CN110023944A - A kind of data processing method and relevant device - Google Patents
A kind of data processing method and relevant device Download PDFInfo
- Publication number
- CN110023944A CN110023944A CN201780074039.XA CN201780074039A CN110023944A CN 110023944 A CN110023944 A CN 110023944A CN 201780074039 A CN201780074039 A CN 201780074039A CN 110023944 A CN110023944 A CN 110023944A
- Authority
- CN
- China
- Prior art keywords
- data
- network node
- hashed value
- node
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A kind of data processing method and relevant device, wherein method includes the following steps: that central node obtains the first hashed value of the first data from first network node;The central node obtains first data from the second network node, and calculates the second hashed value of first data;First hashed value is compared the central node with second hashed value;If first hashed value is identical as second hashed value, the central node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value.Effective verifying to institute's storing data can be realized by way of the hashed value of storing data and data respectively using the application, improve the validity of data storage, also improve the tamper-resistance of data.
Description
This application involves field of communication technology more particularly to a kind of data processing method and relevant devices.
Block chain (block chain) is a kind of distributed data base, it can be understood as a kind of a kind of linked data structure for being sequentially in time combined into data block in such a way that sequence is connected, and the distributed account book that can not be distorted He can not forge guaranteed in a manner of cryptography.In the prior art scheme, the block chain that network node generates is the data structure being chained up by the block comprising Transaction Information according to certain sequence, in this data structure, what one or more Transaction Information of composition block main body of the block by the block head comprising metadata and immediately after formed, wherein, one or more Transaction Information is that the data according to caused by device node generate.
For the data that device node generates, prior art is a Transaction Information to be generated according to the data, and by common recognition algorithm, which is generated a block in block chain.If the Transaction Information of the data in this block chain is all replaced and distorted by lawless people in this way, the correctness of this block chain can not be also verified by the block chain, reduce the validity of data storage.
Summary of the invention
The embodiment of the present application provides a kind of data processing method and relevant device, by way of the hashed value of storing data and data respectively, it can be realized effective verifying to institute's storing data, improve the validity of data storage, also improve the tamper-resistance of data.
In a first aspect, the embodiment of the present application provides a kind of data processing method, comprising:
Central node obtains the first hashed value of the first data from first network node;
The central node obtains first data from the second network node, and calculates the second hashed value of first data;
First hashed value is compared the central node with second hashed value;
If first hashed value is identical as second hashed value, the central node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value.
In first aspect, central node obtains the first hashed value of the first data of first network node, and obtains the first data of the second network node, and calculates the second hashed value of the first data, first hashed value and hashed value are compared, and then determine whether the first data are trust data.This scheme realizes effective verifying to institute's storing data, and then improves the validity of data storage.
In an alternative embodiment, if further including that first hashed value and second hashed value be not identical, the central node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
In an alternative embodiment, the central node specifically obtains corresponding first hashed value of the first data from the first hashed value that first network node obtains the first data from the second block chain of first network node;Wherein, the second block chain is that the block generated by the Transaction Information of the hashed value item comprising data forms.
In an alternative embodiment, it is specifically to obtain first data from the first block chain of the second network node that the central node, which obtains first data from the second network node, wherein, the first block chain is what the block generated by the Transaction Information comprising data item formed.
In an alternative embodiment, further include: the central node obtains the first hashed value related information of first data from first network node, and the related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
In an alternative embodiment, further include: the central node obtains the related information of first data from the second network node, and the related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
In an alternative embodiment, the central node is before the first hashed value that first network node obtains the first data, further includes: the central node selects a first network node to be determined as target first network node;And the central node is specifically that the first hashed value of the first data is obtained from the second block chain of target first network node from the first hashed value that first network node obtains the first data.
In an alternative embodiment, the central node selects a first network node to be determined as target first network node, comprising: it is target first network node that the central node selects the first network node of first lawful condition of satisfaction from least one first network node;First lawful condition are as follows: with
The identical number of nodes of the first hashed value of first data of the second block chain of the target first network node is more than first threshold.
In an alternative embodiment, before the central node obtains first data from the second network node, further includes:
The central node selects second network node to be determined as target second network node.And the central node obtains first data from the second network node, comprising: the central node obtains the first data from the first block chain of the target second network node.
In an alternative embodiment, the central node selects second network node to be determined as target second network node specifically to select the network node of second lawful condition of satisfaction from least one second network node being the second target network node;Second lawful condition are as follows: the quantity of network node identical with the first data of the first block chain of the target second network node is more than second threshold.
In an alternative embodiment, further includes: if it is determined that first data are trust datas, then the central node determines that i-th of Transaction Information of third block chain meets formation condition, generates i-th of Transaction Information of third block chain;Or, however, it is determined that first data be can not letter data, then the central node determines that i-th of Transaction Information of the third block chain is unsatisfactory for the formation condition, does not generate i-th of Transaction Information of the third block chain;Or, however, it is determined that first data be can not letter data, then the central node determines that j-th of Transaction Information of the third block chain meets formation condition, generates j-th of Transaction Information of the third block chain.
Second aspect, the embodiment of the present application provide a kind of data processing method, comprising:
Network node generates the block of block chain according at least one the first Transaction Information.Wherein, first Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating first Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
In second aspect, Transaction Information is sent to network node by device node, can alleviate the storage pressure of device node, in addition, generating the block chain about Transaction Information in network node, improves the validity of data storage.
In an alternative embodiment, the network node is according at least one the first Transaction Information, before the block for generating block chain, further includes: the network node receives the data information of at least one device node transmission;The network node generates at least one first Transaction Information according to the data information.As can be seen that
First Transaction Information of the network node is generated by network node.
In an alternative embodiment, the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address.Optionally, in the case where the first Transaction Information is to be generated according to the data information, the information of one or more included in the first Transaction Information is also by the data information determination.
In an alternative embodiment, if the data information includes first data and do not include first hashed value, the network node calculates the first hashed value of first data;It is specifically to generate at least one first Transaction Information according to the data information and first hashed value that the network node, which generates at least one first Transaction Information according to the data information,.Optionally, first Transaction Information can be about first data, alternatively, first Transaction Information is also possible to about first hashed value.
In an alternative embodiment, the network node sends at least one described first Transaction Information to other network nodes or at least one device node.For example, the network node broadcasts at least one described first Transaction Information.
In an alternative embodiment, further includes: the network node receives at least one second Transaction Information that other network nodes or at least one device node are sent;Wherein, second Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating second Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of the data and the recipient of the data.
In an alternative embodiment, further includes: if at least one described first Transaction Information includes data item, the network node is based on the first algorithm according at least one described first Transaction Information, generates the block of the first block chain.
In an alternative embodiment, further include: if at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the second algorithm, the block of the first block chain is generated.
In an alternative embodiment, further includes: if at least one described first Transaction Information includes the hashed value item of data, the network node is based on third algorithm according at least one described first Transaction Information,
Generate the block of the second block chain.
In an alternative embodiment, further include: if at least one described first Transaction Information includes the hashed value item of data, and at least one described second Transaction Information includes the hashed value item of data, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 4th algorithm, the block of the second block chain is generated.
In an alternative embodiment, if at least one described first Transaction Information includes data item, the network node is based on the 5th algorithm according at least one described first Transaction Information, generates the block of the first block chain;With, if at least one described first Transaction Information includes the hashed value item of data, and at least one described second Transaction Information includes the hashed value item of data, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 6th algorithm, the block of the second block chain is generated;Alternatively,
If at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then the network node is based on the 7th algorithm according at least one described first Transaction Information and/or at least one described second Transaction Information, generates the block of the first block chain;It include the hashed value item of data with, at least one described first Transaction Information, then the network node is based on the 8th algorithm, the block of the second block chain of generation according at least one described first Transaction Information.
In an alternative embodiment, in the case where generating about the first block chain comprising the first data for the network node and store the hashed value of the first data, the network node obtains the first hashed value of the first data;First data are obtained from the first block chain, and calculate the second hashed value of first data;First hashed value is compared with second hashed value;If first hashed value is identical as second hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.By way of the hashed value of storing data and data respectively, even if data are tampered, effective verifying to institute's storing data can be realized, improve the validity of data storage, also improve the tamper-resistance of data.
In an alternative embodiment, in the case where generating the second block chain about the first hashed value comprising the first data for the network node and store the first data, institute is obtained from the second block chain
State the first hashed value of the first data;First data of storage are obtained, and calculate the second hashed value of first data;First hashed value is compared with second hashed value;If first hashed value is identical as second hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.By way of the hashed value of storing data and data respectively, even if data are tampered, effective verifying to institute's storing data can be realized, improve the validity of data storage, also improve the tamper-resistance of data.
In an alternative embodiment, the network node is generated about the first block chain comprising the first data and in the case where generating the second block chain about the hashed value comprising the first data, the first hashed value of first data is obtained from the second block chain;First data are obtained from the first block chain, and calculate the second hashed value of first data;First hashed value is compared with second hashed value;If first hashed value is identical as second hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.By way of the hashed value of storing data and data respectively, even if data are tampered, effective verifying to institute's storing data can be realized, improve the validity of data storage, also improve the tamper-resistance of data.
In an alternative embodiment, further includes: the network node sends the block of the data information or block chain to central node.Optionally, the network node can send the block of data information or block chain after the acquisition request of the data information or block that receive central node.
In an alternative embodiment, the network node is according at least one the first Transaction Information, after the block for generating block chain, further include: the network node sends the first notification message at least one described device node, and first notification message is for notifying device node to generate the message of the block of block chain.Optionally, such device node performs corresponding processing data information after receiving the first notification message, for example, deleting.
In an alternative embodiment, further includes: the network node sends first to device node and deletes
Message, the first deletion message are to be used to indicate the device node to delete the data information or delete the instruction message of block.
In an alternative embodiment, further includes: the network node receives at least one described device node is sent second and deletes message, and the second deletion message is at least one described device node for requesting the deletion data information or deleting block.Optionally, the network node is that the device node determines deletable data information or deletable block according to the second deletion message, or, the network node, which can send to delete to device node, allows message, determines deletable data information or deletable block with indicating equipment node itself.
In an alternative embodiment, further includes: the network node determines block to be deleted, any one block chain that the target block chain is stored by the network node from target block chain.
In an alternative embodiment, further includes: multiple Transaction Informations that the block of block chain described in the network node includes are sent to upper level network node.For example, the network node that multiple Transaction Informations are transferred to upper level can be stored, in the case where network node stores the biggish situation of pressure to reduce the storage pressure of the network node.
In an alternative embodiment, further includes: the block to be deleted in target block chain described in the network node is deleted.Optionally, network node determines that block to be deleted is specifically that block to be deleted is determined from target block chain according to default deletion rule from target block chain;Wherein, the default deletion rule are as follows: the block number that the network node stores the target block chain is greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.Optionally, the network node records area's block header content of the block to be deleted, in order to when receiving the query information about the block deleted, determine the node that deleted block stored.
The third aspect, the embodiment of the present application provide a kind of data processing method, comprising:
The network node receives one or more data informations of at least one device node transmission;
The network node generates at least one first Transaction Information according to one or more of data informations.
First Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating first Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
Optionally, data information described in the data information includes at least one of following: time that data, the first hashed value of data, the index value of data, data generate, the mark of the device node, the address of the device node and the network node address.
Optionally, in the case where the first Transaction Information is to be generated according to the data information, the information of one or more included in the first Transaction Information is also by the data information determination.
In second aspect, data information is sent to network node by device node, can alleviate the storage pressure of device node, in addition, Transaction Information can be generated according to data information in network node, to be stored.
In an alternative embodiment, further includes: if the data information includes first data and do not include first hashed value, the network node calculates the first hashed value of first data;It is specifically to generate at least one first Transaction Information according to the data information and first hashed value that the network node, which generates at least one first Transaction Information according to the data information,.
In an alternative embodiment, further includes: the network node sends at least one described first Transaction Information to other network nodes or at least one device node.For example, the network node broadcasts at least one described first Transaction Information.
In an alternative embodiment, further includes: the network node receives at least one second Transaction Information that other network nodes or at least one device node are sent;Wherein, second Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating second Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of the data and the recipient of the data.
In an alternative embodiment, further includes: if at least one described first Transaction Information includes data item, the network node is based on the first algorithm according at least one described first Transaction Information, generates the block of the first block chain.
In an alternative embodiment, further include: if at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the second algorithm, the block of the first block chain is generated.
In an alternative embodiment, further includes: if at least one described first Transaction Information includes the hashed value item of data, the network node is based on third algorithm according at least one described first Transaction Information, generates the block of the second block chain.
In an alternative embodiment, further include: if at least one described first Transaction Information includes the hashed value item of data, and at least one described second Transaction Information includes the hashed value item of data, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 4th algorithm, the block of the second block chain is generated.
In an alternative embodiment, if at least one described first Transaction Information includes data item, the network node is based on the 5th algorithm according at least one described first Transaction Information, generates the block of the first block chain;With, if at least one described first Transaction Information includes the hashed value item of data, and at least one described second Transaction Information includes the hashed value item of data, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 6th algorithm, the block of the second block chain is generated;Alternatively,
If at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then the network node is based on the 7th algorithm according at least one described first Transaction Information and/or at least one described second Transaction Information, generates the block of the first block chain;It include the hashed value item of data with, at least one described first Transaction Information, then the network node is based on the 8th algorithm, the block of the second block chain of generation according at least one described first Transaction Information.
Wherein, " network node is based on the 8th algorithm according at least one described first Transaction Information, generates the block of the second block chain " can be equal to " network node generates the block of the second block chain according at least one described first Transaction Information ".Specifically, the 8th algorithm can be for determining which network node generates the algorithm of block, be also possible to generate block using the 8th algorithm for the network node.Such as the 8th algorithm can be the network node and oneself generate the second all block chain blocks.Participate in generating the block of the second block chain without other network nodes.
Similarly, when network node without and other network nodes block chain is collectively formed, and only network node oneself independently generates all blocks, if forming block chain, then the first algorithm, third algorithm, 5th algorithm can be exactly: network node generates all blocks of block chain.
In short, " network node is based on the 5th algorithm according at least one described first Transaction Information, generates the block of the first block chain ", can be equal to " network node generates the block of the first block chain according at least one described first Transaction Information ";Or, if " at least one described first Transaction Information includes the hashed value item of data; then the network node is based on third algorithm according at least one described first Transaction Information, generates the block of the second block chain " can be equal to " if at least one described first Transaction Information
Hashed value item comprising data, then the network node generates the block of the second block chain according at least one described first Transaction Information ";Or " network node is based on the first algorithm according at least one described first Transaction Information, generates the block of the first block chain " can be equal to " network node generates the block of the first block chain according at least one described first Transaction Information ".
For the network node and other network nodes, if only the network node is individually created the block of all block chains, if other network nodes do not generate block, then for example described 4th algorithm is also that network node generates all block chain blocks.So analogize.The algorithm can be for determining that who generates block.For example, the network node can directly generate block if default is exactly that the network node generates, do not need to judge an algorithm every time.
In an alternative embodiment, further includes: in the case where generating about the first block chain comprising the first data for the network node and store the hashed value of the first data, obtain the first hashed value of the first data;First data are obtained from the first block chain, and calculate the second hashed value of first data;First hashed value is compared with second hashed value;If first hashed value is identical as second hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.By way of the hashed value of storing data and data respectively, even if data are tampered, effective verifying to institute's storing data can be realized, improve the validity of data storage, also improve the tamper-resistance of data.
In an alternative embodiment, further include: in the case where generating the second block chain about the first hashed value comprising the first data for the network node and store the first data, the first hashed value of first data is obtained from the second block chain;First data of storage are obtained, and calculate the second hashed value of first data;First hashed value is compared with second hashed value;If first hashed value is identical as second hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.By way of the hashed value of storing data and data respectively, i.e.,
Data are tampered, can be realized effective verifying to institute's storing data, the validity of data storage is improved, also improves the tamper-resistance of data.
In an alternative embodiment, further include: the network node is generated about the first block chain comprising the first data and in the case where generating the second block chain about the hashed value comprising the first data, the first hashed value of first data is obtained from the second block chain;First data are obtained from the first block chain, and calculate the second hashed value of first data;First hashed value is compared with second hashed value;If first hashed value is identical as second hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.By way of the hashed value of storing data and data respectively, even if data are tampered, effective verifying to institute's storing data can be realized, improve the validity of data storage, also improve the tamper-resistance of data.
In an alternative embodiment, further includes: the network node sends the block of the data information or block chain to central node.Optionally, the network node can send the block of data information or block chain after the acquisition request of the data information or block that receive central node.
