participant cannot obtain any input information from other entities except for the calculation results.
  • Secure multi-party computing plays an important role in scenarios such as electronic elections, electronic voting, electronic auctions, secret sharing, and threshold signatures.
  • Secure multi-party computing is usually based on configuring a specific algorithm for a specific problem, such as comparing with the data of the other party without knowing the data of the other party, finding the sum of the data of the other two parties, and so on.
  • the present application provides a data processing method, device, electronic equipment, and storage medium, which are used to solve the problem that in the prior art, secure multi-party computing is usually written according to the idea of synchronization.
  • the parameters of the algorithm are The respective data are calculated synchronously, and the algorithm execution efficiency is low.
  • the embodiment of the present application provides a data processing method, including:
  • the metafunction set is the target A collection of meta-functions obtained after algorithm splitting;
  • performing data processing on the data to be processed through the target meta-function, and returning the processed second data includes:
  • calling the callable target metafunction in the metafunction set according to the cached data to be processed includes:
  • the metafunction that satisfies the calling condition is the target metafunction, and the calling condition is that the data to be processed includes all data corresponding to the input parameters of the metafunction.
  • the process of splitting the target algorithm to obtain the metafunction set includes:
  • the set of meta-functions is determined as the set of meta-functions.
  • the target algorithm is obtained in the following manner:
  • the data input node is configured at the data call node, and the data input node is configured with input parameters corresponding to the call data;
  • the method further includes:
  • the second data includes encrypted data; after caching the second data, further includes:
  • the embodiment of the present application provides a data processing device, including:
  • An acquisition module configured to call a start meta-function after the trigger command is acquired, and process the initial calculation data carried in the trigger command through the start meta-function to obtain first data
  • a first cache module configured to cache the first data
  • the calling module is used to call the callable target meta-function in the meta-function set according to the cached data to be processed every time a data cache operation is detected, perform data processing on the pending data through the target meta-function, and return
  • the set of meta-functions is a set of meta-functions obtained after splitting the target algorithm;
  • a determining module configured to determine that the second data is a calculation result if the target meta-function calls an end function.
  • a second caching module configured to cache the second data if the target meta-function does not call the end function.
  • an embodiment of the present application provides an electronic device, including: a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory complete communication with each other through the communication bus;
  • the memory is used to store computer programs
  • the processor is configured to execute the program stored in the memory to implement the data processing method described in the first aspect.
  • an embodiment of the present application provides a computer-readable storage medium storing a computer program, and implementing the data processing method in the first aspect when the computer program is executed by a processor.
  • the beneficial effect of the data processing method provided by the embodiment of the present application lies in that: the method provided by the embodiment of the present application, after obtaining the trigger instruction, calls the start metafunction in the set of metafunctions, and uses the start metafunction to carry in the trigger instruction Process the initial calculation data to obtain the first data; cache the first data; every time a data cache operation is detected, according to the cached data to be processed, call the target metafunction that can be called in the metafunction set, and use the target metafunction to be processed Perform data processing on the data, and return the processed second data; the set of meta-functions is a set of meta-functions obtained after splitting the target algorithm; if the target meta-function calls the end function, determine the second data as the calculation result.
  • the target meta-function is automatically called by monitoring the occurrence of the data cache operation, which realizes the purpose of executing the meta-function in the data-triggered algorithm; and, for different participants, when the occurrence of the data cache operation is detected, they can be called
  • the callable target meta-function realizes the asynchronous execution in the calculation process of the algorithm and improves the execution efficiency of the algorithm.
  • FIG. 1 is an application scenario diagram of a data processing method provided by an embodiment of the present application
  • FIG. 2 is a schematic diagram of interaction in a data processing method provided by an embodiment of the present application
  • FIG. 3 is a flowchart of a data processing method provided by an embodiment of the present application.
  • FIG. 4 is a flowchart of a data processing method provided in another embodiment of the present application.
  • FIG. 5 is a structural diagram of a data processing device provided by an embodiment of the present application.
  • FIG. 6 is a structural diagram of an electronic device provided by an embodiment of the present application.
  • An embodiment of the present application provides a data processing method.
  • the above data processing method may be applied to a hardware environment composed of a terminal 101 and a server 102 as shown in FIG. 1 .
  • the server 102 is connected to the terminal 101 through the network, and can be used to provide services (such as application services, etc.) for the terminal or the client installed on the terminal.
  • the server 102 provides data storage services.
  • the above-mentioned network includes but is not limited to: a wide area network, a metropolitan area network or a local area network.
  • the terminal 101 is not limited to a PC, a mobile phone, a tablet computer, and the like.
  • the data processing method in this embodiment of the present application may be executed by the server 102, may also be executed by the terminal 101, and may also be executed jointly by the server 102 and the terminal 101.
  • the terminal 101 executes the data processing method of the embodiment of the present application, and may also be executed by a client installed on it.
  • the target algorithm is first split to obtain a set of meta-functions.
  • the algorithm flow controller and algorithm instance are set on the terminal.
  • the algorithm instance is the realization of the target algorithm, which is essentially composed of a series of meta-functions of the algorithm logic. It is necessary to declare the list of meta-functions and send the list of meta-functions to the algorithm flow controller.
  • the algorithm flow controller is a component used to control the execution of the algorithm flow, and is used for data sending and data receiving, meta-function management, and intermediate data caching.