In an alternative embodiment, the network node is according at least one the first Transaction Information, after the block for generating block chain, further include: the network node sends the first notification message at least one described device node, and first notification message is for notifying device node to generate the message of the block of block chain.Optionally, such device node performs corresponding processing data information after receiving the first notification message, for example, deleting.
In an alternative embodiment, further includes: the network node sends first to device node and deletes message, and the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
In an alternative embodiment, further includes: the network node receives at least one described device node is sent second and deletes message, and the second deletion message is at least one described device node for requesting the deletion data information or deleting block.Optionally, the network node is that the device node determines deletable data information or deletable block according to the second deletion message, alternatively, the network node, which can send to delete to device node, allows message, deletable number is determined with indicating equipment node itself
It is believed that breath or deletable block.
In an alternative embodiment, further includes: the network node determines block to be deleted, any one block chain that the target block chain is stored by the network node from target block chain.
In an alternative embodiment, further includes: multiple Transaction Informations that the block of block chain described in the network node includes are sent to upper level network node.For example, the network node that multiple Transaction Informations are transferred to upper level can be stored, in the case where network node stores the biggish situation of pressure to reduce the storage pressure of the network node.
In an alternative embodiment, further includes: the block to be deleted in target block chain described in the network node is deleted.Optionally, the network node records area's block header content of the block to be deleted, in order to when receiving the query information about the block deleted, determine the node that deleted block stored.
In an alternative embodiment, the network node determines block to be deleted from target block chain, comprising: according to default deletion rule, block to be deleted is determined from target block chain;Wherein, the default deletion rule are as follows: the block number that the network node stores the target block chain is greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.
Fourth aspect, the embodiment of the present application provide a kind of data processing method, comprising:
Device node sends one or more data information to network node, and the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address;The data information generates the first Transaction Information for the network node.The device node described in this way can reduce the storage pressure of device node in such a way that data information is sent to network node.
Alternatively, device node according to one or more data information, generates at least one second Transaction Information, and at least one described second Transaction Information is sent to network node;Second Transaction Information includes at least one of following corresponding information: data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.The device node described in this way can also reduce the storage pressure of device node in such a way that Transaction Information is sent to network node.
In an alternative embodiment, it is logical to receive the block chain first that network node is sent for the device node
Know message, the message for the block that first notification message is used to that the network node to be notified to generate block chain according to the data information.
In an alternative embodiment, the device node receives the block that network node is sent.
In an alternative embodiment, further includes: the device node receives the network node and sends the first deletion message, and the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.The device node can be in the case where receiving the first deletion message, to data information or onblock executing delete processing.
In an alternative embodiment, further includes: the second deletion message that the device node is sent to the network node, described second, which deletes message, deletes the data information or deletion block for requesting.For example, device node can send second to network node and delete message in the case where storing pressure biggish situation.
In an alternative embodiment, further includes: the device node deletes the data information.
In an alternative embodiment, it is specifically that will generate the data information that duration is more than first time threshold to delete that the device node, which deletes data information, can reduce the storage pressure of device node in this way.
In an alternative embodiment,
5th aspect, the embodiment of the present application provide a kind of central node, comprising:
Module is obtained, for obtaining the first hashed value of the first data from first network node;
Computing module for obtaining first data from the second network node, and calculates the second hashed value of first data;
Comparison module, for first hashed value to be compared with second hashed value;
Determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value.
The central node that the 5th aspect of the embodiment of the present application provides is used to execute the data processing method of the application first aspect offer, and the specific description that can be found in the embodiment of the present application first aspect, details are not described herein.
It include processor and transceiver in the structure of central node in a possible design, the processor is used to execute the data processing method of the application first aspect offer.It optionally, can also include memory, the memory is used to store the application code that Support center node executes the above method, the processor is configured to for executing the application program stored in the memory.
6th aspect, the embodiment of the present application provide a kind of network node, comprising:
Block generation module, for generating the block of block chain according at least one the first Transaction Information.
First Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating first Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
The network node that the 6th aspect of the embodiment of the present application provides is used to execute the data processing method of the application second aspect offer, and the specific description that can be found in the embodiment of the present application second aspect, details are not described herein.
7th aspect, the embodiment of the present application provide another network node, comprising:
Receiving module, for receiving one or more data informations of at least one device node transmission;
Generation module, for generating at least one first Transaction Information according to one or more of data informations.First Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating first Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
The network node that the 7th aspect of the embodiment of the present application provides is used to execute the data processing method of the application third aspect offer, and the specific description that can be found in the embodiment of the present application third aspect, details are not described herein.
It include processor and transceiver in the structure of network node in a possible design, the processor is used to execute the data processing method that the application second aspect or the third aspect provide.It optionally, can also include memory, the memory is used to store the application code for supporting network node to execute the above method, the processor is configured to for executing the application program stored in the memory.
Eighth aspect, the embodiment of the present application provide a kind of device node, comprising:
Sending module, for sending one or more data information to network node, the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address;
The data information generates the first Transaction Information for the network node;
Alternatively,
Generation module, for generating at least one second Transaction Information, and at least one described second Transaction Information is sent to network node according to one or more data information;
Second Transaction Information includes at least one of following corresponding information: data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
The device node that the embodiment of the present application eighth aspect provides is used to execute the data processing method of the application fourth aspect offer, and the specific description that can be found in the embodiment of the present application fourth aspect, details are not described herein.
It include processor and transceiver in the structure of device node in a possible design, the processor is used to execute the data processing method of the application fourth aspect offer.It optionally, can also include memory, the memory is used to store the application code that holding equipment node executes the above method, the processor is configured to for executing the application program stored in the memory.
9th aspect, the embodiment of the present application provides a kind of computer storage medium, and for being stored as computer software instructions used in above-mentioned central node, it includes for executing program designed by above-mentioned aspect.
Tenth aspect, the embodiment of the present application provides a kind of computer storage medium, and for being stored as computer software instructions used in above-mentioned network node, it includes for executing program designed by above-mentioned aspect.
Tenth on the one hand, and the embodiment of the present application provides a kind of computer storage medium, and for being stored as computer software instructions used in above equipment node, it includes for executing program designed by above-mentioned aspect.
In the embodiment of the present application, central node, network node, device node, first network node, the second network node name do not constitute restriction to equipment itself, in practical implementations, these equipment can occur with other titles.As long as the function of each equipment is similar with the application, belong within the scope of the claim of this application and its equivalent technologies.
In the embodiment of the present application, it is stored by the way that one or more first data in device node are sent to other network nodes, the storage pressure of device node can be alleviated, in addition, storing data and hashed value can be distinguished within network nodes, in the case where being all tampered even from data, data can be verified by the hashed value of storage, therefore improve the tamper-resistance of data in this way.
Fig. 1 is a kind of possible network structure provided by the embodiments of the present application;
Fig. 2 is alternatively possible network structure provided by the embodiments of the present application;
Fig. 3 is a kind of flow diagram of data processing method provided by the embodiments of the present application;
Fig. 4 is the flow diagram of another data processing method provided by the embodiments of the present application;
Fig. 5 is the flow diagram of another data processing method provided by the embodiments of the present application;
Fig. 6 is the flow diagram of another data processing method provided by the embodiments of the present application;
Fig. 7 is the flow diagram of another data processing method provided by the embodiments of the present application;
Fig. 8 provides a kind of modular diagram of central node for the embodiment of the present application;
Fig. 9 provides the structural schematic diagram of another central node for the embodiment of the present application;
Figure 10 provides a kind of modular diagram of network node for the embodiment of the present application;
Figure 11 provides the structural schematic diagram of another network node for the embodiment of the present application;
Figure 12 provides a kind of modular diagram of device node for the embodiment of the present application;
Figure 13 provides the modular diagram of another device node for the embodiment of the present application;
Figure 14 provides a kind of structural schematic diagram of device node for the embodiment of the present application.
With reference to the accompanying drawing, embodiments herein is described.
Referring to Figure 1, a kind of possible network architecture diagram is provided for the embodiment of the present application.It include first network node, the second network node and device node in the network architecture described in Fig. 1.Device node is the source for acquiring data or generating data, and first network node can be used for the data of storage devices node transmission, and the second network node can be used for storing the hashed value generated by the data in device node.It in this way in the limited situation of the storage capacity of device node, can also be stored by other network nodes, alleviate the storage pressure of device node.
Further, respective block chain can be generated in first network node and the second network node, for example, first network node can generate the second block chain according to the hashed value for the data that device node is sent, the data that the second network node can be sent according to device node generate the first block chain.Storing data and hashed value are distinguished by block chain, even if in the case where being all tampered by the total data of data the first block chain generated, the data in the first block chain can be verified by the hashed value of the second block chain, therefore improve the tamper-resistance of data in this way.
Further, Fig. 2 is referred to, alternatively possible network architecture diagram is provided for the embodiment of the present application.It include first network node and device node in the network architecture described in Fig. 2.Device node is identical as device node function shown in FIG. 1, and first network node shown in Fig. 2 both can store the data of device node transmission, can be also used for storing the hashed value generated by the data in device node.Still it can alleviate the storage pressure of device node by way of first network node storing data and hashed value in the limited situation of storage capacity of device node under the network architecture shown in Fig. 2.
Further, the data that first network node can be sent according to device node generate the first block chain, and the hashed value of the data sent according to device node generates the second block chain.It realizes through block chain and distinguishes storing data and hashed value, even if in the case where being all tampered by the total data of data the first block chain generated, the data in the first block chain can be verified by the hashed value of the second block chain, therefore improve the tamper-resistance of data in this way.
Device node involved in the application may include industrial equipment node, all types of industries sensor, control unit etc.;It can also include wearable device, household electrical appliance, home sensor, home control unit etc.;It can also include user equipment, include mobile phone, intelligent terminal, multimedia equipment, stream media equipment etc..The application does not do any restrictions to the form and type of device node.The ability that device node has data acquisition and/or data are sent.
Network node involved in the application is the equipment for having storage, communication function, perhaps data hash value and receives the abilities of data or hashed value from other network nodes for example, having the data of receiving device node.Network node can be base station, gateway (gateway), networked storage units, Cloud Server, computer equipment etc..
Refer to Fig. 3, a kind of flow diagram of data processing method is provided for the embodiment of the present application, as shown in Figure 3, first network node, the second network node involved in the embodiment of the present application and device node and central node, wherein data processing method is by central node in execution, and specific implementation procedure refers to described in detail below.
101, central node obtains the first hashed value of the first data from first network node.
Optionally, the first network node can directly store the first hashed value of first data, or, first hashed value of first data is stored in the second block chain in the first network node, wherein, the second block chain is that the block generated by the Transaction Information of the hashed value item comprising data forms.
Optionally, the central node obtains the first hashed value related information of first data from first network node, and the related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
102, the central node obtains first data from the second network node, and calculates the second hashed value of first data.
Optionally, second network node can directly store first data, alternatively, first data are stored in the first block chain in second network node, wherein the first block chain is what the block generated by the Transaction Information comprising data item formed.
The central node obtains the related information of first data from the second network node, and the related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
It should be noted that the block chain for storing the first data is set as the first block chain, the network node of the first block chain of storage is set as the second network node in embodiments herein.The block chain for storing the first hashed value of the first data is set as the second block chain, the network node for storing the second block chain is set as first network node, but whether the first data are stored in the first block chain, and first first hashed value of data whether be stored in the second block chain, the embodiment of the present application does not limit.Next, completing the description to the embodiment of the present application based on the above setting.
In first optional scheme, the first hashed value of the first data is not stored in the second block chain of first network node, but directly stored by first network node;And the first data are stored in the first block chain of the second network node.In this scheme, central node directly acquires the first hashed value of the first data to first network node;Central node obtains first data by the first block chain of the second network node, and calculates the second hashed value of first data.Then the central node executes step 103 and first hashed value is compared with second hashed value, and obtains the comparison result such as step 104 or step 105.
In second optional scheme, the first hashed value of the first data is stored in the second block chain of first network node;And the first data are not stored in the first block chain of the second network node, but directly stored by the second network node.In this scheme, central node obtains the first hashed value of the first data by the first block chain of first network node;Central node directly acquires the first data to the second network node, and calculates the second hashed value of the first data.Then the central node executes step 103 and first hashed value is compared with second hashed value, and obtains the comparison result such as step 104 or step 105.
In the optional scheme of third, the first hashed value of the first data is stored in the second block chain of first network node;First data are stored in the first block chain of the second network node.In this scheme, central node obtains the first hashed value of the first data by the second block chain of first network node;Centromere
O'clock first data are obtained by the first block chain of the second network node, and calculate the second hashed value of first data.Then the central node executes step 103 and first hashed value is compared with second hashed value, and obtains the comparison result such as step 104 or step 105.
103, first hashed value is compared the central node with second hashed value.
104, if first hashed value is identical as second hashed value, the central node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value.
106, however, it is determined that first data are trust datas, then the central node determines that i-th of Transaction Information of third block chain meets formation condition, generate i-th of Transaction Information of third block chain.
Specifically, the central node can set whether first data are feasible data, it is set as the central node to judge whether to generate the formation condition of i-th of Transaction Information of third block chain, in this way after determining that the first data are trust data, it determines that i-th of Transaction Information of third block chain meets formation condition, and generates i-th of Transaction Information.
105, if first hashed value and second hashed value be not identical, the central node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
107, however, it is determined that first data be can not letter data, then the central node determines that i-th of Transaction Information of the third block chain is unsatisfactory for the formation condition, does not generate i-th of Transaction Information of the third block chain.
Specifically, the central node in conjunction with described in step 106 to whether generate third block chain i-th of Transaction Information formation condition setting, it can not be after letter data determining that first data are, it determines that i-th of Transaction Information of the third block chain is unsatisfactory for the formation condition, does not generate i-th of Transaction Information of the third block chain.
It is further alternative, however, it is determined that first data be can not letter data, then the central node determines that j-th of Transaction Information of the third block chain meets formation condition, generates j-th of Transaction Information of the third block chain.
For the scheme of step 106 and step 107, for example:
Step 106, such as to generate the condition of i-th of chain of third block transaction be determining first data be trust data, when the first data are trust datas, handles certain things, example using first data
It such as transfers the first data and does big data analysis, do various data analyses and extract, herein with no restrictions.
Such as first data be PM2.5 measured value, extract first data of (such as 1 week) in a period of time, multiple first data calculated according to the first data to calculate the PM2.5 concentration in this period, to obtain the air quality in this week.
Such as first data be industrial equipment instrument measurement data value,, first data in (such as 1 week) are extracted in a period of time, the measured data values more than thresholding 1 are obtained according to the first data, number and corresponding time by data, to judge instrument fault rate.
Such as first data be hospital sufferer case history, the first data are called in the case where the first data are trust datas by government organs or the third-party institution (reimbursement unit) or hospital, foreign side.
Such as i-th of Transaction Information are as follows: call the first data, Transaction Information specifically includes at least one of following: calling the user identifier of the first data, call the time of the first data, call the permission of the first data, the index value of first data, source (sender address) of the first data etc..
Generate the condition of i-th of transaction are as follows: when the trust data of the first data, call the first data.It calls the first data to can be used for carrying out big data analysis, can check first data etc..
Similarly, for j-th of Transaction Information of step 107 and similar.Such as jth transaction can be with are as follows: calls the first data.Jth Transaction Information can be central node and send error in data message to equipment 1.Therefore the condition of j-th of Transaction Information is generated are as follows: when the first data are trust data, call the first data;Or generate j-th of Transaction Information condition are as follows: when the first data be can not letter data when, central node send error in data message to equipment 1;
Certainly formed block chain Transaction Information, can be it is various, the application do not limit third block chain transaction content and form, the Transaction Information of third block chain, be not limited to be call the first data.By taking bit coin as an example, transaction is exactly that sender A gives recipient B a sum of money (such as 10 yuan).But inside Internet of Things, the movement that equipment executes is exactly a kind of Transaction Information, such as equipment A has sent an information to equipment B.Or calling the data of equipment A is exactly a kind of Transaction Information.
Step 106 and step 107 are optional steps.
It is another it should be noted that in the embodiment of the present application to central node, first network node, the second network node whether be the different equipment for having communication or store function without limitation.Next the achievable mode of central node, first network node and the second network node is carried out with description.
In optional option A, central node, first network node and the second network node are physically to divide
From the equipment for having communication or store function, for example, first network node is base station, the second network node is that storage equipment, central node are third party device.Wherein, the first data can be the data that the storage of the second network node is sent to by device node;First hashed value of the first data can be the hashed value that the data of first network node are sent to by device node, alternatively, the first hashed value of the first data is that the first data that first network node is sent according to device node are generated.
It is further alternative based on optional option A, in the case where including multiple equipment node, multiple first network nodes, multiple second network nodes in system as shown in Figure 1.Wherein, second block chain is the multiple first network node, it is generated based on algorithm (such as common recognition algorithm), in the central node before obtaining the first hashed value of the first data in the second block chain of first network node, a first network node can be selected to be determined as target first network node from multiple first network nodes.In a kind of optional scheme, the central node can choose at random a first network node and be determined as target first network node.Alternatively, it is target first network node that the central node selects the first network node of first lawful condition of satisfaction from least one first network node in another optional scheme.Wherein, first lawful condition are as follows: number of nodes identical with the first hashed value of the first data of the second block chain of the target first network node is more than first threshold.Such as, assuming that the quantity of first network node is 10, first threshold is 5, central node obtains the first hashed value of first data in the block for being stored with first data, if there are the first hashed values of the first data of 3 kinds of numerical value in multiple first network nodes, the quantity of the first hashed value of the first data of each numerical value is then counted respectively, the quantity of the first hashed value of same numerical value is more than 5 if it exists, then selects one in the first network node where the first hashed value from the numerical value and be determined as target first network node.
In the system shown in figure 1, it is further alternative, first block chain is the multiple second network node, it is generated based on algorithm, in the central node before obtaining the first data in the first block chain of the second network node, second network node can be selected to be determined as target second network node from multiple second network nodes.In a kind of optional scheme, the central node can choose at random second network node and be determined as target second network node.Alternatively, it is target second network node that the central node selects the second network node of second lawful condition of satisfaction from least one second network node in another optional scheme.Wherein, second lawful condition are as follows: number of nodes identical with the first data of the first block chain of the target second network node is more than second threshold.For example, it is assumed that the quantity of the second network node is 10, second threshold 5, central node obtains institute in the block for being stored with first data
State the first data, if there are the first data of 3 kinds of numerical value in multiple second network nodes, the quantity of the first data of each numerical value is then counted respectively, the quantity of the first data of same numerical value is more than 5 if it exists, then selects one in the second network node where the first data from the numerical value and be determined as target second network node.
In optional option b, first network node and the second network node are the physically separated equipment for having communication or store function, and central node is any of first network node or the second network node.Wherein, the first data can be the data that the storage of the second network node is sent to by device node;First hashed value of the first data can be the hashed value that the data of first network node are sent to by device node, alternatively, the first hashed value of the first data is that the first data that first network node is sent according to device node are generated.
Optionally, be storage equipment using first network node as base station, the second network node with reference to system architecture shown in FIG. 1, central node is that first network node is illustrated.Since central node is first network node, first network node can select one to be determined as target second network node from multiple second network nodes, and specific selection method may refer to the specific introduction in optional option A, and details are not described herein.Since the difference of first network node and the second network node is in the block chain for being stored with different data, such as, second network node is stored with the first block chain of the first data, first network node is stored with the second block chain of the hashed value of the first data, therefore, central node is that the scheme of the second network node can be the description of first network node with reference to optional option b central node, and details are not described herein.
In optional scheme C, first network node and the second network node are the same equipment for having communication or store function, and central node is third party device.Referring to fig. 2, in system architecture shown in Fig. 2, first hashed value of the first data and the first data is stored in first network node, the first data that first network node can be sent by receiving device node are stored or are generated the block of the first block chain, and the first network node described in memory phase calculates the first hashed value of the first data and is stored or generated the block of the second block chain according to the first data received.
Based on optional scheme C, it is further alternative, first block chain is to receive the first network nodes of first data to generate, and the second block chain is that multiple first network nodes are based on algorithm (such as common recognition algorithm) and are generated according to the first hashed value of the first data.Alternatively, the first block chain is that multiple first network nodes are based on algorithm (such as common recognition algorithm) and are generated according to the first data;Second block chain be receive first data first network node first calculate obtain the first hashed value so that generate.
It is the first network node for receiving first data in the first block chain in a kind of optional scheme
It generates, and second block chain be in the case that multiple first network nodes are based on algorithm (such as common recognition algorithm) and are generated according to the first hashed value of the first data, when the central node executes step 101, a target first network node, then the first hashed value from the first data obtained in the second block chain in target first network node can be first determined from multiple first network nodes;The central node executes step 102 and can directly obtain from the first network node where the first data.
It is that multiple first network nodes are based on algorithm (such as common recognition algorithm) and according to the generation of the first data in the first block chain in another optional scheme;Second block chain be receive first data first network node first calculate obtain the first hashed value so that generate, when central node executes step 101, it can be obtained from receiving first data and calculating in first network node the second block chain generated for obtaining the first hashed value, when executing step 102 for central node, a target first network node can be first determined from multiple first network nodes, then from the first data obtained in the first block chain in target first network node.
Wherein, for from determining that the scheme of target first network node can be with reference to the specific introduction in optional option A in multiple first network nodes, details are not described herein.
In optional scheme D, central node, first network node and the second network node are the same equipment for having communication or store function.Specific central node is referred to specifically introduce in optional scheme C in the specific implementation for executing step 101 and step 102, and details are not described herein.
In the embodiment of the present application, central node obtains the first hashed value of the first data of first network node, and obtains the first data of the second network node, and calculates the second hashed value of the first data, first hashed value and hashed value are compared, and then determine whether the first data are trust data.This scheme can be realized effective verifying to institute's storing data, and then improve the validity of data storage.In addition in the scene of block chain for generating the block chain about the first data and the first hashed value about the first data respectively, even from data the first block chain generated data be all tampered in the case where, the data in the first block chain can be verified by the hashed value of the second block chain, therefore improve the tamper-resistance of data in this way.
Fig. 4 is referred to, provides a kind of flow diagram of data processing method for the embodiment of the present application, as shown in figure 4, first network node involved in the embodiment of the present application, other first network nodes, the second network node, other second network nodes and device node.Wherein, first network node and the second network node are
Different communication equipments, the network architecture shown in FIG. 1 can be referred to, the data processing method is completed jointly by the above node, wherein, the device node is during executing step 201 to step 210, the device node is any one in the multiple equipment node for establish communication connection with second network node, and further, the device node can execute step 211 to step 216 to the first network node for establishing communication connection.Specific implementation procedure refers to described in detail below.
201, device node sends one or more data information to the second network node.
Wherein, in the step 201 of the embodiment of the present application, the data information includes the first data, can also include at least one of the following: the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address.Optionally, the temporal information of first data can be the sending time of first data or the generation time of first data, the embodiment of the present application do not limit this.
It should be noted that the first data have been sent to the second network node by step 201 device node;Step 211, the hashed value of the first data has been sent to first network node by device node.Step 201 and step 211 execution order are in no particular order.
For example, it may refer to table 1, table 1 is a kind of possible data information.
Table 1
Correspondingly, the second network node receives one or more data information that the device node is sent.
202, second network node generates at least one first Transaction Information according to one or more of data informations.
Wherein, if the data information is one, first Transaction Information is can be generated in second network node.If the data information be it is multiple, one first transaction can be generated in second network node
Information, or generate multiple first Transaction Informations for being not more than the data information quantity.Optionally, first Transaction Information includes at least one of following corresponding information: transaction ID, data item, the hashed value of data, the node identification item for generating first Transaction Information, the index value item of data, temporal information item, sender's item of data and the recipient of data.Wherein temporal information item can be the generation time of the sending time or transaction that refer to data, and the embodiment of the present application does not limit this.
Suitable for all embodiments of the application, either described first Transaction Information or other Transaction Informations: assuming that in the case where the first Transaction Information, which is, indicates the Transaction Information of the first data, wherein, the corresponding information of data item is the first data, the corresponding information of hashed value item of data is the hashed value of the first data, the corresponding information of index value item of data is the index value of data, the corresponding information of data sending item is the sender address of data, the corresponding information of recipient of data is the recipient address of data, the corresponding information of the identification item of device node is the mark of device node, the corresponding information of node identification item of first Transaction Information is generated as network node mark.
Further, for example, the case where generating first Transaction Information according to multiple data informations for second network node, second network node are to generate a data packet by be packaged by multiple data informations, and then generate first Transaction Information to a data packet.Optionally, the embodiment of the present application to by multiple data informations generate less than data information quantity the first Transaction Information quantity without limitation.Since the embodiment of the present application can be related to other Transaction Informations, all indicated here with A1 by whether one or multiple first Transaction Informations that the second network node generates, to be distinguish.
It is exemplified by Table 1, three Transaction Informations can be generated in second network node, as shown in table 2.
Table 2
Explanation is needed further exist for, for including hashed value item in Transaction Information the case where refers to table 2A.
Table 2A
Explanation is needed further exist for, table 2 can also be identified in the form of table 2B,.
Table 2B
Due in first Transaction Information, data item refers to the first data, the index value item of data refers to the index value of the first data, data sending item refers to the sender address of data, recipient's item of data refers to the recipient address of data, the identification item of device node refers to that the mark of device node or network node identification item refer to that network node identifies.And so on, use all embodiments of the application.Table 3, perhaps table 7 can similarly have corresponding table 3B table 4B table 5B table 6B or table 7B to 4 table of table, 5 table 6, not repeat one by one.First Transaction Information involved in the application in a word, the Transaction Informations such as second Transaction Information, above-mentioned identity relation can be applicable in.
Alternatively, two Transaction Informations can be generated in second network node, as shown in table 3.
Table 3
Illustrate in table 3, the data 1 in 1 data item of trading are exactly the first data, in data index value item 100 be data 1 index value item.And so on, it does not repeat one by one.
Alternatively, two Transaction Informations can be generated in second network node, as shown in table 4.
Table 4
203, at least one described first Transaction Information that second network node generates is sent to other the second network nodes.
Wherein, the second network node involved in the embodiment of the present application is any one in multiple second network nodes, and other second network nodes are other second network nodes in multiple second network nodes other than this second network node.
Correspondingly, any second network node in other second network nodes receives at least one described first Transaction Information A1.
Optionally, second network node can execute step 204, at least one first Transaction Information according to receiving generates the block in the first block chain.The first block chain in the step is indicated with L1.
For example, as shown in table 5, a kind of block optionally generated by least one described first Transaction Information is given, and the first Transaction Information shown in table 5 is generated by a data information.If the first Transaction Information is the case where generation by multiple first Transaction Informations, to may refer to shown in table 6.
Table 5
Table 6
205, at least one second Transaction Information that other described second network nodes are sent to second network node.
Wherein, in the embodiment of the present application, the second Transaction Information that other second network nodes are sent is indicated with A2, it should be noted that, here the second Transaction Information A2 and the first Transaction Information A1 includes data item, and then can be realized the block for generating and being generated in the first block chain by the Transaction Information that data item generates.
For example, specifically, the second network node is, for example, network node A, the data information that the device node A received based on it is sent includes first data in data information, and first data are, for example, data A.Network node A is based on data A, according to the mode for generating the first transaction in step 303, generates the first Transaction Information A1.Other second network nodes are, for example, the data information for the device node B transmission that network node B is received based on it, include first data in data information, first data are, for example, data B.Network node B is based on data B, according to the mode for generating the first transaction in above-mentioned steps 303, generates the second Transaction Information A2.
Optionally, the generating mode of the second Transaction Information is identical as the generating mode of the first Transaction Information in the embodiment of the present application, specifically can be with reference to the detailed description in step 201 to step 202, and details are not described herein.
Correspondingly, second network node receives at least one second Transaction Information of other second network nodes transmission.
206, second network node generates the block in the first block chain according to the first Transaction Information and/or second Transaction Information.
Optionally, the first block chain block that the second network node generates is broadcast to other network nodes.
It in the present embodiment, is by the second network node come for generating the first block chain block.Indeed, it is possible to be the block that other network nodes (such as network node B) generate the first block chain according to the first Transaction Information B1 and the second Transaction Information B2.Similarly, the first block chain block of generation is broadcast to other the second network nodes (other network nodes other than network node B, the second network node) by other second network nodes (such as network node B).Such as be that the second network node generates block in a kind of situation, it is that other network nodes generate block in a kind of situation.Second network node and other network nodes can determine that who generates i-th of block according to some algorithm (i is the natural number more than or equal to 1).In short, according to above-mentioned steps, the and network node and other network nodes form the first block chain.
Wherein, what the first block chain in the first block chain and step 204 of step 206 was all made of the block generated of the Transaction Information comprising data item, but the first block chain institute of two steps according to Transaction Information it is different, therefore be distinguish by the first block chain L1 and the first block chain L2.
Further, during generating the block of the first block chain L2, second network node and other second network nodes are needed based on preset mechanism or algorithm (such as common recognition algorithm), to determine the block generated in the first block chain L2 by which network node.With algorithm citing of knowing together, wherein preset common recognition algorithm is in order to calculate the algorithm which the second network node in multiple second network nodes has the write-in block in the first block chain L2, if one of target second network node obtains in the firstth area
The right of block is written in block chain L2, then node of this block into multiple second network nodes in addition to target second network node is sent the block of write-in by target second network node, so as to which the block is stored in respective first block chain L2 after each second network receives this block.Common recognition algorithm can be but be not limited only to, e.g. practical Byzantine failure tolerance (PBFT) common recognition algorithm, Paxos/Raft algorithm, proof of work Proof-of-Work (PoW), equity holding prove Proof-of-Stake (PoS).About preset mechanism or algorithm, above content is suitable for all embodiments of the application.
Algorithm can also be mechanism in the application, and algorithm can be common recognition algorithm or other algorithms, and the application is without limitation.The application mostly illustrates application content with algorithm of knowing together.In addition in the present invention, the preset mechanism or algorithm can know together mechanism or common recognition algorithm, generate the right of block for determining which network node has, the preset mechanism or algorithm can also be the algorithm that block how is generated for network node.In a word as mechanism or algorithm be specifically defined and purposes, the present invention do not do excessive limitation.It is above-mentioned to be suitable for full text.
In all embodiments and application content of the application, common recognition algorithm can be equal to common recognition mechanism, and algorithm can be equal to mechanism.
For the first algorithm involved in text of the statement, the second algorithm, third algorithm, the 4th algorithm etc., two algorithms can be the same algorithm each other, be also possible to different algorithm.In the embodiment of the present application with no restrictions.
For the first algorithm involved in text of the statement, the second algorithm, third algorithm, the 4th algorithm etc., the algorithm can be common recognition algorithm, may not be common recognition algorithm.In most embodiment, we illustrate problem with common recognition algorithm, but the application does not do the restriction on any algorithm.
207, after generating the first block chain, second network node sends the first notification message to device node.
Wherein, the message for the block that first notification message is used to that the second network node described in device node to be notified to generate block chain according to the data information.Optionally, the first notification message can be sent after generating the first block chain L1 and generating any one block chain in the second block chain L2.It should be noted that step 207 is optional step.
Correspondingly, the device node receives the first notification message that second network node is sent.
210, after generating the first block chain, the device node will delete the data information.
Optionally, the device node can will generate the data information that time duration is more than first time threshold and delete.The device node can generate duration by recording the generation duration of the data information
In the case where more than first time threshold, it is deleted.
Further, optionally, second network node executes step 209, and Xiang Suoshu device node sends first and deletes message.Correspondingly, the device node executes step 210 after receive the transmission of the second network node first deletes message.Wherein, the first deletion message is the instruction message for being used to indicate the device node and deleting data information.In optional scheme, second network node can indicate the data information to be deleted in the first deletion message.In another optional scheme, second network node can also not denote that the data information of deletion, voluntarily be determined by device node, and the described in this way first effect for deleting message is that notice device node executes deletion data information.
Further, optionally, second network node executes step 209, is also possible to after second network node receives the second deletion message of device node transmission, the first deletion message that Xiang Suoshu device node is sent.Wherein, the second deletion message is at least one described device node for requesting deletion data information.The message that second deletion message can feed back a first deletion message comprising allowing or not allow to delete for the device node to message the second network node described in this way that second network node is applied for whether allowing to delete some perhaps multiple data information.Or, second deletion message may be the message for the data information that the device node can be deleted to second network node request for the device node determination, the second network node described in this way can determine a data information to be deleted, and be added in the first deletion message and be sent to the device node.The embodiment of the present application second deletes the used mode of message without limitation.
Next it describes in detail to the interactive process of first network node and device node.
211, the device node sends one or more data information to first network equipment.
Wherein, in the step 211 of the embodiment of the present application, the data information includes the hashed value of the first data, wherein the first data are content included by the data information in step 201.The device node is by sending the first data to the second network node, the hashed value of the first data is sent to first network node, the hashed value of the first data and the first data is stored respectively in this way, instant first data are tampered, the first data can also be verified by hashed value, to improve the tamper-resistance of data.The data information can also include at least one of the following: the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address.Optionally, the temporal information of first data can be the generation time of the sending time of the hashed value of first data or the hashed value of first data or the generation time of first data, the embodiment of the present application do not limit this.