  • the algorithm flow controller can provide algorithm context parameters for the algorithm writer to obtain some algorithm context information, and send data to the specified party, and also provide a registration function to register the meta-function into the controller.
  • the algorithm flow controller manages the meta-function list registered by the algorithm instance. When the algorithm is executed, it first calls the start meta-function and caches the data returned by the meta-function. The algorithm flow controller manages the data returned by the storage meta-function and the data received through the network. Every time the cache is performed, a scanning operation is triggered to scan out the data whose input parameters already exist in the cache from the meta-function list. And take out the data corresponding to the input parameters from the cache, and make an asynchronous call.
  • the meta-function calls data sending through the algorithm context parameter
  • the algorithm flow controller will serialize the data, and send the serialized byte sequence and data type to the receiver through network I/O (input/output). After receiving through network I/O, the receiver deserializes the byte sequence into corresponding data according to the data type and caches it.
  • the meta-function refers to a special function used to describe a piece of algorithmic logic.
  • the input of the meta-function is generated by the meta-function executed in the previous step or sent by other participants in the algorithm.
  • the output of the meta-function will become the next step.
  • Execute the input of the metafunction is driven by the required input data and does not need to be actively called by the algorithm writer.
  • the meta-function will be automatically called by the algorithm flow control component after the input requirements are met.
  • Metafunctions are divided into ordinary metafunctions and initial metafunctions.
  • the initial metafunctions refer to special metafunctions that have no other input except context parameters, and are the beginning of the entire algorithm.
  • Fig. 3 is a schematic flow diagram of an optional data processing method according to an embodiment of the present application. As shown in Fig. 3, the flow of the method may include the following steps:
  • Step 301 after obtaining the trigger instruction, call the start metafunction in the metafunction set, process the initial calculation data carried in the trigger instruction through the start metafunction, and obtain the first data; the metafunction set is to split the target algorithm The set of meta-functions obtained after.
  • the trigger instruction may be triggered by the user clicking a related button (such as a start calculation button) after inputting the initial calculation data.
  • the trigger instruction carries initial calculation data, and after the trigger instruction is obtained, the start metafunction can be called, and the start metafunction processes the initial calculation data to obtain the first data.
  • the process of splitting the target algorithm to obtain a set of meta-functions includes:
  • the target algorithm is obtained by:
  • the original algorithm is a multi-party interactive computing algorithm, such as a secure multi-party computing algorithm.
  • the data call node refers to the node used when a certain algorithm fragment in the original algorithm calls the calculation results of other algorithm fragments or data sent by other participants.
  • the data processing result node refers to the node of the data result obtained after the operation of a certain algorithm fragment in the original algorithm is completed.
  • the data input node By configuring the data input node at the data call node and configuring the input parameters corresponding to the call data for the data input node, the data input node can identify the data input to its corresponding meta-function. And, by configuring the data output node in the data processing result node, the purpose of splitting the original algorithm from a whole into multiple meta-functions according to the data input node and the data output node is realized.
  • the meta-functions required by each participant can be sent to the corresponding participant according to the different participants of the algorithm.
  • Step 302 cache the first data.
  • the first data after the first data is obtained through meta-function processing, the first data will be returned to the algorithm flow controller, and the algorithm flow controller will cache the first data.
  • Step 303 After each data cache operation is detected, call the callable target metafunction in the metafunction set according to the cached data to be processed, perform data processing on the data to be processed through the target metafunction, and return the processed second data . If the target meta-function calls the end function, execute step 304; if the target meta-function does not call the end function, execute step 305.
  • the algorithm flow controller after the algorithm flow controller detects the data cache operation, it will scan the list of meta-functions to determine the target meta-functions that can be called, and then the target meta-functions will perform data processing on the data to be processed. After the processing is completed, the target The meta-function returns the obtained second data to the algorithm flow controller. In this way, the invocation of the target meta-function is triggered by the cached data to be processed, and automatic invocation is realized without human participation.
  • calling the callable target metafunction in the metafunction set according to the cached data to be processed includes:
  • the metafunction satisfying the invocation condition is determined to be the target metafunction, and the invocation condition is that the data to be processed includes all data corresponding to the input parameters of the metafunction.
  • multiple meta-functions are included in the set of calling meta-functions, and after data is cached each time in the algorithm flow controller, the algorithm flow controller screens out the target meta-functions that can be called according to the calling conditions of the meta-functions .
  • the calling condition of the meta-function is that the data corresponding to the input parameters of the meta-function is in the cached data to be processed, and then, the algorithm flow controller calls the target meta-function, and the target meta-function scans the corresponding data in the algorithm flow controller. data to complete the data processing.
  • the target algorithm is an algorithm in which multiple parties participate in the calculation
  • the transmission form of the data is often serialized data. Therefore, when the data to be processed includes the third data acquired externally, since the data sent externally is serialized data, that is, the first serialized data and the corresponding first data type, the algorithm flow controller acquires the external After sending the first serialized data and the first data type, the first serialized data will be deserialized, so that the deserialized data and the first data type are used as the third data.
  • the external can be other algorithm participants.
  • Step 304 determining that the second data is a calculation result.
  • the determined target meta-function calls the end function, it means that after the calculation of the target meta-function is completed, the obtained result becomes the final output result, that is, the above-mentioned second data is the calculation result.
  • Step 305 cache the second data.