Correspondingly, the first network node receives one or more data information that the device node is sent.
212, the first network node generates at least one first Transaction Information according to one or more of data informations.
Wherein, the first Transaction Information here is generated in first network node, is indicated using B1, to be distinguish.The generating mode of first Transaction Information B1 is identical as the generating mode of the first Transaction Information A1, and then can be with reference to the detailed description in step 202, and details are not described herein.
213, at least one first Transaction Information described in generation is sent to other first network nodes by the first network node.
Optionally, the first network node can execute step 204, at least one first Transaction Information according to receiving generates the block in the second block chain.The second block chain in the step is indicated with L3.Generating for the block of second block chain L3 can be with reference to the generating mode of the first block chain L1 in step 203, and details are not described herein.
215, at least one second Transaction Information that other described first network nodes are sent to the first network node.
Wherein, the second Transaction Information is indicated with B2 in this step.
216, the first network node generates the block in the second block chain according to the first Transaction Information and/or second Transaction Information.
Optionally, the second block chain block of generation is broadcast to other network nodes by first network node.
It in the present embodiment, is by first network node come for generating the second block chain block.Indeed, it is possible to be the block that other network nodes (such as network node B) generate the second block chain according to the first Transaction Information B1 and the second Transaction Information B2.Similarly, the second block chain block of generation is broadcast to other network nodes (other network nodes other than network node B, first network node) by other network nodes (such as network node B).Such as be that first network node generates block in a kind of situation, it is that other network nodes generate block in a kind of situation.First network node and other network nodes can determine that who generates i-th of block according to some algorithm (such as common recognition algorithm) (i is the natural number more than or equal to 1).In short, first network node and other network nodes form the second block chain according to above-mentioned steps.
Wherein, the second block chain in this step is indicated with L4.First network node generates the mode of the second block chain L4 according to the first Transaction Information B1 and/or the second Transaction Information B2, generates the side of the first block chain L2 according to the first Transaction Information A1 and/or the second Transaction Information A2 with the second network node
Formula is identical, specifically can be with reference to the detailed description in step 206, and details are not described herein.
Further, optionally, the first network node can also send the first notification message to device node after generating the second block chain, for notifying first network node described in device node to generate the message of the block of block chain according to the data information.
Further, the hashed value of first data can be sent to central node by the first network node, first data can be sent to central node by second network node, so that central node calculates the second hashed value of first data, and the second hashed value and the first hashed value are compared, to examine whether the first data are tampered, if for trust data etc., concrete implementation process can refer to the specific descriptions of embodiment illustrated in fig. 1, and details are not described herein.
Further alternative, the first network node or the second network node can determine block to be deleted from target block chain.
Wherein, for first network node, the target block chain is the second block chain L3 or the second block chain L4 in the first network node;For the second network node, the target block chain is the first block chain L1 or the first block chain L2 in second network node.
First network node or the second network node can be in the optinal plan for determining block to be deleted are as follows: by taking the second network node as an example, second network node can determine block to be deleted according to default deletion rule from target block chain.Wherein, the default deletion rule may include but be not limited to second network node store the target block chain block number be greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.After deleting block to be deleted, the first network node or the second network node can recorde area's block header content of the block to be deleted.
Further alternative, multiple Transaction Informations that the block of block chain generated includes can be sent to upper level network node by the first network node or the second network node.Optionally, at least one Transaction Information that block to be deleted is included can be sent to upper level network node after determining block to be deleted by the first network node or the second network node.Optionally, it can recorde the former storage location information of at least one Transaction Information in upper level network node.Wherein, the upper level network node of first network node may be the same or different with the upper level network node of the second network node, and the embodiment of the present application does not limit this.
It should be noted that the device node execute include in one or more data information sent in the first data from step 211 to the first network node the first hashed value, specifically device node is according to the
One data calculate the first hashed value for obtaining the first data, and the data information of the first hashed value comprising the first data is sent to the first network node.Or, one or more data information that the device node can be sent to the first network back end includes the first data, after first network node receives the data information, according to the first data for including in data information, the first hashed value for obtaining the first data is calculated.Alternatively, the device node not only can include the first data but also include the first hashed value of the first data to one or more data information that the first network back end is sent, the embodiment of the present application is not limited this.
The present embodiment forms the second block chain with first network node and other the first net nodes, and the second network node and other second network nodes illustrate teachings herein for forming the first block chain.Wherein device node can be multiple equipment node and execute step 201 and 211.In addition, actually embodiment illustrated in fig. 4 can also be that only the second network node and other second network nodes form the first block chain, and first network node is after receiving the data information (step 211) of device node, the data information received constantly only can be stored, not form the second block chain.Or, embodiment illustrated in fig. 4 can also be that only first network node and other first network nodes form the second block chain, and the second network node is after receiving the data information (step 201) of device node, the data information received constantly only can be stored, not form the first block chain.
In the embodiment of the present application, it is stored by the way that one or more first data in device node are sent to other network nodes, the storage pressure of device node can be alleviated, in addition, in first network node and the second network node generates the block chain of the block chain about the first data and the first hashed value about the first data respectively, it realizes through block chain and distinguishes storing data and hashed value, even from data the first block chain generated data be all tampered in the case where, the data in the first block chain can be verified by the hashed value of the second block chain, therefore the tamper-resistance of data is improved in this way.
Fig. 5 is referred to, provides the flow diagram of another data processing method for the embodiment of the present application, as shown in figure 5, first network node involved in the embodiment of the present application, other first network nodes and device node.The network architecture shown in Fig. 2 can be referred to, the data processing method is completed jointly by the above node, wherein, for the device node during executing step 301 to step 312, the device node is any one in the multiple equipment node for establish communication connection with the first network node.It should be noted that, in the embodiment of the present application, step performed by first network node and other first network nodes can also be changed to the second network node and other second network nodes to execute, and embodiment illustrated in fig. 5 is the explanation carried out by taking first network node as an example.Specific implementation procedure refers to described in detail below.
301, device node sends one or more data information to first network node.
Wherein, the data information comprising the first data can be sent to the first network node by the device node.Alternatively, the data information comprising the first data and the first hashed value of the first data can be sent to the first network node by the device node.On the basis of both the above optional data information, the data information can also include at least one of the following: the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the first network address of node for receiving the data information.Optionally, the temporal information of first data can be the sending time of first data or the generation time of first data, the embodiment of the present application do not limit this.
Optionally, the form of expression of one or more data information can be with reference to the detailed description of data information in step 201 in embodiment illustrated in fig. 4, and details are not described herein.
302, the first network node calculates the first hashed value of first data.
Wherein, for not including the first hashed value of the first data in data information the case where, the first network node execute step 302.The case where for including the first hashed value of the first data in data information, the first network node can calculate the first hashed value of the first data, and it is compared according to the first hashed value of carrying, to determine whether the first data are tampered in transmission process, if the two is not identical, it is determined that the first data have been tampered, the notification message that the first data of device node can be notified to be tampered, and the embodiment of the present application subsequent step is not executed, the safety of first data transmission is enhanced in this way.
In short, the first network node can obtain or be calculated corresponding first hashed value of each first data from data information.It is understood that one or more data information that first network node is sent in addition to can receive the device node, can also receive one or more data information of other equipment node transmission.
For example, as shown in table 7, multiple first hashed values that first network node determines are contained.In table 7, data index value can be the index value of the first data, be also possible to the index value of the first hashed value corresponding with the index value of the first data.Whether that mode, from the first hashed value for searching the first data and the first data respectively, the index value of the first data can be passed through, or first data index value and the first hashed value index value between corresponding relationship, the first data and corresponding first hashed value of first data can be found.
Table 7
303, the first network node generates the first Transaction Information B1 according to first hashed value,.
Wherein, the first Transaction Information is generated using hashed value, and the embodiment of the present application is indicated the first Transaction Information that this step generates using B1, to be distinguish.
Further, if the quantity of the first hashed value is 1, a first Transaction Information B1 is can be generated in the first network node.Such as first data can be data 1, data 2, data 3..Or data n.Different data have different hashed values, then the hashed value of such as data 1 is hashed value 1, the hashed value of data 2 is hashed value 2, so analogize.If the quantity of the first hashed value is multiple, at least one first Transaction Information B1 is can be generated in the first network node.Optionally, first Transaction Information includes at least one of following corresponding information: transaction ID, data item, the hashed value of data, the node identification item for generating first Transaction Information, the index value item of data, temporal information item, sender's item of data and the recipient of data.Wherein temporal information item for example can be the generation time of the sending time or transaction that refer to data, and the embodiment of the present application does not limit this.
Table 8
By taking the first hashed value included in table 7 is as an example, the first Transaction Information B1 as shown in table 8 is can be generated in the first network node.
Alternatively, the first Transaction Information B1 as shown in table 9 can be generated in the first network node by taking the first hashed value included in table 7 is as an example.Wherein, Tx can not limit this for the time that data packet 1 generates or the time that transaction 1 generates, the embodiment of the present application.Wherein, first network node is using the data hash value of multiple data as a data packet, data item content of the data packet as transaction.About address, specifically, table 9 is illustrated, recipient address, such as can be first network node address, sender address, such as the data packet 1 data hash value it is all both be from device node 1 the case where, that is, set sender address as the address of device node 1.
Table 9
Wherein, packet content may refer to shown in table 10.
Table 10
304, the first network node sends at least one described first Transaction Information to other first network nodes.
Wherein, first network node involved in the embodiment of the present application be multiple first network nodes in any one, and other first network nodes be in multiple first network nodes in addition to this first network node it
Other outer first network nodes.
Correspondingly, any first network node in other first network nodes receives at least one described first Transaction Information B1.
305, at least one second Transaction Information that other described first network nodes are sent to the first network node.
Wherein, in the embodiment of the present application, the second Transaction Information that other first network nodes are sent is indicated with B2, it should be noted that, here the second Transaction Information B2 and the first Transaction Information B1 includes the hashed value item of data, and then can be realized the block for generating and being generated in the second block chain by the Transaction Information that the hashed value item of data generates.For example, specifically, first network node is, for example, network node A, the data information that the device node A received based on it is sent includes first data in data information, and first data are, for example, data A.Network node A obtains the hashed value A (such as calculating hashed value A using data A) of the data A according to data A.The first Transaction Information B1 is generated according to the mode for generating the first transaction in above-mentioned steps 303 based on hashed value A.Other first network nodes are, for example, the data information for the device node B transmission that network node B is received based on it, include first data in data information, first data are, for example, data B.Network node B obtains the hashed value B (calculating hashed value B using data B) of the data B according to data B.The second Transaction Information B2 is generated according to the mode for generating the first transaction in above-mentioned steps 303 based on hashed value B.
Optionally, the generating mode of the second Transaction Information is identical as the generating mode of the first Transaction Information in the embodiment of the present application, specifically can be with reference to the detailed description in step 301 to step 203, and details are not described herein.
Correspondingly, the first network node receives at least one second Transaction Information of other first network nodes transmission.
306, the first network node generates the block in the second block chain according to the first Transaction Information and/or second Transaction Information.
Wherein, the first network node generates the block in the second block chain according to the first Transaction Information B1 and the second Transaction Information B2 received.Optionally, the second block chain block of generation is broadcast to other network nodes by first network node.
It in the present embodiment, is by first network node come for generating the second block chain block.Indeed, it is possible to be the block that other network nodes (such as network node B) generate the second block chain according to the first Transaction Information B1 and the second Transaction Information B2.Similarly, the second block chain block of generation is broadcast to other network node (other networks other than network node B by other network nodes (such as network node B)
Node, first network node).The generation method of the second block chain L4 can be with reference to the generating mode of the second block chain L4 in step 216 in embodiment illustrated in fig. 4 in the embodiment of the present application, and details are not described herein.
307, the first network node generates the first Transaction Information A1 according to first data.
Step 307 and step 302 are steps arranged side by side, and execution order is in no particular order.
308, the first network node generates the block of the first block chain L1 according to the first Transaction Information A1.
Wherein, step 307 and step 308 are the first data that first network node is included according to the data information for receiving device node, generate the first Transaction Information.Specific implementation can be, such as the first transaction A1 (1) is generated according to the first data 1 that device node 1 is sent, the first transaction A1 (2) is generated according to the first data 2 that device node 2 is sent, generates the first transaction A2 (3) according to the first data 3.Alternatively, first network node, according to first data 1, the first data 2, the data packet of the first data 3 composition generates the first transaction A1.In short, the first data that first network node includes according to one or more data information, generate at least one first Transaction Information, and according at least one Transaction Information of generation, generate the process of the block of the first block chain.Concrete implementation mode can be with reference to step 212 in embodiment illustrated in fig. 4 to the detailed description of step 214, and details are not described herein.
Specifically, the first network node generates alone all blocks of the first block chain, is individually formed a first block chain.Specifically block can be sent to oneself by the network node, and/or the block that oneself is continuously generated saves.
Specifically, first network node described in the first network node is based on the first algorithm according at least one the first Transaction Information A1, generates the block of the first block chain.First algorithm can be equal to the first mechanism.First algorithm is determined for the block which network node generates the first block chain, therefore first algorithm, and citing may is that the first network node is the exclusive node for generating the first block chain block.Alternatively, first algorithm can be also used for the algorithm how the first network node generates the block.
Similarly, for the first algorithm mentioned in claim, third algorithm, 5th algorithm, the 7th algorithm, the algorithm are equal to mechanism, the algorithm can be specific algorithm, it is also possible to very simple mechanism, such as provides that some node is that the exclusive node for generating the block of the block chain or the network node according to transaction directly generate block etc..In a word as mechanism or algorithm be specifically defined and purposes, the present invention do not do excessive limitation.
309, after the first network node generates block chain, Xiang Suoshu device node sends the first notification message.
Wherein, the message for the block that first notification message is used to that first network node described in device node to be notified to generate block chain according to the data information.Optionally, the first notification message can be sent after generating the first block chain L1 and generating any one block chain in the second block chain L4.It should be noted that step 309 is optional step.
Correspondingly, the device node receives the first notification message that the first network node is sent.
310, the device node sends described second to the first network equipment and deletes message.
Wherein, the second deletion message is at least one described device node for requesting deletion data information.
311, the first network node sends first to the device node and deletes message.
Wherein, the first deletion message is the instruction message for being used to indicate the device node and deleting data information.
312, the device node deletes the data information.
Wherein, optionally, the device node deletes the data information, can be and is gone to delete data information according to deletion condition.Such as the data information that the time is more than thresholding 1 is deleted.Such as device node deletes the data information that storage time is more than thresholding 1.
It should be noted that step 310, step 311, step 312 are optional step, concrete implementation mode can be with reference to step 208, the detailed description of step 209 and step 210 in embodiment illustrated in fig. 4, and details are not described herein.
Further alternative, the first network node can determine block to be deleted from target block chain.Wherein, the target block chain is the first block chain L1 or the second block chain L4 in the first network node.
First network node can be in the optinal plan for determining block to be deleted are as follows: by taking first network node as an example, the first network node can determine block to be deleted according to default deletion rule from target block chain.Wherein, the default deletion rule may include but be not limited to the first network node store the target block chain block number be greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.After deleting block to be deleted, the first network node can recorde area's block header content of the block to be deleted.
Further alternative, multiple Transaction Informations that the block of block chain generated includes can be sent to upper level network node by the first network node.Optionally, at least one Transaction Information that block to be deleted is included can be sent to upper level network node after determining block to be deleted by the first network node or first network node.Optionally, it can recorde the former storage location information of at least one Transaction Information in upper level network node.
Further, the hashed value of first data and the first data can be sent to central node by the first network node, so that central node calculates the second hashed value of first data, and the second hashed value and the first hashed value are compared, to examine whether the first data are tampered, it whether is trust data etc., concrete implementation process can be with reference to the specific descriptions of the embodiment of system shown in Figure 2, and details are not described herein.
The present embodiment forms the second block chain with first network node and other the first net nodes, and data information generates the first transaction to form the first block chain to first network node based on the received.Wherein device node can be at least one device node and execute step 301. in addition, actually the present embodiment two can also only have first network node and other first network nodes to form the second block chain, and first network node is after receiving the data information (step 301) of device node, do not execute step 307 and 308, the data information received constantly only can be stored, not form the first block chain.
In the embodiment of the present application, it is stored by the way that one or more first data in device node are sent to first network node, the storage pressure of device node can be alleviated, in addition, generate the block chain of the block chain about the first data and the first hashed value about the first data respectively in first network node, it realizes through block chain and distinguishes storing data and hashed value, even from data the first block chain generated data be all tampered in the case where, the data in the first block chain can be verified by the hashed value of the second block chain, therefore the tamper-resistance of data is improved in this way.
Fig. 6 is referred to, provides the flow diagram of another data processing method for the embodiment of the present application.As shown in fig. 6, first network node involved in the embodiment of the present application, other first network nodes, device node and other equipment node.The network architecture shown in Fig. 2 can be referred to, the data processing method is completed jointly by the above node, wherein, for the device node during executing step 401 to step 413, the device node is any one in the multiple equipment node for establish communication connection with the first network node.Specific implementation procedure refers to described in detail below.
401, device node generates at least one second Transaction Information according to one or more data information.
Wherein, second Transaction Information includes the corresponding information of data item, such as the first data.Optionally
Second Transaction Information can also include at least one corresponding information: the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.Wherein, if the hashed value item comprising data, the corresponding information of this is the first hashed value that the device node calculates the first data.Wherein, temporal information item can refer to that the generation time of the first data or the generation time of second Transaction Information, the embodiment of the present application do not limit this.The second Transaction Information that device node generates in the embodiment of the present application is indicated with C1, to be distinguish.
402, at least one described second Transaction Information is sent to first network node by the device node.
Correspondingly, the first network node receives at least one described second Transaction Information.
402a, other equipment node send the second Transaction Information to the first network node.
Wherein, there is multiple equipment node in network, first network node described in step 402 receives the second Transaction Information (being indicated with C1) of the device node transmission outside, the first network node can also receive the second Transaction Information that the other equipment node for establishing communication connection with the first network node is sent, the second Transaction Information that other equipment are sent is indicated with C2, to be distinguish.The content that second Transaction Information is included can be discussed in detail with reference to the included content of the second Transaction Information in step 401, and details are not described herein.
403, the first network node generates the block of the first block chain according at least one the second Transaction Information.
Wherein, first control node sends the second Transaction Information according to multiple equipment node connected to it, generates block chain.In the case where including data item based on the second Transaction Information, the block of the first block chain L1 is can be generated in the first network node.
Specifically, the first network node generates alone all blocks of the first block chain, is individually formed a first block chain.Specifically block can be sent to oneself by the network node, and/or the block that oneself is continuously generated preserves.
Specifically, first network node described in the first network node is based on the first algorithm according at least one the second Transaction Information, generates the block of the first block chain.First algorithm can be equal to the first mechanism.First algorithm is used to determine the block which network node generates the first block chain, therefore first algorithm, and citing may is that the first network node is the exclusive node for generating the first block chain block.
404, at least one first data that the first network node includes according at least one the second Transaction Information determination.Specifically, for the first network node according to first the second Transaction Information (C1), the first data C1 for being included from the second Transaction Information C1 determines first the first data C1;First net
Network node determines second the first data C2 according to second the second Transaction Information (C2);The first network node determines the first data C3 of third according to third the second Transaction Information (C3), and so on.In conclusion at least one first data that the first network node includes according at least one the second Transaction Information determination.
Wherein, the first network node can be according in the Transaction Information sent by device node, determine multiple data informations, the data information includes the first data, can also include at least one of the following: the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address.
405, the first network node calculates the first hashed value of the first data.
Optionally, if including the hashed value item of data in each Transaction Information that device node is sent, the first network node can not execute step 405.
406, the first network node generates the first Transaction Information B1 according to first hashed value.
Step 405 and step 403 can be parallel step, not limit sequencing.Similarly, step 406 and step 403 can be parallel step, not limit sequencing.
Wherein, the first network node determines multiple data informations from the Transaction Information that device node is sent.After the first network node calculates the first hashed value of the first data in the data information by step 405, recipient's item of temporal information item, the index value item of data, the sender of data and data can be determined according to the other information in the corresponding data information of the first data.
407, the first network node sends at least one the first Transaction Information B1 generated to other first network nodes.
408, the first network node can also receive at least one second Transaction Information B2 of other first network nodes transmission.
409, the first network node generates the block of the second block chain L4 according at least one first Transaction Information B1 and/or at least one second Transaction Information B2.Alternatively, the first network node and other first network nodes, are based on algorithm, according at least one first Transaction Information B1 and/or at least one second Transaction Information B2, the second block chain L4 is generated.
About " the first network node generates the block of the second block chain L4 according at least one first Transaction Information B1 and/or at least one second Transaction Information B2." explanation: be by first network node come for generating the first block chain block in the present embodiment.Indeed, it is possible to be other network nodes (such as network node B) according to the first Transaction Information B1 and the second Transaction Information B2 the first block chain of generation
Block.Similarly, the first block chain block of generation is broadcast to other first network nodes (other network nodes other than network node B, first network node) by other first network nodes (such as network node B).Such as be that first network node generates block in a kind of situation, it is that other network nodes generate block in a kind of situation.First network node and other network nodes can determine that who generates i-th of block according to some algorithm (i is the natural number more than or equal to 1).In short, according to above-mentioned steps, the and network node and other network nodes form the first block chain L4.Therefore, the first network node and other first network nodes are based on algorithm, according at least one first Transaction Information B1 and/or at least one second Transaction Information B2, generate the second block chain L4.
Subsequent optional step: after completing " generating the block of the second block chain L4 ", the first block chain block of generation is broadcast to other network nodes by first network node.
Wherein, step 407 to step 409 is the second block chain generated about hashed value item, it and is to be generated by multiple first network nodes based on algorithm, here the second block chain is indicated with L4, the specific implementation procedure for generating the second block chain L4 can be with reference to the detailed description of step 216 in embodiment illustrated in fig. 4, and details are not described herein.
410, after the first network node generates block chain, Xiang Suoshu device node sends the first notification message.
Wherein, the message for the block that first notification message is used to that first network node described in device node to be notified to generate block chain according to the data information.Optionally, the first notification message can be sent after generating the first block chain L1 and generating any one block chain in the second block chain L4.It should be noted that step 410 is optional step.
Correspondingly, the device node receives the first notification message that the first network node is sent.
411, the device node sends described second to the first network equipment and deletes message.
Wherein, the second deletion message is at least one described device node for requesting deletion data information.
412, the first network node sends first to the device node and deletes message.
Wherein, the first deletion message is the instruction message for being used to indicate the device node and deleting data information.
413, the device node will delete the data information.
It should be noted that step 411, step 412, step 413 are optional step, concrete implementation mode can refer to step 208, the detailed description of step 209 and step 210 in embodiment illustrated in fig. 4,
Details are not described herein.
Further alternative, the first network node can determine block to be deleted from target block chain.Wherein, the target block chain is the first block chain L1 or the second block chain L4 in the first network node.
First network node can be in the optinal plan for determining block to be deleted are as follows: the first network node can determine block to be deleted according to default deletion rule from target block chain.Wherein, the default deletion rule may include but be not limited to the first network node store the target block chain block number be greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.After deleting block to be deleted, the first network node can recorde area's block header content of the block to be deleted.
Further alternative, multiple Transaction Informations that the block of block chain generated includes can be sent to upper level network node by the first network node.Optionally, at least one Transaction Information that block to be deleted is included can be sent to upper level network node after determining block to be deleted by the first network node or first network node.Optionally, it can recorde the former storage location information of at least one Transaction Information in upper level network node.
Further, the hashed value of first data and the first data can be sent to central node by the first network node, so that central node calculates the second hashed value of first data, and the second hashed value and the first hashed value are compared, to examine whether the first data are tampered, it whether is trust data etc., concrete implementation process can be with reference to the specific descriptions of the embodiment of system shown in Figure 2, and details are not described herein.
Further alternative, the first network node obtains the first hashed value of first data from the second block chain;The first network node obtains first data from the first block chain, and calculates the second hashed value of first data;First hashed value is compared the first network node with second hashed value;If first hashed value is identical as second hashed value, the first network node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, the first network node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
In the embodiment of the present application, one or more can be sent to first network node about the Transaction Information of data information and stored by device node, and be generated respectively in first network node about the first number
According to block chain and the first hashed value about the first data block chain, it realizes through block chain and distinguishes storing data and hashed value, even if in the case where being all tampered by the total data of data the first block chain generated, the data in the first block chain can be verified by the hashed value of the second block chain, therefore improve the tamper-resistance of data in this way.
Fig. 7 is referred to, provides the flow diagram of another data processing method for the embodiment of the present application.As shown in fig. 7, first network node involved in the embodiment of the present application, other first network nodes, device node and other equipment node.The network architecture shown in Fig. 2 can be referred to, the data processing method is completed jointly by the above node, wherein, for the device node during executing step 501 to step 514, the device node is any one in the multiple equipment node for establish communication connection with the first network node.Specific implementation procedure refers to described in detail below.
501, device node generates at least one second Transaction Information according to one or more data information.
Wherein, second Transaction Information includes the corresponding information of data item, such as the first data.Optional second Transaction Information can also include at least one corresponding information: the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.Wherein, if the hashed value item comprising data, the corresponding information of this is the first hashed value that the device node calculates the first data.Wherein temporal information item can refer to that the generation time of the first data or the generation time of second Transaction Information, the embodiment of the present application do not limit this.The second Transaction Information that device node generates in the embodiment of the present application is indicated with C1, to be distinguish.
502, at least one described second Transaction Information is sent to first network node and other equipment node by the device node.
Correspondingly, the first network node receives at least one described second Transaction Information C1.Other equipment node receives at least one described second Transaction Information C1.Wherein, the other equipment node and the device node establish communication connection with the first network node, and can also be in communication with each other between each device node.
503, the other equipment node sends at least one second Transaction Information C2 to the device node and the first network node.
Correspondingly, the device node receives at least one second Transaction Information C2 that other equipment node is sent.
The first network node receives at least one second Transaction Information C2 that other equipment node is sent.
Wherein, the specifically step 503, can be other equipment node broadcasts the second Transaction Information C2, thus the device node receives the second Transaction Information C2, and first network node receives the second Transaction Information C2.It is directed to the device node side as a result, the device node receives at least one second Transaction Information C2 that other equipment node is sent.
Wherein, device node can receive the second Transaction Information of other equipment node transmission, and the second Transaction Information that other equipment are sent is indicated with C2.The content that second Transaction Information is included can be discussed in detail with reference to the included content of the second Transaction Information in step 501, and details are not described herein.
504, the device node generates the block of the second block chain L2 according at least one second Transaction Information.Alternatively, the device node, other equipment node and first network node, are based on algorithm, according to the second Transaction Information, the first block chain L2 is generated.
About " device node generates the block of the second block chain L2 according at least one the second Transaction Information." explanation: be by the device node come for generating the second block chain block in the present embodiment.Indeed, it is possible to be the block that other equipment node (such as device node B) or first network node generate the second block chain according to the second Transaction Information.Similarly, the second block chain block of generation is broadcast to other device nodes (other network nodes other than network node B, the device node) by other described device nodes (such as network node B) or first network node.Therefore in for example a kind of situation, the device node generates block, is that other equipment node generates block or first network node generates block in the case of another.The device node, other equipment node and first network node can determine that who generates i-th of block according to some algorithm (i is the natural number more than or equal to 1).In short, the device node, other equipment node and first network node form the second block chain L2 according to above-mentioned steps.Therefore, the device node, other equipment node and first network node are based on algorithm, according at least one second Transaction Information C1 and/or at least one first Transaction Information C2, generate the first block chain L2.
Subsequent optional step: after completing " generating the block of the second block chain L2 ", the first block chain block of generation is broadcast to other equipment node and first network node by the device node.
Wherein, the implementation procedure for specifically generating the second block chain L2 can be with reference to the detailed description of step 216 in embodiment illustrated in fig. 4, and details are not described herein.
505, at least one first data that the first network node includes according at least one the second Transaction Information determination.
After step 502 and/or step 503, first network node can execute step 505.
506, the first network node calculates the first hashed value of the first data.
507, the first network node generates the first Transaction Information B1 according to first hashed value.
508, the first network node sends at least one the first Transaction Information B1 generated to other first network nodes.
509, the first network node can also receive at least one second Transaction Information B2 of other first network nodes transmission.
510, the first network node and other first network nodes are based on algorithm, according at least one first Transaction Information B1 and/or at least one second Transaction Information B2, generate the block of the second block chain L4.
It in the present embodiment, is by first network node come for generating the first block chain block.Indeed, it is possible to be the block that other network nodes (such as network node B) generate the first block chain according to the first Transaction Information B1 and the second Transaction Information B2.Similarly, the first block chain block of generation is broadcast to other first network nodes (other network nodes other than network node B, first network node) by other first network nodes (such as network node B).It is that other network nodes generate block in another case for example, being that first network node generates block in a kind of situation.First network node and other network nodes can determine that who generates i-th of block according to some algorithm (i is the natural number more than or equal to 1).In short, according to above-mentioned steps, the and network node and other network nodes form the first block chain L4.
Optional step after " generating block ": optionally, the first block chain block of generation is broadcast to other network nodes by first network node.
Wherein, step 505 is identical as the content of step 404 in embodiment illustrated in fig. 6 to step 409 to step 510, can specifically refer to the specific introduction of embodiment illustrated in fig. 6, details are not described herein.
511, after the first network node generates block chain, Xiang Suoshu device node sends the first notification message.
Correspondingly, the device node receives the first notification message that the first network node is sent.
512, the device node sends described second to the first network equipment and deletes message.
Wherein, the second deletion message is at least one described device node for requesting deletion block.
513, the first network knot removal block to be deleted.
Wherein, the first network node is after generating the first block and connecting L2 or the second block chain L4, it may be determined that goes out block to be deleted, and block to be deleted is deleted.Wherein, the first network node can determine block to be deleted according to default deletion rule from target block chain.For first network node, the target block chain is the first block chain L2 or the second block chain L4.The default deletion rule may include but be not limited to the first network node and store the block number of the target block chain to be greater than default threshold
Value or the block to be deleted are to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.After deleting block to be deleted, the first network node or first network node can recorde area's block header content of the block to be deleted.
Further alternative, multiple Transaction Informations that the block of block chain generated includes can be sent to upper level network node by the first network node.Optionally, at least one Transaction Information that block to be deleted is included can be sent to upper level network node after determining block to be deleted by the first network node or the second network node.Optionally, it can recorde the former storage location information of at least one Transaction Information in upper level network node.
Optionally, after the first network node can also delete message receiving described second, step 513 is executed.
514, the first network node sends first to the device node and deletes message.
Wherein, the first deletion message is the instruction message for being used to indicate the device node and deleting block.In optional scheme, the first network node can indicate the block to be deleted in the first deletion message, and the optional block to be deleted can be the block to be deleted of first network knot removal described in step 513.In another optional scheme, the first network node can also not denote that the block of deletion, voluntarily determine the block to be deleted by device node, the described in this way first effect for deleting message is that data-message is deleted in notice device node execution.
515, the device node will delete block.
Optionally, the device node can execute the block in the first block chain L2 of step deletion in the case where first be not carried out in step 512 and receiving step 514 deletes message.Specifically block to be deleted can be determined from the first block chain L2 according to default deletion rule.Wherein, the default deletion rule may include but be not limited to the first network node store the target block chain block number be greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.
Optionally, the device node can execute step 515 after receiving the first deletion message in step 514.If the first deletion message carries block to be deleted, the device node is deleted entrained block;If not carrying block to be deleted in the first deletion message, the device node can determine the block to be deleted according to the first optional scheme.
Further alternative, after deleting the block in block chain, the device node can recorde area's block header content of the block to be deleted.The device node can be included by block to be deleted at least one
Transaction Information is sent to even higher level of node.Optionally, it can recorde the former storage location information of at least one Transaction Information in even higher level of node.In the embodiment of the present application, even higher level of node can be first network node, can also be other nodes, and the embodiment of the present application is not construed as limiting this.
By executing the block in step 515 deletion block chain, the storage pressure of device node can be reduced.
Further, first data can be sent to central node by the first network node or the device node, the hashed value of first data can be sent to central node by the first network node, so that central node calculates the second hashed value of first data, and the second hashed value and the first hashed value are compared, to examine whether the first data are tampered, it whether is trust data etc., concrete implementation process can be with reference to the specific descriptions of the embodiment of system shown in Figure 2, and details are not described herein.
Further alternative, the device node obtains the first hashed value of first data from the second block chain;The device node obtains first data from the first block chain, and calculates the second hashed value of first data;First hashed value is compared the device node with second hashed value;If first hashed value is identical as second hashed value, the device node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, the device node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
Further alternative, the first network node obtains the first hashed value of first data from the second block chain;The first network node obtains first data from the first block chain, and calculates the second hashed value of first data;First hashed value is compared the first network node with second hashed value;If first hashed value is identical as second hashed value, the first network node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or, if first hashed value and second hashed value be not identical, the first network node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
In the embodiment of the present application, one or more can be sent to first network node about the Transaction Information of data information and stored by device node, and block chain about the first data can be generated jointly with first network node, in addition, the block chain of the first hashed value about the first data is generated in first network node, it realizes through block chain and distinguishes storing data and hashed value, even if by data the firstth area generated
In the case that the total data of block chain is all tampered, the data in the first block chain can be verified by the hashed value of the second block chain, therefore improve the tamper-resistance of data in this way.