  • the target meta-function if the target meta-function does not call the end function, it means that after the calculation of the target meta-function is completed, the algorithm needs to continue to run, and the calculated second data is cached in the algorithm flow controller, thereby triggering the method Step 203 is executed again until the target meta-function calls the end function.
  • the second data includes encrypted data; after caching the second data, it further includes:
  • the target algorithm is an algorithm with multiple parties participating in the calculation
  • the transmission form of the data is often serialized data. Therefore, when the encrypted data is included in the second data, the encrypted data needs to be sent to the outside through the network I/O, therefore, the encrypted data needs to be serialized, and the obtained second serialized data and the second data of the encrypted data Type, sent to the data receiver.
  • the invocation of an algorithm can be divided into an initialization phase and an algorithm execution phase. For multiple invocations of an algorithm, only one initialization phase is required.
  • the initialization stage the algorithm instance component registers the information of all meta-functions in the algorithm flow controller through the registration function, and the algorithm flow controller will store the input parameter type list of the meta-function, as well as the start meta-function and the ordinary meta-function itself.
  • Algorithm execution phase the controller first calls the start meta-function, and the list of ordinary meta-functions is automatically called by the controller. Finally, when the end function is called in the meta-function through the algorithm context parameter, the algorithm execution result is transmitted.
  • the target algorithm is a secure multi-party computing algorithm including an initiator and a participant as an example.
  • the initiator For the algorithm initiator: the initiator’s algorithm flow controller first calls the start metafunction, returns data1 data after execution, stores it in the cache and scans the common metafunction that can be called, and scans the common metafunction 1 and needs data1 to meet the calling requirements. Make an asynchronous call;
  • data msg1 that is, the above-mentioned encrypted data
  • data2 is returned after execution, stored in the cache and scanned for callable ordinary metafunctions. No callable ordinary metafunctions are scanned , to wait;
  • the algorithm flow controller of the participant first calls the start metafunction, returns data3 data after the execution is completed, stores it in the cache and scans the common metafunction that can be called, and waits if no common metafunction that can be called is scanned. ;
  • Receive the msg1 data sent by the initiator store it in the cache and scan the common metafunction that can be called, and scan the common metafunction 2, which requires data3 and msg1 to meet the calling requirements, and make an asynchronous call;
  • Normal metafunction 2 returns data4 after execution, stores it in the cache and scans the callable common metafunctions, scans common metafunction 3 and needs data4 to meet the call requirements, and makes an asynchronous call;
  • the data msg2 is sent asynchronously to the initiator, and no data is returned after execution, and scanning is not triggered.
  • the data processing method of this application can decouple the process logic of the network and the algorithm itself, and the algorithm writer does not need to pay attention to the network level, but can focus on the algorithm itself to write complex logic more easily. Moreover, it is convenient to nest calls between algorithms, and part of the logic of the algorithm is easy to reuse (by reusing ordinary meta-functions).
  • the algorithm is based on data-driven asynchronous execution, and the efficiency of the algorithm can be improved by parallelizing the network transmission operation and the local computing operation.
  • the device mainly includes:
  • the acquisition module 501 is configured to call the start metafunction after the trigger instruction is acquired, and process the initial calculation data carried in the trigger instruction through the start metafunction to obtain the first data;
  • the calling module 503 is used to call the callable target meta-function in the meta-function set according to the cached data to be processed each time a data cache operation is detected, perform data processing on the data to be processed through the target meta-function, and return the processed first Two data;
  • the set of metafunctions is the set of metafunctions obtained after splitting the target algorithm;
  • the determination module 504 is configured to determine the second data as the calculation result if the target meta-function calls the end function.
  • the second caching module 505 is configured to cache the second data if the target meta-function does not call the end function.
  • an electronic device is also provided in the embodiment of the present application.
  • the bus 603 completes mutual communication.
  • the memory 602 stores a program executable by the processor 601, and the processor 601 executes the program stored in the memory 602 to implement the following steps:
  • the metafunction set is obtained after splitting the target algorithm collection of metafunctions
  • the communication bus 603 mentioned in the above-mentioned electronic equipment may be a peripheral component interconnection standard (Peripheral Component Interconnect, referred to as PCI) bus or extended industry standard structure (Extended Industry Standard Architecture, referred to as EISA) bus and so on.
  • PCI peripheral component interconnection standard
  • EISA Extended Industry Standard Architecture
  • the communication bus 603 can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in FIG. 6 , but it does not mean that there is only one bus or one type of bus.
  • the memory 602 may include a random access memory (Random Access Memory, RAM for short), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
  • the memory may also be at least one storage device located away from the aforementioned processor 601 .
  • the above-mentioned processor 601 may be a general-purpose processor, including a central processing unit (Central Processing Unit, referred to as CPU), a network processor (Network Processor, referred to as NP), etc., and may also be a digital signal processor (Digital Signal Processing, referred to as DSP). ), Application Specific Integrated Circuit (Application Specific Integrated Circuit, referred to as ASIC), field-programmable gate array (Field-Programmable Gate Array, referred to as FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • CPU Central Processing Unit
  • NP Network Processor
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium.
  • the computer program is run on a computer, the computer is made to execute the above-mentioned embodiment. The data processing method described.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, special purpose computer, computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g., from a website, computer, server, or data center via a wired (e.g.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (such as a floppy disk, a hard disk, a magnetic tape, etc.), an optical medium (such as a DVD), or a semiconductor medium (such as a solid state disk), and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本申请涉及一种数据处理方法、装置、电子设备和存储介质,应用于数据处理技术领域,其中,方法包括:在获取到触发指令后,调用元函数集合中的开始元函数,通过开始元函数对触发指令中携带的初始计算数据进行处理,得到第一数据;缓存第一数据;每监测到发生数据缓存操作,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,通过目标元函数对待处理数据进行数据处理,并返回处理得到的第二数据;元函数集合是对目标算法拆分后得到的元函数的集合;若目标元函数调用结束函数,确定第二数据为计算结果。

Description

数据处理方法、装置、电子设备和存储介质
本申请要求于2021年10月13日在中国专利局提交的、申请号为202111194519.4、发明名称为“数据处理方法、装置、电子设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及数据处理技术领域,尤其涉及一种数据处理方法、装置、电子设备和存储介质。
背景技术
安全多方计算(Secure Multi-Party Computation,MPC)是解决一组互不信任的参与方之间保护隐私的协同计算问题,MPC要确保输入的独立性、计算的正确性、去中心化等特征,同时不泄露各输入值给参与计算的其他成员。主要是针对无可信第三方的情况下,如何安全地计算一个约定函数的问题,同时要求每个参与主体除了计算结果外不能得到其他实体任何的输入信息。安全多方计算在电子选举、电子投票、电子拍卖、秘密共享、门限签名等场景中有着重要的作用。
安全多方计算最早是由华裔计算机科学家、图灵奖获得者姚启智教授通过百万富翁问题提出的。该问题表述为:两个百万富翁Alice和Bob想知道他们两个谁更富有,但他们都不想让对方知道自己财富的任何信息。在双方都不提供真实财富信息的情况下,如果比较两个人的财富多少,并给出可信证明。
安全多方计算通常基于针对特定问题的配置特定算法,比如在不知道其他方数据的前提下与本方数据进行比较,求其他两方数据之和等等。
然而,相关技术中的安全多方计算通常按照同步的思路编写的算法。算法在执行过程中,算法的各参方对各自的数据进行同步计算,算法执行效率较低。
技术问题
本申请提供了一种数据处理方法、装置、电子设备和存储介质,用以解决现有技术中,安全多方计算通常按照同步的思路编写的算法,算法在执行过程中,算法的各参方对各自的数据进行同步计算,算法执行效率较低的问题。
技术解决方案
本申请实施例采用的技术方案是:
第一方面,本申请实施例提供了一种数据处理方法,包括:
在获取到触发指令后,调用元函数集合中的开始元函数,通过所述开始元函数对所述触发指令中携带的初始计算数据进行处理,得到第一数据;所述元函数集合是对目标算法拆分后得到的元函数的集合;
缓存所述第一数据;
每监测到发生数据缓存操作后,根据缓存的待处理数据,调用所述元函数集合中可调用的目标元函数,通过所述目标元函数对所述待处理数据进行数据处理,并返回处理得到的第二数据;
若所述目标元函数调用结束函数,确定所述第二数据为计算结果;
若所述目标元函数未调用所述结束函数,缓存所述第二数据。
可选的,所述通过所述目标元函数对所述待处理数据进行数据处理,并返回处理得到的第二数据,包括:
提取所述待处理数据中,所述目标元函数对应的目标待处理数据;
发送所述目标待处理数据至所述目标元函数,以通过所述目标元函数对所述目标待处理数据进行数据处理,得到所述第二数据,并将所述第二数据返回。
可选的,所述根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,包括:
确定满足调用条件的所述元函数为所述目标元函数,所述调用条件为所述待处理数据中包括所述元函数的输入参数对应的所有数据。
可选的,对目标算法进行拆分得到所述元函数集合的过程包括:
确定所述目标算法中的数据输入节点和数据输出节点;
将所述数据输入节点到相邻的所述数据输出节点间的数据,从所述目标算法中拆分出来,得到所述元函数;
确定所述元函数的集合为所述元函数集合。
可选的,所述目标算法通过以下方式得到:
获取原始算法;
确定所述原始算法中的数据调用节点和数据处理结果节点;
在所述数据调用节点配置所述数据输入节点,所述数据输入节点配置与调用数据对应的输入参数;
以及在所述数据处理结果节点配置数据输出节点。
可选的,所述待处理数据包括外部获取的第三数据时,所述根据缓存的待处理数据,调用元函数集合中可调用的目标元函数之前,还包括:
获取外部发送第一数据类型和第一序列化数据;
根据所述第一数据类型,将所述字节序列反序列化,得到反序列化数据;
确定所述反序列化数据和所述第一数据类型为所述第三数据。
可选的,所述第二数据包括加密数据;所述缓存所述第二数据之后,还包括:
序列化所述加密数据,得到第二序列化数据;
发送所述加密数据的第二数据类型和所述第二序列化数据至数据接受方。
第二方面,本申请实施例提供了一种数据处理装置,包括:
获取模块,用于在获取到触发指令后,调用开始元函数,通过所述开始元函数对所述触发指令中携带的初始计算数据进行处理,得到第一数据;
第一缓存模块,用于缓存所述第一数据;
调用模块,用于每监测到发生数据缓存操作,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,通过所述目标元函数对所述待处理数据进行数据处理,并返回处理得到的第二数据;所述元函数集合是对目标算法拆分后得到的元函数的集合;
确定模块,用于若所述目标元函数调用结束函数,确定所述第二数据为计算结果。
第二缓存模块,用于若所述目标元函数未调用所述结束函数,缓存所述第二数据。
第三方面,本申请实施例提供了一种电子设备,包括:处理器、通信接口、存储器和通信总线,其中,处理器、通信接口和存储器通过通信总线完成相互间的通信;
所述存储器,用于存储计算机程序;
所述处理器,用于执行所述存储器中所存储的程序,实现第一方面所述的数据处理方法。
第四方面,本申请实施例提供了一种计算机可读存储介质,存储有计算机程序,所述计算机程序被处理器执行时实现第一方面所述的数据处理方法。
有益效果
本申请实施例提供的数据处理方法的有益效果在于:本申请实施例提供的该方法,通过在获取到触发指令后,调用元函数集合中的开始元函数,通过开始元函数对触发指令中携带的初始计算数据进行处理,得到第一数据;缓存第一数据;每监测到发生数据缓存操作,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,通过目标元函数对待处理数据进行数据处理,并返回处理得到的第二数据;元函数集合是对目标算法拆分后得到的元函数的集合;若目标元函数调用结束函数,确定第二数据为计算结果。如此,在将目标算法拆分后,利用拆分得到的元函数集合对算法执行,在获取到触发指令后,直接调用元函数集合中的开始元函数,并且,将开始元函数处理得到的第一数据进行缓存,通过监测到发生数据缓存操作,自动调用目标元函数,实现了由数据触发算法中元函数执行的目的;并且,对于不同的参与方,监测到发生数据缓存操作,即可调用可调用的目标元函数,实现了算法计算过程中的异步执行,提高了算法的执行效率。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理。
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本申请一实施例提供的数据处理方法的应用场景图;
图2为本申请一实施例提供的数据处理方法中的交互示意图;
图3为本申请一实施例提供的数据处理方法的流程图;
图4为本申请另一实施例提供的数据处理方法的流程图;
图5为本申请一实施例提供的数据处理装置的结构图;
图6为本申请一实施例提供的电子设备的结构图。
本发明的实施方式
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请的一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本申请保护的范围。
根据本申请一实施例提供了一种数据处理方法。可选地,在本申请实施例中,上述数据处理方法可以应用于如图1所示的由终端101和服务器102所构成的硬件环境中。如图1所示,服务器102通过网络与终端101进行连接,可用于为终端或终端上安装的客户端提供服务(如应用服务等),可在服务器上或独立于服务器设置数据库,用于为服务器102提供数据存储服务,上述网络包括但不限于:广域网、城域网或局域网,终端101并不限定于PC、手机、平板电脑等。