Fig. 8 provides a kind of modular diagram of central node for the embodiment of the present application.Central node in the embodiment of the present application can be the central node of the description of either method embodiment shown in Fig. 3.Therefore, duplicate contents in embodiment of the method shown in Fig. 3, the present embodiment may repeat no more.
As shown in figure 8, the central node 1 of the embodiment of the present application may include: to obtain module 11, computing module 12, comparison module 13 and determining module 14.Optionally, the central node 1 further includes generation module 15.
Module 11 is obtained, for obtaining the first hashed value of the first data from first network node;
Computing module 12 for obtaining first data from the second network node, and calculates the second hashed value of first data;
Comparison module 13, first hashed value for obtaining the acquisition module 11 are compared with second hashed value that the computing module 12 calculates;
Determining module 14, if determining that first hashed value is identical as second hashed value for the comparison module 13, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value.
Optionally, the determining module 14, if being also used to the comparison module 13 determines that first hashed value and second hashed value be not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
Optionally, the acquisition module 11 is specifically used for: corresponding first hashed value of the first data is obtained from the second block chain of first network node;Wherein, the second block chain is that the block generated by the Transaction Information of the hashed value item comprising data forms.
Optionally, the computing module 12 is specifically used for: first data from the first block chain of the second network node, wherein the first block chain is what the block generated by the Transaction Information comprising data item formed.
Optionally, the acquisition module 11 is also used to obtain at least one following related information of first data: the index value of first data, the temporal information of first data, the device node mark of transmission first data, the address for sending first data and reception described first from first network node
The address of data.
Optionally, the acquisition module 11, be also used to obtain at least one following related information of the first hashed value of first data from the second network node: the index value of first data, the device node mark of transmission first data, sends the address of first data and receives the address of first data temporal information of first data.
Optionally, the determining module 14 is also used to that a first network node is selected to be determined as target first network node;
The module 11 that obtains is specifically used for obtaining the first hashed value of the first data from the second block chain of target first network node.
Optionally, in terms of selecting a first network node to be determined as target first network node, the determining module 14 is specifically used for selecting the first network node of first lawful condition of satisfaction from least one first network node being target first network node;
First lawful condition are as follows: number of nodes identical with the first hashed value of the first data of the second block chain of the target first network node is more than first threshold.
Optionally, the determining module 14 is also used to that second network node is selected to be determined as target second network node.
The acquisition module 11 is specifically used for obtaining the first data from the first block chain of the target second network node.
Optionally, in terms of selecting second network node to be determined as target second network node, the determining module is specifically used for selecting the network node of second lawful condition of satisfaction from least one second network node being the second target network node;
Second lawful condition are as follows: the quantity of network node identical with the first data of the first block chain of the target second network node is more than second threshold.
Optionally, further includes: generation module 15, for if it is determined that first data are trust datas, it is determined that i-th of Transaction Information of third block chain meets formation condition, generates i-th of Transaction Information of third block chain;Or
The generation module 15 is also used to if it is determined that first data are can not letter data, it is determined that i-th of Transaction Information of the third block chain is unsatisfactory for the formation condition, does not generate i-th of Transaction Information of the third block chain;Or
The generation module 15 is also used to if it is determined that first data are can not letter data, it is determined that institute
J-th of Transaction Information for stating third block chain meets formation condition, generates j-th of Transaction Information of the third block chain.
Central node in embodiment illustrated in fig. 8 can be realized with central node shown in Fig. 9.As shown in figure 9, providing a kind of structural schematic diagram of central node for the embodiment of the present application, central node 1000 shown in Fig. 9 includes: processor 1001 and transceiver 1004.Wherein, processor 1001 is connected with transceiver 1004, is such as connected by bus 1002.Optionally, the central node 1000 can also include memory 1003.It should be noted that transceiver 1004 is at least one in practical application, the structure of the central node 1000 does not constitute the restriction to the embodiment of the present application.
Wherein, processor 1001 is applied in the embodiment of the present application, for realizing computing module 12 shown in Fig. 8, comparison module 13, determining module 14, the function of generation module 15.Transceiver 1004 includes Receiver And Transmitter, and in optional scheme, transceiver 1004 is applied in the embodiment of the present application, for realizing the function shown in Fig. 8 of obtaining module 11.
Processor 1001 can be central processing unit (Central Processing Unit, CPU), general processor, Digital Signal Processing (Digital Signal Processing, DSP), integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, transistor logic, hardware component or any combination thereof.It, which may be implemented or executes, combines various illustrative logic blocks, module and circuit described in present disclosure.Processor 1001 is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP and the combination of microprocessor etc..
Bus 1002 may include an access, and information is transmitted between said modules.Bus 1002 can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 1002 can be divided into address bus, data/address bus, control bus etc..Only to be indicated with a thick line in Fig. 9, it is not intended that an only bus or a type of bus convenient for indicating.
Memory 1003 can be read-only memory (read-only memory, ROM) or the other kinds of static storage device of static information and instruction can be stored, random access memory (random access memory, RAM) or the other kinds of dynamic memory of information and instruction can be stored, it is also possible to Electrically Erasable Programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), CD-ROM (Compact Disc Read-Only Memory, CD-ROM)
Or other optical disc storages, optical disc storage (including compression optical disc, laser disc, optical disc, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or other magnetic storage apparatus or can be used in carrying or store the desired program code with instruction or data structure form and can by any other medium of computer access, but not limited to this.
Optionally, memory 1003 is used to store the application code for executing application scheme, and execution is controlled by processor 1001.Processor 1001 is for executing the application code stored in memory 1003, to realize the movement of the central node of the offer of any embodiment shown in Fig. 3.
A kind of computer storage medium is additionally provided in the embodiment of the present application, and for being stored as computer software instructions used in above-mentioned central node, it includes be program designed by the node of center for executing above-mentioned aspect.
Figure 10 provides a kind of modular diagram of network node for the embodiment of the present application.Network node in the embodiment of the present application can be the network node of the description of either method embodiment shown in Fig. 3-Fig. 7.Therefore, duplicate contents in either method embodiment shown in Fig. 3-Fig. 7, the present embodiment may repeat no more.
As shown in Figure 10, the network node 2 of the embodiment of the present application may include: block generation unit 2001.Optionally, the network node 2 can also be including at least one module in first information receiving module 2002, information generating module 2003, first information sending module 2004, block sending module 2005, the second information receiving module 2006, notification message receiving module 2007, deletion message reception module 2008, deletion block determining module 2009, deletion message transmission module 2010, removing module 2011 and logging modle 2012.
Block generation module 2001, for generating the block of block chain according at least one the first Transaction Information.First Transaction Information includes at least one of following corresponding information: data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
Optionally, further includes:
First information receiving module 2002, for receiving the data information of at least one device node transmission;
Information generating module 2003, the data information for being received according to the first information receiving module 2002 generate at least one first Transaction Information.
Optionally, the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address.
Optionally, further includes: computing module, if including first data and not for the data information
Including first hashed value, then the first hashed value of first data is calculated;The information generating module 2003 is specifically used for generating at least one first Transaction Information according to the data information and first hashed value.
Optionally, further includes:
First information sending module 2004, for sending at least one first Transaction Information that the information generating module 2003 generates to other network nodes or at least one device node.
Optionally, further includes: the second information receiving module 2006, at least one second Transaction Information sent for receiving other network nodes or at least one device node;Wherein, second Transaction Information includes at least one of following corresponding information: data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of the data and the recipient of the data.
Optionally, the block generation module 2001 according at least one described first Transaction Information, is based on the first algorithm, generates the block of the first block chain if being also used at least one first Transaction Information that the information generating module 2003 generates includes data item.
Optionally, the block generation module 2001, if being also used at least one first Transaction Information that the information generating module 2003 generates includes data item, and at least one described second Transaction Information that second information receiving module 2006 receives includes data item, then according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the second algorithm, the block of the first block chain is generated.
Optionally, further includes:
The block generation module generates the block of the second block chain if being also used to the hashed value item that at least one first Transaction Information that the information generating module 2003 generates includes data is based on third algorithm according at least one described first Transaction Information.
Optionally, further includes:
The block generation module, if being also used to the hashed value item that at least one first Transaction Information that the information generating module 2003 generates includes data, and hashed value item of at least one second Transaction Information comprising data that second information receiving module 2006 receives, then according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 4th algorithm, the block of the second block chain is generated.
Optionally, the block generation module according at least one described first Transaction Information, is based on the 5th algorithm, generates the block of the first block chain if being also used at least one first Transaction Information that the information generating module 2003 generates includes data item;With, if hashed value item of at least one first Transaction Information comprising data that the information generating module 2003 generates, and second information receiving module 2006 receives
The second Transaction Information of at least one arrived includes the hashed value item of data, then according at least one described first Transaction Information and/or at least one described second Transaction Information, is based on the 6th algorithm, generates the block of the second block chain;
Alternatively,
The block generation module, if being also used at least one first Transaction Information that the information generating module 2003 generates includes data item, and at least one second Transaction Information that second information receiving module 2006 receives includes data item, then according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 7th algorithm, the block of the first block chain is generated;With hashed value item of at least one first Transaction Information comprising data of the generation of information generating module 2003, then according at least one described first Transaction Information, based on the 8th algorithm, the block of the second block chain of generation.
If generating the first block chain and not generating the second block chain, the network node 2 further include:
First obtains module, for obtaining the first hashed value of the first data;
Described first obtains module, is also used to obtain first data from the first block chain, and calculate the second hashed value of first data;
First comparison module, for first hashed value to be compared with second hashed value;
First determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,
First determining module, if being also used to first hashed value and second hashed value is not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
If not generating the first block chain and generating the second block chain, the network node 2 further include:
Second obtains module, for obtaining the first hashed value of first data from the second block chain;
Described second obtains module, is also used to obtain first data of storage, and calculate the second hashed value of first data;
Second comparison module, for first hashed value to be compared with second hashed value;
Second determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,
Second determining module, if being also used to first hashed value and second hashed value is not identical,
Then determining that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
If not only generated the first block chain and but also generate the second block chain, the network node 2 further include:
Third obtains module, for obtaining the first hashed value of first data from the second block chain;
The third obtains module, is also used to obtain first data from the first block chain, and calculate the second hashed value of first data;
Third comparison module, for first hashed value to be compared with second hashed value;
Third determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,
The third determining module, if being also used to first hashed value and second hashed value is not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
Optionally, further includes: block sending module 2005, for sending the block of the data information or block chain to central node.
Optionally, further includes: notification message sending module 2007, for sending the first notification message at least one described device node, first notification message is for notifying device node to generate the message of the block of block chain.
Optionally, further includes: delete message transmission module 2010, delete message for sending first to device node, the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
Optionally, further includes: delete message reception module 2008, be also used to receive at least one described device node is sent second and delete message, the second deletion message is at least one described device node for requesting the deletion data information or deleting block.
Optionally, block determining module 2009 is deleted, for determining block to be deleted, any one block chain that the target block chain is stored by the network node from target block chain.
Optionally, the second information sending module 2013 is also used to multiple Transaction Informations that the block of the block chain includes being sent to upper level network node.
Optionally, further includes: removing module 2011, for the block to be deleted in the target block chain to be deleted.
Optionally, the removing module 2011 is specifically used for determining block to be deleted from target block chain according to default deletion rule;Wherein, the default deletion rule are as follows: the block number that the network node stores the target block chain is greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.
Optionally, logging modle 2012, for recording area's block header content of the block to be deleted.
Network node in embodiment illustrated in fig. 10 can be realized with network node shown in Figure 11.As shown in figure 11, a kind of structural schematic diagram of network node is provided for the embodiment of the present application, network node 4000 shown in Figure 11 includes: processor 4001 and transceiver 4004.
Wherein, processor 4001 is connected with transceiver 4004, is such as connected by bus 4002.Optionally, the network node 4000 can also include memory 4003.
It should be noted that transceiver 4004 is at least one in practical application, the structure of the network node 4000 does not constitute the restriction to the embodiment of the present application.
Wherein, processor 4001 is applied in the embodiment of the present application, for realizing block generation unit 2001 shown in Fig. 10, information generating module 2003, deletes block determining module 2009, the function of removing module 2011 and logging modle 2012.Transceiver 4004 includes Receiver And Transmitter, transceiver 4004 is used in the embodiment of the present application, for realizing first information receiving module 2002 shown in Fig. 10, first information sending module 2004, block sending module 2005, the second information receiving module 2006, the function of notification message receiving module 2007, deleting message reception module 2008, delete message transmission module 2010.
Processor 4001 can be CPU, general processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic, hardware component or any combination thereof.It, which may be implemented or executes, combines various illustrative logic blocks, module and circuit described in present disclosure.Processor 4001 is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP and the combination of microprocessor etc..
Bus 4002 may include an access, and information is transmitted between said modules.Bus 4002 can be pci bus or eisa bus etc..Bus 4002 can be divided into address bus, data/address bus, control bus etc..Only to be indicated with a thick line in Figure 11, it is not intended that an only bus or a type of bus convenient for indicating.
Memory 4003 can be ROM or can store the other kinds of static storage device of static information and instruction, and RAM or the other kinds of dynamic memory that can store information and instruction are also possible to
Electric EEPROM, CD-ROM or other optical disc storages, optical disc storage (including compression optical disc, laser disc, optical disc, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or other magnetic storage apparatus or can be used in carrying or store the desired program code with instruction or data structure form and can by any other medium of computer access, but not limited to this.
Optionally, memory 4003 is used to store the application code for executing application scheme, and execution is controlled by processor 4001.Processor 4001 is for executing the application code stored in memory 4003, to realize the movement of network node in any embodiment shown in Fig. 3 to Fig. 7.
A kind of computer storage medium is additionally provided in the embodiment of the present application, and for being stored as computer software instructions used in above-mentioned network node, it includes be program designed by network node for executing above-mentioned aspect.
Figure 12 provides a kind of modular diagram of device node for the embodiment of the present application.Device node in the embodiment of the present application can be the device node of the description of either method embodiment shown in Fig. 3-Fig. 7.Therefore, duplicate contents in either method embodiment shown in Fig. 3-Fig. 7, the present embodiment may repeat no more.
As shown in figure 12, the device node 3 of the embodiment of the present application may include: sending module 30.Optionally, the device node 3 can also include the first receiving module 31, the second receiving module 32, third receiving module 33 and removing module 34.
Sending module 30, for sending one or more data information to network node, the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address;The data information generates the first Transaction Information for the network node;
Optionally, further includes: the first receiving module 31, for receiving the first notification message of block chain of network node transmission, the message for the block that first notification message is used to that the network node to be notified to generate block chain according to the data information.
Optionally, further includes: the second receiving module 32, for receiving the block of network node transmission.
Optionally, further includes: third receiving module 33 sends the first deletion message for receiving the network node, and the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
Optionally, the sending module 30, be also used to send to the network node second delete message,
Described second deletes message for requesting to delete the data information or deleting block.
Optionally, further includes: removing module 34, for deleting the data information.
Optionally, the removing module 34 is specifically used for deleting generation duration more than the data information of first time threshold.
Figure 13 provides the modular diagram of another device node for the embodiment of the present application.Device node in the embodiment of the present application can be the device node of the description of either method embodiment shown in Fig. 3-Fig. 7.Therefore, duplicate contents in either method embodiment shown in Fig. 3-Fig. 7, the present embodiment may repeat no more.
As shown in figure 13, the device node 3 of the embodiment of the present application may include: generation module 35.Optionally, the device node 3 can also include sending module 36, the second receiving module 37, third receiving module 38 and removing module 39.
Generation module 35, for generating at least one second Transaction Information, and at least one described second Transaction Information is sent to network node according to one or more data information;Second Transaction Information includes at least one of following corresponding information: data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
Optionally, further includes: the second receiving module 37, for receiving the block of network node transmission.
Optionally, further includes: third receiving module 38 sends the first deletion message for receiving the network node, and the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
Optionally, further includes: sending module 36, be also used to send to the network node second delete message, and described second deletes message for requesting to delete the data information or deleting block.
Optionally, further includes: removing module 39, for deleting the data information.
Optionally, the removing module 39 is specifically used for deleting generation duration more than the data information of first time threshold.