本申请实施例的数据处理方法可以由服务器102来执行,也可以由终端101来执行,还可以是由服务器102和终端101共同执行。其中,终端101执行本申请实施例的数据处理方法,也可以是由安装在其上的客户端来执行。
以终端执行本申请实施例的数据处理方法为例,在本申请的数据处理方法执行前,先对目标算法进行拆分,得到元函数集合。参见图2,在终端上设置算法流程控制器和算法实例。
其中,算法实例是目标算法的实现,本质是由算法逻辑的一系列元函数组成,需要声明元函数列表,并将元函数列表发送至算法流程控制器。
算法流程控制器是用于控制算法流程执行的组件,用于数据发送数据接收,元函数管理以及中间数据缓存。
算法流程控制器能够通过提供算法上下文参数的方式供算法编写者获取一些算法上下文的信息,以及发送数据给指定方,同时也提供注册函数将元函数注册到控制器中。
算法流程控制器管理由算法实例注册的元函数列表,在算法执行时,首先调用开始元函数,并将元函数返回的数据进行缓存。算法流程控制器管理存储元函数返回的数据和通过网络接收到的数据,每次进行缓存时,则会触发扫描操作,从元函数列表中扫描出所有输入参数都已在缓存中存在的数据,并从缓存中取出输入参数对应的数据,进行异步调用。当元函数通过算法上下文参数调用数据发送时,算法流程控制器会对数据进行序列化,将序列化后的字节序列和数据类型通过网络I/O(输入/输出)一起发送给接收者。接收方通过网络I/O接收到后,根据数据类型将字节序列反序列化成对应的数据,并缓存。
其中,元函数是指用于描述一段算法逻辑的特殊函数,元函数的输入来自于上一步执行的元函数产生的或者来自于算法其他参与方发送来的,元函数的输出会成为下一步待执行元函数的输入。元函数是由需要的输入数据驱动执行的,无需由算法编写者主动调用,元函数会由算法流程控制组件在满足输入要求后自动调用。
元函数内部可以通过算法上下文参数发送数据给其他方。发送的数据通过元函数的输入参数接收,无需以同步方式主动接受。元函数分为普通元函数和开始元函数,开始元函数是指除上下文参数外没有其他输入的特殊元函数,是整个算法的开始。
图3是根据本申请实施例的一种可选的数据处理方法的流程示意图,如图3所示,该方法的流程可以包括以下步骤:
步骤301、在获取到触发指令后,调用元函数集合中的开始元函数,通过开始元函数对触发指令中携带的初始计算数据进行处理,得到第一数据;元函数集合是对目标算法拆分后得到的元函数的集合。
一些实施例中,触发指令可以是用户在输入初始计算数据后,通过点击相关按钮(如开始计算按钮)后触发得到的。触发指令中携带有初始计算数据,在获取到该触发指令后,便可以调用开始元函数,由开始元函数对初始计算数据进行处理,得到第一数据。
在一个可选实施例中,对目标算法进行拆分得到元函数集合的过程包括:
确定目标算法中的数据输入节点和数据输出节点;将数据输入节点到相邻的数据输出节点间的数据,从目标算法中拆分出来,得到元函数;确定元函数的集合为元函数集合。
一些实施例中,目标算法中存在数据输入节点和数据输出节点,通过将数据输入节点到与其相连的数据输出节点间的数据作为元函数中的数据,并从目标算法中拆分出来,从而得到多个元函数。
在一个可选实施例中,目标算法通过以下方式得到:
获取原始算法;确定原始算法中的数据调用节点和数据处理结果节点;在数据调用节点配置数据输入节点,数据输入节点配置与调用数据对应的输入参数;以及在数据处理结果节点配置数据输出节点。
其中,原始算法的种类有多种,对于任一算法均可以按照上述的数据调用节点和数据处理结果节点,作为元函数的起始进行拆分。示例性的,原始算法为多方交互式计算算法,如安全多方计算算法。
数据调用节点,是指原始算法中的某一算法片段调用其他算法片段的计算结果或者其他参与方发送的数据时,采用的节点。
数据处理结果节点,是指原始算法中的某一算法片段运算完成后得到的数据结果的节点。
通过在数据调用节点配置数据输入节点,并为该数据输入节点配置与调用数据对应的输入参数,使得该数据输入节点能够识别输入其对应的元函数的数据。以及,通过在数据处理结果节点配置数据输出节点,实现了将原始算法由一个整体,按照数据输入节点和数据输出节点拆分成多个元函数的目的。
需要说明的是,在目标算法拆分完成后,可以根据算法参与方的不同,将每个参与方需要的元函数发送至对应的参与方。
步骤302、缓存第一数据。
一些实施例中,在开始元函数处理得到第一数据后,会将第一数据返回至算法流程控制器中,由算法流程控制器将第一数据缓存。
步骤303、每监测到发生数据缓存操作后,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,通过目标元函数对待处理数据进行数据处理,并返回处理得到的第二数据。若目标元函数调用结束函数,执行步骤304,若目标元函数未调用结束函数,执行步骤305。
一些实施例中,在算法流程控制器监测到数据缓存操作后,便会扫描元函数列表,确定其中可调用的目标元函数,进而由目标元函数对待处理数据进行数据处理,在处理完成后目标元函数将得到的第二数据返回到算法流程控制器中。如此,通过缓存的待处理数据触发目标元函数的调用,实现了自动调用,无需人为参与。
在一个可选实施例中,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,包括:
确定满足调用条件的元函数为目标元函数,调用条件为待处理数据中包括元函数的输入参数对应的所有数据。
一些实施例中,在调用元函数集合中包括多个元函数,在每次算法流程控制器中每次缓存数据后,算法流程控制器根据元函数的调用条件,筛选出能够调用的目标元函数。其中,元函数的调用条件为该元函数的输入参数对应的数据均在缓存的待处理数据中,进而,算法流程控制器通过调用目标元函数,由目标元函数扫描到算法流程控制器中对应的数据,从而完成数据的处理。
在一个可选实施例中,待处理数据包括外部获取的第三数据时,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数之前,还包括:
获取外部发送第一数据类型和第一序列化数据;根据第一数据类型,将字节序列反序列化,得到反序列化数据;确定反序列化数据和第一数据类型为第三数据。
一些实施例中,在目标算法为多方参与计算的算法时,由于涉及到多方数据的交互,在一方的数据通过网络发送至另一方时,数据的传输形式往往为序列化数据。因此,在待处理数据中包括外部获取的第三数据时,由于外部发送的数据为序列化后的数据,即第一序列化数据和对应的第一数据类型,算法流程控制器在获取到外部发送的第一序列化数据和第一数据类型后,会将第一序列化数据进行反序列化,从而将反序列化数据和第一数据类型作为第三数据。通过将算法拆分为多个元函数,并由算法流程控制器对外部发送的数据进行序列化或反序列化,使得算法无需再关注网络层面的数据,无需元数据对外部发送的数据进行序列化或反序列化,提高了算法执行效率。
其中,外部可以是其他算法参与方。
步骤304、确定第二数据为计算结果。
一些实施例中,在确定的目标元函数调用结束函数后,表示在该目标元函数计算完成后,得到的结果变为最终的输出结果,即上述的第二数据为计算结果。
步骤305、缓存第二数据。
一些实施例中,若目标元函数未调用结束函数,则表示该目标元函数计算完成后,算法还需要继续运行,将其计算得到的第二数据缓存到算法流程控制器中,从而触发该方法再次执行步骤203,直至目标元函数调用结束函数。
在一个可选实施例中,第二数据包括加密数据;缓存第二数据之后,还包括:
序列化加密数据,得到第二序列化数据;发送加密数据的第二数据类型和第二序列化数据至数据接受方。
基于上述相关实施例,在目标算法为多方参与计算的算法时,由于涉及到多方数据的交互,在一方的数据通过网络发送至另一方时,数据的传输形式往往为序列化数据。因此,在第二数据中包括加密数据时,该加密数据需要通过网络I/O发送至外部,因此,需要对加密数据进行序列化,将得到的第二序列化数据和加密数据的第二数据类型,发送至数据接受方。
本申请的数据处理方法中,算法的调用可分为初始化阶段和算法执行阶段,对于一个算法的多次调用,只需执行一次初始化阶段。
其中,初始化阶段:算法实例组件通过注册函数将所有元函数的信息注册到算法流程控制器中,算法流程控制器会存储元函数的输入参数类型列表,以及开始元函数和普通元函数本身。
算法执行阶段:控制器首先调用开始元函数,普通元函数列表通过控制器自动调用,最后在元函数中通过算法上下文参数调用结束函数时,传出算法执行结果。
在一个具体实施例中,参见图4以目标算法为安全多方计算算法,包括发起方和参与方为例。
对于算法发起方:发起方的算法流程控制器首先调用开始元函数,执行完成后返回data1数据,存储在缓存中并扫描可调用的普通元函数,扫描到普通元函数1需要data1满足调用要求,进行异步调用;
普通元函数1调用时,异步发送数据msg1(即上述的加密数据)给参与方,执行结束后返回data2,存储在缓存中并扫描可调用的普通元函数,未扫描到可调用的普通元函数,进行等待;
接收参与方发来的msg2数据,存储在缓存中并扫描可调用的普通元函数,扫描到普通元函数4需要data2和msg2满足调用要求,进行异步调用;
普通元函数4调用时通过算法上下文参数调用Finish函数(即上述的结束)传入执行结果,结束算法的调用流程。
对于算法参与方:参与方的算法流程控制器首先调用开始元函数,执行完成后返回data3数据,存储在缓存中并扫描可调用的普通元函数,未扫描到可调用的普通元函数,进行等待;
接收发起方发来的msg1数据,存储在缓存中并扫描可调用的普通元函数,扫描到普通元函数2需要data3和msg1满足调用要求,进行异步调用;
普通元函数2执行结束后返回data4,存储在缓存中并扫描可调用的普通元函数,扫描到普通元函数3需要data4满足调用要求,进行异步调用;
普通元函数3调用时异步发送数据msg2给发起方,执行结束后未返回数据,未触发扫描。
可以理解的是,上述元函数的数量仅用于示例,并不表示只能将算法拆分成了上述数量的元函数。
本申请的数据处理方法,能够解耦网络和算法本身的流程逻辑,算法编写者无需关注网络层面,可聚焦于算法本身更容易的编写复杂的逻辑。并且,算法之间进行嵌套调用方便,算法的部分逻辑很容易复用(通过复用普通元函数)。另外,算法是基于数据驱动进行异步执行,通过将网络传输操作和本地计算操作并行,可以提高算法效率。
基于同一构思,本申请实施例中提供了一种数据处理装置,该装置的具体实施可参见方法实施例部分的描述,重复之处不再赘述,如图5所示,该装置主要包括:
获取模块501,用于在获取到触发指令后,调用开始元函数,通过开始元函数对触发指令中携带的初始计算数据进行处理,得到第一数据;
第一缓存模块502,用于缓存第一数据;
调用模块503,用于每监测到发生数据缓存操作,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,通过目标元函数对待处理数据进行数据处理,并返回处理得到的第二数据;元函数集合是对目标算法拆分后得到的元函数的集合;
确定模块504,用于若目标元函数调用结束函数,确定第二数据为计算结果。
第二缓存模块505,用于若目标元函数未调用结束函数,缓存第二数据。
基于同一构思,本申请实施例中还提供了一种电子设备,如图6所示,该电子设备主要包括:处理器601、存储器602和通信总线603,其中,处理器601和存储器602通过通信总线603完成相互间的通信。其中,存储器602中存储有可被处理器601执行的程序,处理器601执行存储器602中存储的程序,实现如下步骤:
在获取到触发指令后,调用元函数集合中的开始元函数,通过开始元函数对触发指令中携带的初始计算数据进行处理,得到第一数据;元函数集合是对目标算法拆分后得到的元函数的集合;
缓存第一数据;
每监测到发生数据缓存操作后,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,通过目标元函数对待处理数据进行数据处理,并返回处理得到的第二数据;
若目标元函数调用结束函数,确定第二数据为计算结果;
若目标元函数未调用结束函数,缓存第二数据。
上述电子设备中提到的通信总线603可以时外设部件互连标准(Peripheral Component Interconnect,简称PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,简称EISA)总线等。该通信总线603可以分为地址总线、数据总线、控制总线等。为便于表示,图6中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
存储器602可以包括随机存取存储器(Random Access Memory,简称RAM),也可以包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。可选地,存储器还可以是至少一个位于远离前述处理器601的存储装置。
上述的处理器601可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)、网络处理器(Network Processor,简称NP)等,还可以是数字信号处理器(Digital Signal Processing,简称DSP)、专用集成电路(Application Specific Integrated Circuit,简称ASIC)、现场可编程门阵列(Field-Programmable Gate Array,简称FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。
在本申请的又一实施例中,还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机程序,当该计算机程序在计算机上运行时,使得计算机执行上述实施例中所描述的数据处理方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。该计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行该计算机指令时,全部或部分地产生按照本申请实施例所述的流程或功能。该计算机可以是通用计算机、专用计算机、计算机网络或者其他可编程装置。该计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,计算机指令从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、微波等)方式向另外一个网站站点、计算机、服务器或数据中心进行传输。该计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。该可用介质可以是磁性介质(例如软盘、硬盘、磁带等)、光介质(例如DVD)或者半导体介质(例如固态硬盘)等。
需要说明的是,在本文中,诸如“第一”和“第二”等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上所述仅是本申请的具体实施方式,使本领域技术人员能够理解或实现本申请。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所申请的原理和新颖特点相一致的最宽的范围。