Device node in Figure 12 or embodiment illustrated in fig. 13 can be realized with device node shown in Figure 14.As shown in figure 14, a kind of structural schematic diagram of device node is provided for the embodiment of the present application, device node 3000 shown in Figure 14 includes: processor 3001 and transceiver 3004.
Wherein, processor 3001 is connected with transceiver 3004, is such as connected by bus 3002.Optionally, the device node 3000 can also include memory 3003.
It should be noted that transceiver 3004 is at least one in practical application, the structure of the device node 3000 does not constitute the restriction to the embodiment of the present application.Transceiver 1004 includes Receiver And Transmitter.
In a kind of scheme, processor 1001 is applied in the embodiment of the present application, for realizing the function of removing module 34 shown in Figure 12.Transceiver 1004 is applied in the embodiment of the present application, for realizing the function of sending module 30 shown in Figure 12, the first receiving module 31, the second receiving module 32, third receiving module 33.
In another scheme, processor 1001 is applied in the embodiment of the present application, for realizing the function of generation module 35, removing module 39 shown in Figure 13.Transceiver 1004 is applied in the embodiment of the present application, for realizing the function of sending module 36 shown in Figure 13, the second receiving module 37, third receiving module 38.
Processor 3001 can be CPU, general processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic, hardware component or any combination thereof.It, which may be implemented or executes, combines various illustrative logic blocks, module and circuit described in present disclosure.Processor 3001 is also possible to realize the combination of computing function, such as combines comprising one or more microprocessors, DSP and the combination of microprocessor etc..
Bus 3002 may include an access, and information is transmitted between said modules.Bus 3002 can be pci bus or eisa bus etc..Bus 3002 can be divided into address bus, data/address bus, control bus etc..Only to be indicated with a thick line in Figure 14, it is not intended that an only bus or a type of bus convenient for indicating.
Memory 3003 can be ROM or can store the other kinds of static storage device of static information and instruction, RAM or the other kinds of dynamic memory that information and instruction can be stored, it is also possible to electric EEPROM, CD-ROM or other optical disc storages, optical disc storage (including compression optical disc, laser disc, optical disc, Digital Versatile Disc, Blu-ray Disc etc.), magnetic disk storage medium or other magnetic storage apparatus, or can be used in carry or store have instruction or data structure form desired program code and can be by any other medium of computer access, but not limited to this.
Optionally, memory 3003 is used to store the application code for executing application scheme, and execution is controlled by processor 3001.Processor 3001 is for executing the application code stored in memory 3003, to realize the movement of device node in any embodiment shown in Fig. 3 to Fig. 7.
A kind of computer storage medium is additionally provided in the embodiment of the present application, and for being stored as computer software instructions used in above equipment node, it includes be journey designed by device node for executing above-mentioned aspect
Sequence.
Although the application is described in conjunction with each embodiment herein; however; during implementing the application claimed, those skilled in the art are by checking the attached drawing, disclosure and the appended claims, it will be appreciated that and realize other variations of the open embodiment.In the claims, " comprising " (comprising) word is not excluded for other components or step, and "a" or "an" is not excluded for multiple situations.Several functions of enumerating in claim may be implemented in single processor or other units.Mutually different has been recited in mutually different dependent certain measures, it is not intended that these measures, which cannot combine, generates good effect.
It will be understood by those skilled in the art that embodiments herein can provide as method, apparatus (equipment) or computer program product.Therefore, the form of complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application.Moreover, the form for the computer program product implemented in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) that one or more wherein includes computer usable program code can be used in the application.Computer program is stored/distributed in suitable medium, and offer or a part as hardware together with other hardware can also use other distribution forms, such as pass through the wired or wireless telecommunication system of Internet or other.
The application is described referring to the method, apparatus (equipment) of the embodiment of the present application and the flowchart and/or the block diagram of computer program product.It should be understood that the combination of process and/or box in each flow and/or block and flowchart and/or the block diagram that can be realized by computer program instructions in flowchart and/or the block diagram.These computer program instructions be can provide to the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate a machine, so that generating by the instruction that computer or the processor of other programmable data processing devices execute for realizing the device for the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, to be able to guide in computer or other programmable data processing devices computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates the manufacture including command device, which realizes the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that series of operation steps are executed on a computer or other programmable device to generate computer implemented processing, thus the step of instruction executed on a computer or other programmable device is provided for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram.
Although the application is described in conjunction with specific features and embodiment, it is clear that, in the case where not departing from spirit and scope, it can be carry out various modifications and is combined.Correspondingly, the specification and drawings are only the exemplary illustration for the application that appended claims are defined, and are considered as any and all modifications, variation, combination or the equivalent covered within the scope of the application.Obviously, those skilled in the art can carry out various modification and variations without departing from spirit and scope to the application.If then the application is also intended to include these modifications and variations in this way, these modifications and variations of the application belong within the scope of the claim of this application and its equivalent technologies.
Claims (82)
- A kind of data processing method characterized by comprisingCentral node obtains the first hashed value of the first data from first network node;The central node obtains first data from the second network node, and calculates the second hashed value of first data;First hashed value is compared the central node with second hashed value;If first hashed value is identical as second hashed value, the central node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value.
- The method according to claim 1, wherein further include:If first hashed value and second hashed value be not identical, the central node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- Method according to claim 1 or 2, which is characterized in that the central node obtains the first hashed value of the first data from first network node, comprising:The central node obtains corresponding first hashed value of the first data from the second block chain of first network node;Wherein, the second block chain is that the block generated by the Transaction Information of the hashed value item comprising data forms.
- Method according to claim 1 or 2, which is characterized in that the central node obtains first data from the second network node, comprising:The central node obtains first data from the first block chain of the second network node, wherein the first block chain is what the block generated by the Transaction Information comprising data item formed.
- Method according to claim 1,2 or 3, which is characterized in that further include:The central node obtains the first hashed value related information of first data from first network node, The related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
- Method according to claim 1,2 or 4, which is characterized in that further include:The central node obtains the related information of first data from the second network node, and the related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
- According to claim 1, method described in 2,3 or 5, which is characterized in that the central node is before the first hashed value that first network node obtains the first data, further includes:The central node selects a first network node to be determined as target first network node;The central node obtains the first hashed value of the first data from first network node, comprising:The central node obtains the first hashed value of the first data from the second block chain of target first network node.
- The method according to the description of claim 7 is characterized in that the central node selects a first network node to be determined as target first network node, comprising:It is target first network node that the central node selects the first network node of first lawful condition of satisfaction from least one first network node;First lawful condition are as follows: number of nodes identical with the first hashed value of the first data of the second block chain of the target first network node is more than first threshold.
- According to claim 1, method described in 2,4 or 6, which is characterized in that the central node is obtained from the second network node before first data, further includes:The central node selects second network node to be determined as target second network node;The central node obtains first data from the second network node, comprising:The central node obtains the first data from the first block chain of the target second network node.
- According to the method described in claim 9, it is characterized in that, the central node selects second network node to be determined as target second network node, comprising:It is the second target network node that the central node selects the network node of second lawful condition of satisfaction from least one second network node;Second lawful condition are as follows: the quantity of network node identical with the first data of the first block chain of the target second network node is more than second threshold.
- - 10 described in any item methods according to claim 1, which is characterized in that further include:If it is determined that first data are trust datas, then the central node determines that i-th of Transaction Information of third block chain meets formation condition, generates i-th of Transaction Information of third block chain;OrIf it is determined that first data be can not letter data, then the central node determines that i-th of Transaction Information of the third block chain is unsatisfactory for the formation condition, does not generate i-th of Transaction Information of the third block chain;OrIf it is determined that first data be can not letter data, then the central node determines that j-th of Transaction Information of the third block chain meets formation condition, generates j-th of Transaction Information of the third block chain.
- A kind of data processing method characterized by comprisingNetwork node generates the block of block chain according at least one the first Transaction Information;First Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating first Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
- According to the method for claim 12, which is characterized in that the network node is according at least one the first Transaction Information, before the block for generating block chain, further includes:The network node receives the data information of at least one device node transmission;The network node generates at least one first Transaction Information according to the data information.
- According to the method for claim 13, it is characterized in that, the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of the device node of the transmission data information, the equipment section The address of point and the address of the network node.
- According to the method for claim 14, which is characterized in that further include:If the data information includes first data and do not include first hashed value, the network node calculates the first hashed value of first data;The network node generates at least one first Transaction Information according to the data information, comprising:The network node generates at least one first Transaction Information according to the data information and first hashed value.
- The described in any item methods of 3-15 according to claim 1, which is characterized in that further include:The network node sends at least one described first Transaction Information to other network nodes or at least one device node.
- The described in any item methods of 2-16 according to claim 1, which is characterized in that further include:The network node receives at least one second Transaction Information that other network nodes or at least one device node are sent;Wherein, second Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating second Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of the data and the recipient of the data.
- The described in any item methods of 2-17 according to claim 1, which is characterized in that further include:If at least one described first Transaction Information includes data item, the network node is based on the first algorithm according at least one described first Transaction Information, generates the block of the first block chain.
- According to the method for claim 17, which is characterized in that further include:If at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then the network node is based on the second algorithm according at least one described first Transaction Information and/or at least one described second Transaction Information, generates the block of the first block chain.
- The described in any item methods of 2-17 according to claim 1, which is characterized in that further include:If at least one described first Transaction Information includes the hashed value item of data, the network node is based on third algorithm according at least one described first Transaction Information, generates the block of the second block chain.
- According to the method for claim 17, which is characterized in that further include:If at least one described first Transaction Information includes the hashed value item of data, and at least one described second Transaction Information includes the hashed value item of data, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 4th algorithm, the block of the second block chain is generated.
- According to the method for claim 17, which is characterized in thatIf at least one described first Transaction Information includes data item, the network node is based on the 5th algorithm according at least one described first Transaction Information, generates the block of the first block chain;With, if at least one described first Transaction Information includes the hashed value item of data, and at least one described second Transaction Information includes the hashed value item of data, then the network node is according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 6th algorithm, the block of the second block chain is generated;Alternatively,If at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then the network node is based on the 7th algorithm according at least one described first Transaction Information and/or at least one described second Transaction Information, generates the block of the first block chain;It include the hashed value item of data with, at least one described first Transaction Information, then the network node is based on the 8th algorithm, the block of the second block chain of generation according at least one described first Transaction Information.
- Method described in 8,19 or 22 according to claim 1, which is characterized in that further include:The network node obtains the first hashed value of the first data;The network node obtains first data from the first block chain, and calculates the second hashed value of first data;First hashed value described in the network node is compared with second hashed value;If first hashed value is identical as second hashed value, the network node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,If first hashed value and second hashed value be not identical, the network node determines described One data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- According to method described in claim 20,21 or 22, which is characterized in that further include:The network node obtains the first hashed value of first data from the second block chain;The network node obtains first data of storage, and calculates the second hashed value of first data;First hashed value described in the network node is compared with second hashed value;If first hashed value is identical as second hashed value, the network node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,If first hashed value and second hashed value be not identical, the network node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- According to the method for claim 22, which is characterized in that further include:The network node obtains the first hashed value of first data from the second block chain;The network node obtains first data from the first block chain, and calculates the second hashed value of first data;First hashed value described in the network node is compared with second hashed value;If first hashed value is identical as second hashed value, the network node determines that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,If first hashed value and second hashed value be not identical, the network node determines that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- The described in any item methods of 3-25 according to claim 1, which is characterized in that further include:The network node sends the block of the data information or block chain to central node.
- The described in any item methods of 2-26 according to claim 1, which is characterized in that the network node is according at least one the first Transaction Information, after the block for generating block chain, further includes:The network node sends the first notification message at least one described device node, and first notification message is for notifying device node to generate the message of the block of block chain.
- The described in any item methods of 3-26 according to claim 1, which is characterized in that further include:The network node sends first to device node and deletes message, and the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
- The described in any item methods of 3-28 according to claim 1, which is characterized in that further include:The network node receives at least one described device node is sent second and deletes message, and the second deletion message is at least one described device node for requesting the deletion data information or deleting block.
- Method described in 2-29 according to claim 1, which is characterized in that further include:The network node determines block to be deleted, any one block chain that the target block chain is stored by the network node from target block chain.
- According to the described in any item methods of claim 27-30, which is characterized in that further include:Multiple Transaction Informations that the block of block chain described in the network node includes are sent to upper level network node.
- According to the described in any item methods of claim 27-31, which is characterized in that further include:The block to be deleted in target block chain described in the network node is deleted.
- According to method described in claim 30-32, which is characterized in that further include:The network node records area's block header content of the block to be deleted.
- According to the method for claim 30, which is characterized in that the network node determines block to be deleted from target block chain, comprising:According to default deletion rule, block to be deleted is determined from target block chain;Wherein, the default deletion rule are as follows: the block number that the network node stores the target block chain is greater than preset threshold, or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.
- A kind of data processing method characterized by comprisingDevice node sends one or more data information to network node, and the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address;The data information generates the first Transaction Information for the network node;Alternatively,Device node generates at least one second Transaction Information according to one or more data information, and at least one described second Transaction Information is sent to network node;Second Transaction Information includes at least one of following corresponding information: data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
- According to the method for claim 35, which is characterized in that further include:The device node receives the first notification message of block chain that network node is sent, the message for the block that first notification message is used to that the network node to be notified to generate block chain according to the data information.
- The method according to claim 35 or 36, which is characterized in that further include:The device node receives the block that network node is sent.
- According to the described in any item methods of claim 35-37, which is characterized in that further include:The device node receives the network node and sends the first deletion message, and the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
- According to the described in any item methods of claim 35-38, which is characterized in that further include:The second deletion message that the device node is sent to the network node, described second, which deletes message, deletes the data information or deletion block for requesting.
- According to method described in claim 35-39 Arbitrary Term, which is characterized in that further include:The device node deletes the data information.
- According to the method for claim 40, which is characterized in that the device node deletes data information, comprising:The device node is deleted the data information that duration is more than first time threshold is generated.
- A kind of central node characterized by comprisingModule is obtained, for obtaining the first hashed value of the first data from first network node;Computing module for obtaining first data from the second network node, and calculates the second hashed value of first data;Comparison module, for first hashed value to be compared with second hashed value;Determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value.
- Central node according to claim 42, which is characterized in thatThe determining module, if being also used to first hashed value and second hashed value is not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- The central node according to claim 42 or 43, which is characterized in that the acquisition module is specifically used for:Corresponding first hashed value of the first data is obtained from the second block chain of first network node;Wherein, the second block chain is that the block generated by the Transaction Information of the hashed value item comprising data forms.
- The central node according to claim 43 or 43, which is characterized in that the computing module is specifically used for:First data from the first block chain of the second network node, wherein the first block chain What the block to be generated by the Transaction Information comprising data item formed.
- According to central node described in claim 42,43 or 44, which is characterized in thatThe acquisition module, it is also used to obtain the first hashed value related information of first data from first network node, the related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
- According to central node described in claim 42,43 or 45, which is characterized in thatThe acquisition module, it is also used to obtain the related information of first data from the second network node, the related information includes at least one of the following: the index value of first data, the temporal information of first data, the device node mark of transmission first data, sends the address of first data and receive the address of first data.
- According to central node described in claim 42,43,44 or 46, which is characterized in thatThe determining module is also used to that a first network node is selected to be determined as target first network node;The module that obtains is specifically used for obtaining the first hashed value of the first data from the second block chain of target first network node.
- Central node according to claim 48, it is characterized in that, in terms of selecting a first network node to be determined as target first network node, the determining module is specifically used for selecting the first network node of first lawful condition of satisfaction from least one first network node being target first network node;First lawful condition are as follows: number of nodes identical with the first hashed value of the first data of the second block chain of the target first network node is more than first threshold.
- According to central node described in claim 42,43,45 or 47, which is characterized in thatThe determining module is also used to that second network node is selected to be determined as target second network node;The acquisition module is specifically used for obtaining the first data from the first block chain of the target second network node.
- Central node according to claim 50, it is characterized in that, in terms of selecting second network node to be determined as target second network node, the determining module is specifically used for selecting the network node of second lawful condition of satisfaction from least one second network node being the second target network node;Second lawful condition are as follows: the quantity of network node identical with the first data of the first block chain of the target second network node is more than second threshold.
- According to the described in any item central nodes of claim 42-51, which is characterized in that further include:Generation module, for if it is determined that first data are trust datas, it is determined that i-th of Transaction Information of third block chain meets formation condition, generates i-th of Transaction Information of third block chain;OrThe generation module is also used to if it is determined that first data are can not letter data, it is determined that i-th of Transaction Information of the third block chain is unsatisfactory for the formation condition, does not generate i-th of Transaction Information of the third block chain;OrThe generation module is also used to if it is determined that first data are can not letter data, it is determined that j-th of Transaction Information of the third block chain meets formation condition, generates j-th of Transaction Information of the third block chain.