Claims (14)

  1. 一种数据处理方法,其特征在于,包括:
    在获取到触发指令后,调用元函数集合中的开始元函数,通过所述开始元函数对所述触发指令中携带的初始计算数据进行处理,得到第一数据;所述元函数集合是对目标算法拆分后得到的元函数的集合;
    缓存所述第一数据;
    每监测到发生数据缓存操作后,根据缓存的待处理数据,调用所述元函数集合中可调用的目标元函数,通过所述目标元函数对所述待处理数据进行数据处理,并返回处理得到的第二数据;
    若所述目标元函数调用结束函数,确定所述第二数据为计算结果;
    若所述目标元函数未调用所述结束函数,缓存所述第二数据。
  2. 根据权利要求1所述的数据处理方法,其特征在于,所述通过所述目标元函数对所述待处理数据进行数据处理,并返回处理得到的第二数据,包括:
    提取所述待处理数据中,所述目标元函数对应的目标待处理数据;
    发送所述目标待处理数据至所述目标元函数,以通过所述目标元函数对所述目标待处理数据进行数据处理,得到所述第二数据,并将所述第二数据返回。
  3. 根据权利要求1所述的数据处理方法,其特征在于,所述根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,包括:
    确定满足调用条件的所述元函数为所述目标元函数,所述调用条件为所述待处理数据中包括所述元函数的输入参数对应的所有数据。
  4. 根据权利要求1所述的数据处理方法,其特征在于,对目标算法进行拆分得到所述元函数集合的过程包括:
    确定所述目标算法中的数据输入节点和数据输出节点;
    将所述数据输入节点到相邻的所述数据输出节点间的数据,从所述目标算法中拆分出来,得到所述元函数;
    确定所述元函数的集合为所述元函数集合。
  5. 根据权利要求4所述的数据处理方法,其特征在于,所述目标算法通过以下方式得到:
    获取原始算法;
    确定所述原始算法中的数据调用节点和数据处理结果节点;
    在所述数据调用节点配置所述数据输入节点,所述数据输入节点配置与调用数据对应的输入参数;
    以及在所述数据处理结果节点配置数据输出节点。
  6. 根据权利要求1所述的数据处理方法,其特征在于,所述待处理数据包括外部获取的第三数据时,所述根据缓存的待处理数据,调用元函数集合中可调用的目标元函数之前,还包括:
    获取外部发送第一数据类型和第一序列化数据;
    根据所述第一数据类型,将所述第一序列化数据进行反序列化处理,得到反序列化数据;
    确定所述反序列化数据和所述第一数据类型为所述第三数据。
  7. 根据权利要求1所述的数据处理方法,其特征在于,所述第二数据包括加密数据;所述缓存所述第二数据之后,还包括:
    序列化所述加密数据,得到第二序列化数据;
    发送所述加密数据的第二数据类型和所述第二序列化数据至数据接受方。
  8. 根据权利要求1至7任一项所述的数据处理方法,其特征在于,
    所述元函数用于描述一段算法逻辑的特殊函数;所述元函数的输入来自于上一步执行的元函数产生的或者来自于算法其他参与方发送来的,所述元函数的输出作为下一步待执行元函数的输入。
  9. 根据权利要求8所述的数据处理方法,其特征在于,
    所述元函数由算法流程控制组件在满足输入要求后调用,通过输入数据驱动执行。
  10. 根据权利要求1至7任一项所述的数据处理方法,其特征在于,所述方法还包括:
    在所述目标算法拆分完成后,根据不同的算法参与方,将每个算法参与方需要的元函数发送至与所述元函数对应的算法参与方。
  11. 根据权利要求1至7任一项所述的数据处理方法,其特征在于,在所述缓存所述第一数据之后,所述方法还包括:
    扫描元函数列表,确定所述元函数集合中可调用的目标元函数;
    其中,所述元函数列表为由算法实例注册而得到的。
  12. 一种数据处理装置,其特征在于,包括:
    获取模块,用于在获取到触发指令后,调用开始元函数,通过所述开始元函数对所述触发指令中携带的初始计算数据进行处理,得到第一数据;
    第一缓存模块,用于缓存所述第一数据;
    调用模块,用于每监测到发生数据缓存操作,根据缓存的待处理数据,调用元函数集合中可调用的目标元函数,通过所述目标元函数对所述待处理数据进行数据处理,并返回处理得到的第二数据;所述元函数集合是对目标算法拆分后得到的元函数的集合;
    确定模块,用于若所述目标元函数调用结束函数,确定所述第二数据为计算结果;
    第二缓存模块,用于若所述目标元函数未调用所述结束函数,缓存所述第二数据。
  13. 一种电子设备,其特征在于,包括:处理器、通信接口、存储器和通信总线,其中,处理器、通信接口和存储器通过通信总线完成相互间的通信;
    所述存储器,用于存储计算机程序;
    所述处理器,用于执行所述存储器中所存储的程序,实现权利要求1-11任一项所述的数据处理方法。
  14. 一种计算机可读存储介质,存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现权利要求1-11任一项所述的数据处理方法。
PCT/CN2022/124128 2021-10-13 2022-10-09 数据处理方法、装置、电子设备和存储介质 WO2023061295A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111194519.4 2021-10-13
CN202111194519.4A CN114003973A (zh) 2021-10-13 2021-10-13 数据处理方法、装置、电子设备和存储介质

Publications (1)

Publication Number Publication Date
WO2023061295A1 true WO2023061295A1 (zh) 2023-04-20

Family

ID=79922755

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/124128 WO2023061295A1 (zh) 2021-10-13 2022-10-09 数据处理方法、装置、电子设备和存储介质

Country Status (2)

Country Link
CN (1) CN114003973A (zh)
WO (1) WO2023061295A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114003973A (zh) * 2021-10-13 2022-02-01 杭州趣链科技有限公司 数据处理方法、装置、电子设备和存储介质
CN116361838B (zh) * 2023-05-23 2023-08-11 华控清交信息科技(北京)有限公司 一种数据处理方法、装置、系统和可读存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015096649A1 (zh) * 2013-12-23 2015-07-02 华为技术有限公司 一种数据处理方法及相关设备
CN109460416A (zh) * 2018-12-12 2019-03-12 成都四方伟业软件股份有限公司 一种数据处理方法、装置、电子设备及存储介质
CN110502530A (zh) * 2019-07-03 2019-11-26 平安科技(深圳)有限公司 数据库函数调用方法、系统、计算机设备及存储介质
US20200097590A1 (en) * 2018-09-24 2020-03-26 Salesforce.Com, Inc. Data system with asynchronous batch processing
CN111797314A (zh) * 2020-06-28 2020-10-20 百度在线网络技术(北京)有限公司 数据处理方法、装置、设备和存储介质
CN113468564A (zh) * 2021-06-30 2021-10-01 华控清交信息科技(北京)有限公司 一种数据处理方法、装置、电子设备及存储介质
CN114003973A (zh) * 2021-10-13 2022-02-01 杭州趣链科技有限公司 数据处理方法、装置、电子设备和存储介质

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015096649A1 (zh) * 2013-12-23 2015-07-02 华为技术有限公司 一种数据处理方法及相关设备
US20200097590A1 (en) * 2018-09-24 2020-03-26 Salesforce.Com, Inc. Data system with asynchronous batch processing
CN109460416A (zh) * 2018-12-12 2019-03-12 成都四方伟业软件股份有限公司 一种数据处理方法、装置、电子设备及存储介质
CN110502530A (zh) * 2019-07-03 2019-11-26 平安科技(深圳)有限公司 数据库函数调用方法、系统、计算机设备及存储介质
CN111797314A (zh) * 2020-06-28 2020-10-20 百度在线网络技术(北京)有限公司 数据处理方法、装置、设备和存储介质
CN113468564A (zh) * 2021-06-30 2021-10-01 华控清交信息科技(北京)有限公司 一种数据处理方法、装置、电子设备及存储介质
CN114003973A (zh) * 2021-10-13 2022-02-01 杭州趣链科技有限公司 数据处理方法、装置、电子设备和存储介质

Also Published As

Publication number Publication date
CN114003973A (zh) 2022-02-01

Similar Documents

Publication Publication Date Title
WO2023061295A1 (zh) 数据处理方法、装置、电子设备和存储介质
RU2745518C2 (ru) Изоляция данных в сети блокчейн
CN110365491B (zh) 业务处理方法、装置、设备、存储介质以及数据共享系统
US20190251557A1 (en) Executing multi-party transactions using smart contracts
EP3742323A1 (en) Blockchain generating method, and related device and system
TW202001656A (zh) 基於區塊鏈的智能合約調用方法及裝置、電子設備
JP2021512380A (ja) 資産管理方法および装置、ならびに電子デバイス
US8386420B2 (en) Framework for web services exposing line of business applications
CN109951547B (zh) 事务请求并行处理方法、装置、设备和介质
TWI706284B (zh) 用於智慧合約的軟體介面
WO2021120854A1 (zh) 模型训练方法、成员探测装置的训练方法及其系统
CN110633110A (zh) 一种服务器的启动方法、设备以及存储介质
CN111260474B (zh) 跨区块链的资产交易方法、装置、设备、系统和存储介质
US20220100777A1 (en) Transaction request construction method and apparatus, transaction request processing method and apparatus, device and storage medium
WO2020155811A1 (zh) 区块链的智能合约执行方法及装置和电子设备
CN109951546A (zh) 基于智能合约的事务请求处理方法、装置、设备和介质
CN113468382B (zh) 基于知识联邦的多方环路检测方法、装置及相关设备
EP3828739B1 (en) Parallelization of authentication strategies
US20110219439A1 (en) Providing support for multiple authentication chains
US20230111782A1 (en) Request processing method based on consortium blockchain, device, and storage medium
WO2022206429A1 (zh) 一种分布式事务实现方法及分布式系统
WO2022143505A1 (zh) 群组类型识别方法、装置、计算机设备及介质
CN113592645B (zh) 数据验证的方法和装置
WO2021078176A1 (zh) 存储过程的运行方法、装置、数据库系统及存储介质
US20190089753A1 (en) Conference system and method for handling conference connection thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22880234

Country of ref document: EP

Kind code of ref document: A1