- A kind of network node characterized by comprisingBlock generation module, for generating the block of block chain according at least one the first Transaction Information;First Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating first Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
- Network node according to claim 53, which is characterized in that further include:First information receiving module, for receiving the data information of at least one device node transmission;Information generating module, for generating at least one first Transaction Information according to the data information.
- Network node according to claim 54, it is characterized in that, the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address.
- Network node according to claim 55, which is characterized in that further include:Computing module calculates the first hashed value of first data if including first data for the data information and not including first hashed value;The information generating module is specifically used for generating at least one first Transaction Information according to the data information and first hashed value.
- According to the described in any item network nodes of claim 54-56, which is characterized in that further include:First information sending module, for sending at least one described first Transaction Information to other network nodes or at least one device node.
- According to the described in any item network nodes of claim 53-57, which is characterized in that further include:Second information receiving module, at least one second Transaction Information sent for receiving other network nodes or at least one device node;Wherein, second Transaction Information includes at least one of following corresponding information: transaction ID item, the node identification item for generating second Transaction Information, data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of the data and the recipient of the data.
- According to the described in any item network nodes of claim 53-58, which is characterized in thatThe block generation module according at least one described first Transaction Information, is based on the first algorithm, generates the block of the first block chain if being also used at least one described first Transaction Information includes data item.
- Network node according to claim 58, which is characterized in thatThe block generation module, if being also used at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the second algorithm, the block of the first block chain is generated.
- According to the described in any item network nodes of claim 53-58, it is characterised in thatThe block generation module according at least one described first Transaction Information, is based on third algorithm, generates the second block chain if being also used to the hashed value item that at least one described first Transaction Information includes data Block.
- Network node according to claim 58, which is characterized in thatThe block generation module, if being also used to the hashed value item that at least one described first Transaction Information includes data, and at least one described second Transaction Information includes the hashed value item of data, then according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 4th algorithm, the block of the second block chain is generated.
- Network node according to claim 58, which is characterized in thatThe block generation module according at least one described first Transaction Information, is based on the 5th algorithm, generates the block of the first block chain if being also used at least one described first Transaction Information includes data item;With, if at least one described first Transaction Information includes the hashed value item of data, and at least one described second Transaction Information includes the hashed value item of data, then according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 6th algorithm, the block of the second block chain is generated;Alternatively,The block generation module, if being also used at least one described first Transaction Information includes data item, and at least one described second Transaction Information includes data item, then according at least one described first Transaction Information and/or at least one described second Transaction Information, based on the 7th algorithm, the block of the first block chain is generated;With hashed value item of at least one described first Transaction Information comprising data, then according at least one described first Transaction Information, based on the 8th algorithm, the block of the second block chain of generation.
- According to network node described in claim 59,60 or 63, which is characterized in that further include:First obtains module, for obtaining the first hashed value of the first data;Described first obtains module, is also used to obtain first data from the first block chain, and calculate the second hashed value of first data;First comparison module, for first hashed value to be compared with second hashed value;First determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,First determining module, if being also used to first hashed value and second hashed value is not identical, Then determining that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- According to network node described in claim 61,62 or 63, which is characterized in that further include:Second obtains module, for obtaining the first hashed value of first data from the second block chain;Described second obtains module, is also used to obtain first data of storage, and calculate the second hashed value of first data;Second comparison module, for first hashed value to be compared with second hashed value;Second determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,Second determining module, if being also used to first hashed value and second hashed value is not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- Network node according to claim 63, which is characterized in that further include:Third obtains module, for obtaining the first hashed value of first data from the second block chain;The third obtains module, is also used to obtain first data from the first block chain, and calculate the second hashed value of first data;Third comparison module, for first hashed value to be compared with second hashed value;Third determining module, if identical as second hashed value for first hashed value, it is determined that first data are trust datas;Alternatively, determining that first data are not tampered with;Alternatively, the first hashed value for determining first data is credible hashed value;Or,The third determining module, if being also used to first hashed value and second hashed value is not identical, it is determined that first data are can not letter data;Alternatively, determining that first data have been tampered;Alternatively, the first hashed value for determining first data is insincere hashed value.
- According to the described in any item network nodes of claim 54-66, which is characterized in that further include:Block sending module, for sending the block of the data information or block chain to central node.
- According to the described in any item network nodes of claim 53-67, which is characterized in that further include:Notification message sending module, for sending the first notification message at least one described device node, first notification message is for notifying device node to generate the message of the block of block chain.
- According to the described in any item network nodes of claim 54-67, which is characterized in that further include:Message transmission module is deleted, deletes message for sending first to device node, the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
- According to the described in any item network nodes of claim 54-69, which is characterized in that further include:Message reception module is deleted, is also used to receive at least one described device node is sent second and deletes message, the second deletion message is at least one described device node for requesting the deletion data information or deleting block.
- According to network node described in claim 53-70, which is characterized in that further include:Block determining module is deleted, for determining block to be deleted, any one block chain that the target block chain is stored by the network node from target block chain.
- According to the described in any item network nodes of claim 53-71, which is characterized in thatSecond information sending module is also used to multiple Transaction Informations that the block of the block chain includes being sent to upper level network node.
- According to the described in any item network nodes of claim 68-72, which is characterized in that further includeRemoving module, for deleting the block to be deleted in the target block chain.
- According to network node described in claim 71-73, which is characterized in that further include:Logging modle, for recording area's block header content of the block to be deleted.
- Network node according to claim 71, which is characterized in that the removing module is specifically used for determining block to be deleted from target block chain according to default deletion rule;Wherein, the default deletion rule are as follows: the network node stores the block of the target block chain Number is greater than preset threshold or the block to be deleted is to generate the block that time duration is more than time threshold, alternatively, the block to be deleted is the block that block serial number is less than serial number threshold value.
- A kind of device node characterized by comprisingSending module, for sending one or more data information to network node, the data information includes at least one of following: the first data, the first hashed value of first data, the index value of first data, the temporal information of first data, the mark of device node for sending the data information, the address of the device node and the network node address;The data information generates the first Transaction Information for the network node;Alternatively,Generation module, for generating at least one second Transaction Information, and at least one described second Transaction Information is sent to network node according to one or more data information;Second Transaction Information includes at least one of following corresponding information: data item, the index value item of data, the hashed value item of data, temporal information item, sender's item of data and the recipient of data.
- The device node according to claim 76, which is characterized in that further include:First receiving module, for receiving the first notification message of block chain of network node transmission, the message for the block that first notification message is used to that the network node to be notified to generate block chain according to the data information.
- The device node according to claim 76 or 77, which is characterized in that further include:Second receiving module, for receiving the block of network node transmission.
- According to the described in any item device nodes of claim 76-78, which is characterized in that further include:Third receiving module sends the first deletion message for receiving the network node, and the first deletion message is to be used to indicate the device node to delete the data information or delete the instruction message of block.
- According to the described in any item device nodes of claim 76-79, which is characterized in thatThe sending module, be also used to send to the network node second delete message, and described second deletes message for requesting to delete the data information or deleting block.
- According to device node described in claim 76-80 Arbitrary Term, which is characterized in that further include:Removing module, for deleting the data information.
- The device node according to claim 81, which is characterized in that the removing module is specifically used for deleting generation duration more than the data information of first time threshold.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/000082 WO2018126344A1 (en) | 2017-01-03 | 2017-01-03 | Data processing method and related device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110023944A true CN110023944A (en) | 2019-07-16 |
CN110023944B CN110023944B (en) | 2021-12-28 |
Family
ID=62788947
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780074039.XA Active CN110023944B (en) | 2017-01-03 | 2017-01-03 | Communication method, terminal equipment and core network equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110023944B (en) |
WO (1) | WO2018126344A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114450686A (en) * | 2019-10-01 | 2022-05-06 | 富士通株式会社 | Transaction management device, transaction management program, and transaction management method |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11868509B2 (en) * | 2017-11-17 | 2024-01-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and arrangement for detecting digital content tampering |
US11038950B2 (en) * | 2018-08-14 | 2021-06-15 | Microsoft Technology Licensing, Llc | Blockchain digital twin for transactions on behalf of limited capability devices |
GB2587541A (en) * | 2018-10-05 | 2021-03-31 | Dragon Infosec Ltd | A consensus method and framework for a blockchain system |
GB2577751A (en) * | 2018-10-05 | 2020-04-08 | Dragon Infosec Ltd | A consensus method and framework for a blockchain system |
CN110046036A (en) | 2018-12-25 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of operation requests distribution method, device and equipment |
CN111212126B (en) * | 2019-12-27 | 2023-05-26 | 百度在线网络技术(北京)有限公司 | Data transmission method, device, equipment and medium of block chain network |
CN113225191B (en) * | 2021-03-24 | 2024-02-13 | 湖南宸瀚信息科技有限责任公司 | Generation method and device of consensus node, storage medium and processor |
US20220393892A1 (en) * | 2021-06-08 | 2022-12-08 | Artema Labs, Inc | Composite Cryptographic Systems with Variable Configuration Parameters and Memory Bound Functions |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1535059A (en) * | 2003-03-31 | 2004-10-06 | ��ʽ����Ntt����Ħ | Terminal apparatus and program |
US20080070543A1 (en) * | 2006-09-14 | 2008-03-20 | Marcin Wieslaw Matuszewski | Method for the routing of multimedia communication related signaling in a communication system |
CN101599994A (en) * | 2009-06-01 | 2009-12-09 | 中兴通讯股份有限公司 | The method of transfer files data between distributed file system, access node and node |
CN101853190A (en) * | 2010-06-04 | 2010-10-06 | 华中科技大学 | Data integrity verification method suitable for embedded processor |
CN102355663A (en) * | 2011-06-30 | 2012-02-15 | 北京交通大学 | Credible inter-domain rapid authentication method on basis of separation mechanism network |
CN102955808A (en) * | 2011-08-26 | 2013-03-06 | 腾讯科技(深圳)有限公司 | Data acquisition method and distributed file system |
CN103765849A (en) * | 2011-07-18 | 2014-04-30 | 微软公司 | Distributing network identifiers using a hash function |
CN103902617A (en) * | 2012-12-28 | 2014-07-02 | 华为技术有限公司 | Distributed database synchronization method and system |
CN104168563A (en) * | 2014-08-15 | 2014-11-26 | 西安电子科技大学 | K-anonymity incentive mechanism based on local reputation storage |
CN104468548A (en) * | 2014-11-28 | 2015-03-25 | 华为技术有限公司 | Data verification method, disaster recovery storage and production storage |
KR101600717B1 (en) * | 2014-12-04 | 2016-03-07 | 한양대학교 산학협력단 | Method and apparatus for download virtual machine operating system image |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN105812391A (en) * | 2016-05-16 | 2016-07-27 | 广州鼎鼎信息科技有限公司 | Safe cloud storage system |
CN105912618A (en) * | 2016-04-07 | 2016-08-31 | 浙江万马新能源有限公司 | Block chain based charging pile charging transaction communication method and device |
CN106060036A (en) * | 2016-05-26 | 2016-10-26 | 布比(北京)网络技术有限公司 | Decentralized consenting method and apparatus |
CN106201338A (en) * | 2016-06-28 | 2016-12-07 | 华为技术有限公司 | Date storage method and device |
CN106230851A (en) * | 2016-08-29 | 2016-12-14 | 中金云金融(北京)大数据科技股份有限公司 | Data security method based on block chain and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106650494B (en) * | 2016-12-16 | 2019-07-16 | 杭州嘉楠耘智信息科技有限公司 | Data processing method and device |
-
2017
- 2017-01-03 WO PCT/CN2017/000082 patent/WO2018126344A1/en active Application Filing
- 2017-01-03 CN CN201780074039.XA patent/CN110023944B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1535059A (en) * | 2003-03-31 | 2004-10-06 | ��ʽ����Ntt����Ħ | Terminal apparatus and program |
US20080070543A1 (en) * | 2006-09-14 | 2008-03-20 | Marcin Wieslaw Matuszewski | Method for the routing of multimedia communication related signaling in a communication system |
CN101599994A (en) * | 2009-06-01 | 2009-12-09 | 中兴通讯股份有限公司 | The method of transfer files data between distributed file system, access node and node |
CN101853190A (en) * | 2010-06-04 | 2010-10-06 | 华中科技大学 | Data integrity verification method suitable for embedded processor |
CN102355663A (en) * | 2011-06-30 | 2012-02-15 | 北京交通大学 | Credible inter-domain rapid authentication method on basis of separation mechanism network |
CN103765849A (en) * | 2011-07-18 | 2014-04-30 | 微软公司 | Distributing network identifiers using a hash function |
CN102955808A (en) * | 2011-08-26 | 2013-03-06 | 腾讯科技(深圳)有限公司 | Data acquisition method and distributed file system |
CN103902617A (en) * | 2012-12-28 | 2014-07-02 | 华为技术有限公司 | Distributed database synchronization method and system |
CN104168563A (en) * | 2014-08-15 | 2014-11-26 | 西安电子科技大学 | K-anonymity incentive mechanism based on local reputation storage |
CN104468548A (en) * | 2014-11-28 | 2015-03-25 | 华为技术有限公司 | Data verification method, disaster recovery storage and production storage |
KR101600717B1 (en) * | 2014-12-04 | 2016-03-07 | 한양대학교 산학협력단 | Method and apparatus for download virtual machine operating system image |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN105761143A (en) * | 2016-02-01 | 2016-07-13 | 上海凭安网络科技有限公司 | Multi-party co-construction credit record method based on block chains |
CN105912618A (en) * | 2016-04-07 | 2016-08-31 | 浙江万马新能源有限公司 | Block chain based charging pile charging transaction communication method and device |
CN105812391A (en) * | 2016-05-16 | 2016-07-27 | 广州鼎鼎信息科技有限公司 | Safe cloud storage system |
CN106060036A (en) * | 2016-05-26 | 2016-10-26 | 布比(北京)网络技术有限公司 | Decentralized consenting method and apparatus |
CN106201338A (en) * | 2016-06-28 | 2016-12-07 | 华为技术有限公司 | Date storage method and device |
CN106230851A (en) * | 2016-08-29 | 2016-12-14 | 中金云金融(北京)大数据科技股份有限公司 | Data security method based on block chain and system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114450686A (en) * | 2019-10-01 | 2022-05-06 | 富士通株式会社 | Transaction management device, transaction management program, and transaction management method |
Also Published As
Publication number | Publication date |
---|---|
WO2018126344A1 (en) | 2018-07-12 |
CN110023944B (en) | 2021-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110023944A (en) | A kind of data processing method and relevant device | |
US11323347B2 (en) | Systems and methods for social graph data analytics to determine connectivity within a community | |
JP5811094B2 (en) | Attribute information processing apparatus, attribute information processing method, and attribute information evaluation system | |
US10311106B2 (en) | Social graph visualization and user interface | |
CN110070359A (en) | Verification of data system, method, calculating equipment and storage medium based on block chain | |
US20130166601A1 (en) | Systems and methods for conducting reliable assessments with connectivity information | |
US11418653B1 (en) | Systems and methods for simulating multiple call center balancing | |
US10609554B2 (en) | System and method to collect device location context without the collection of raw, detailed location data at scale | |
WO2011106897A1 (en) | Systems and methods for conducting more reliable assessments with connectivity statistics | |
CN104346365A (en) | Device and method for determining specific service associated logs | |
US20190207887A1 (en) | Techniques for message deduplication | |
EP3817333B1 (en) | Method and system for processing requests in a consortium blockchain | |
US11818298B1 (en) | Systems and methods for simulating multiple call center balancing | |
CN112804358A (en) | Method and device for transferring data in cross-link mode based on relay equipment network | |
CN110046994A (en) | A kind of method and system for accepting block chain and depositing card transaction | |
CN109934709A (en) | Data processing method, device and server based on block chain | |
CN115049070A (en) | Screening method and device of federal characteristic engineering data, equipment and storage medium | |
CN114255037A (en) | Multi-party combined sorting method and data processing method under privacy protection | |
CN112100643B (en) | Data processing method and device based on privacy protection and server | |
KR101798377B1 (en) | Method for de-identification of personal information and apparatus for the same | |
CN112597525A (en) | Data processing method and device based on privacy protection and server | |
US10489429B2 (en) | Relationship graph evaluation system | |
CN114691503B (en) | Test-oriented management method, device, equipment and medium | |
KR20160042260A (en) | Apparatus and method for searching using orthogonal codes | |
CN113726764B (en) | Private data transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |