[go: up one dir, main page]

CN110023944B - Communication method, terminal equipment and core network equipment - Google Patents

Communication method, terminal equipment and core network equipment Download PDF

Info

Publication number
CN110023944B
CN110023944B CN201780074039.XA CN201780074039A CN110023944B CN 110023944 B CN110023944 B CN 110023944B CN 201780074039 A CN201780074039 A CN 201780074039A CN 110023944 B CN110023944 B CN 110023944B
Authority
CN
China
Prior art keywords
data
network node
hash value
node
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780074039.XA
Other languages
Chinese (zh)
Other versions
CN110023944A (en
Inventor
张亮亮
张臣雄
冯淑兰
常俊仁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN110023944A publication Critical patent/CN110023944A/en
Application granted granted Critical
Publication of CN110023944B publication Critical patent/CN110023944B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A data processing method and related equipment are provided, wherein the method comprises the following steps: the central node acquires a first hash value of first data from a first network node; the central node acquires the first data from a second network node and calculates a second hash value of the first data; the central node compares the first hash value with the second hash value; if the first hash value is the same as the second hash value, the central node determines that the first data is credible data; or, determining that the first data has not been tampered; alternatively, it is determined that the first hash value of the first data is a trusted hash value. By adopting the method and the device, the stored data can be effectively verified in a mode of respectively storing the data and the hashed values of the data, the validity of data storage is improved, and the tamper resistance of the data is also improved.

Description

通信方法及终端设备、核心网设备Communication method and terminal equipment, core network equipment

技术领域technical field

本申请涉及通信技术领域,尤其涉及一种数据处理方法及相关设备。The present application relates to the field of communication technologies, and in particular, to a data processing method and related equipment.

背景技术Background technique

区块链(block chain)是一种分布式数据库,可以理解为是一种按照时间顺序将数据区块以顺序相连的方式组合成的一种链式数据结构,并以密码学方式保证的不可篡改和不可伪造的分布式账本。在现有技术方案中,网络节点生成的区块链是由包含交易信息的区块按照一定顺序链接起来的数据结构,在这一数据结构中,区块是由包含元数据的区块头和紧跟其后的构成区块主体的一个或者多个交易信息组成的,其中,一个或者多个交易信息是根据设备节点所产生的数据生成的。Blockchain (block chain) is a distributed database, which can be understood as a chain data structure that combines data blocks in a sequential manner according to time sequence, and is cryptographically guaranteed. Tamperable and unforgeable distributed ledgers. In the prior art solution, the block chain generated by the network node is a data structure in which blocks containing transaction information are linked in a certain order. In this data structure, a block is composed of a block header containing metadata and a tight It is composed of one or more transaction information that constitutes the main body of the block, wherein the one or more transaction information is generated according to the data generated by the device node.

对于设备节点生成的一个数据,现有技术方案是根据该数据生成了一个交易信息,并通过共识算法,将该交易生成区块链中的一个区块。这样若不法人员将这一区块链中的所述数据的交易信息都替换并篡改了,通过该区块链也无法验证这一区块链的正确性,降低了数据存储的有效性。For a piece of data generated by a device node, the prior art solution is to generate a transaction information according to the data, and generate a block in the blockchain from the transaction through a consensus algorithm. In this way, if illegal personnel replace and tamper with the transaction information of the data in the blockchain, the correctness of the blockchain cannot be verified through the blockchain, which reduces the effectiveness of data storage.

发明内容SUMMARY OF THE INVENTION

本申请实施例提供了一种数据处理方法及相关设备,通过分别存储数据和数据的散列值的方式,能够实现对所存储数据的有效验证,提高了数据存储的有效性,也提高了数据的防篡改能力。The embodiments of the present application provide a data processing method and related equipment. By storing data and a hash value of the data respectively, effective verification of the stored data can be realized, the effectiveness of data storage is improved, and the data tamper resistance.

第一方面,本申请实施例提供了一种数据处理方法,包括:In a first aspect, an embodiment of the present application provides a data processing method, including:

中心节点从第一网络节点获取第一数据的第一散列值;the central node obtains the first hash value of the first data from the first network node;

所述中心节点从第二网络节点获取所述第一数据,并计算所述第一数据的第二散列值;The central node obtains the first data from the second network node, and calculates a second hash value of the first data;

所述中心节点将所述第一散列值与所述第二散列值进行比对;the central node compares the first hash value with the second hash value;

若所述第一散列值与所述第二散列值相同,则所述中心节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值。If the first hash value is the same as the second hash value, the central node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that all The first hash value of the first data is a trusted hash value.

在第一方面,中心节点获取第一网络节点的第一数据的第一散列值,并获取第二网络节点的第一数据,并计算第一数据的第二散列值,将第一散列值和散列值进行比对,进而确定第一数据是否为可信数据。这种方案实现了对所存储数据的有效验证,进而提高了数据存储的有效性。In a first aspect, the central node obtains the first hash value of the first data of the first network node, and obtains the first data of the second network node, and calculates the second hash value of the first data, and the first hash value is The column value and the hash value are compared to determine whether the first data is authentic data. This scheme realizes effective verification of the stored data, thereby improving the effectiveness of data storage.

在一种可选的实施例中,还包括若所述第一散列值与所述第二散列值不相同,则所述中心节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。In an optional embodiment, the method further includes, if the first hash value is different from the second hash value, determining, by the central node, that the first data is untrusted data; or, determining The first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value.

在一种可选的实施例中,所述中心节点从第一网络节点获取第一数据的第一散列值具体是从第一网络节点的第二区块链中获取第一数据对应的第一散列值;其中,所述第二区块链为由包含数据的散列值项的交易信息生成的区块组成的。In an optional embodiment, the central node acquiring the first hash value of the first data from the first network node is specifically acquiring the first hash value corresponding to the first data from the second blockchain of the first network node A hash value; wherein, the second block chain is composed of blocks generated by transaction information containing hash value items of data.

在一种可选的实施例中,所述中心节点从第二网络节点获取所述第一数据具体是从第二网络节点的第一区块链中获取所述第一数据,其中,所述第一区块链为由包含数据项的交易信息生成的区块组成的。In an optional embodiment, the central node acquiring the first data from the second network node specifically acquires the first data from the first blockchain of the second network node, wherein the The first blockchain is composed of blocks generated from transaction information containing data items.

在一种可选的实施例中,还包括:所述中心节点从第一网络节点获取所述第一数据的第一散列值关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。In an optional embodiment, the method further includes: the central node acquires first hash value association information of the first data from a first network node, and the association information includes at least one of the following: the first hash value An index value of the data, time information of the first data, an identifier of a device node that sends the first data, an address for sending the first data, and an address for receiving the first data.

在一种可选的实施例中,还包括:所述中心节点从第二网络节点获取所述第一数据的关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。In an optional embodiment, the method further includes: the central node acquires association information of the first data from a second network node, where the association information includes at least one of the following: an index value of the first data , the time information of the first data, the identifier of the device node sending the first data, the address for sending the first data, and the address for receiving the first data.

在一种可选的实施例中,所述中心节点从第一网络节点获取第一数据的第一散列值之前,还包括:所述中心节点选择一个第一网络节点确定为目标第一网络节点;而所述中心节点从第一网络节点获取第一数据的第一散列值具体是从目标第一网络节点的第二区块链中获取第一数据的第一散列值。In an optional embodiment, before the central node acquires the first hash value of the first data from the first network node, the method further includes: the central node selects a first network node and determines it as the target first network The central node obtains the first hash value of the first data from the first network node, specifically, obtains the first hash value of the first data from the second blockchain of the target first network node.

在一种可选的实施例中,所述中心节点选择一个第一网络节点确定为目标第一网络节点,包括:所述中心节点从至少一个第一网络节点中选择一个满足第一合法条件的第一网络节点为目标第一网络节点;所述第一合法条件为:与所述目标第一网络节点的第二区块链的第一数据的第一散列值相同的节点数量超过第一阈值。In an optional embodiment, the central node selecting a first network node and determining it as the target first network node includes: the central node selecting a first network node that satisfies the first legal condition from the at least one first network node The first network node is the target first network node; the first legal condition is: the number of nodes that are the same as the first hash value of the first data of the second blockchain of the target first network node exceeds the first threshold.

在一种可选的实施例中,所述中心节点从第二网络节点获取所述第一数据之前,还包括:In an optional embodiment, before the central node acquires the first data from the second network node, the method further includes:

所述中心节点选择一个第二网络节点确定为目标第二网络节点。而所述中心节点从第二网络节点获取所述第一数据,包括:所述中心节点从所述目标第二网络节点的第一区块链中获取第一数据。The central node selects a second network node and determines it as the target second network node. The obtaining, by the central node, the first data from the second network node includes: the central node obtaining the first data from the first blockchain of the target second network node.

在一种可选的实施例中,所述中心节点选择一个第二网络节点确定为目标第二网络节点具体是从至少一个第二网络节点中选择一个满足第二合法条件的网络节点为第二目标网络节点;所述第二合法条件为:与所述目标第二网络节点的第一区块链的第一数据相同的网络节点的数量超过第二阈值。In an optional embodiment, the central node selects a second network node and determines it as the target second network node, specifically, selects a network node that satisfies the second legal condition from at least one second network node as the second network node A target network node; the second legal condition is: the number of network nodes that are identical to the first data of the first blockchain of the target second network node exceeds a second threshold.

在一种可选的实施例中,还包括:若确定所述第一数据是可信数据,则所述中心节点确定第三区块链的第i个交易信息满足生成条件,生成第三区块链的第i个交易信息;或者,若确定所述第一数据是不可信数据,则所述中心节点确定所述第三区块链的第i个交易信息不满足所述生成条件,不生成所述第三区块链的第i个交易信息;或者,若确定所述第一数据是不可信数据,则所述中心节点确定所述第三区块链的第j个交易信息满足生成条件,生成所述第三区块链的第j个交易信息。In an optional embodiment, the method further includes: if it is determined that the first data is trusted data, the central node determines that the i-th transaction information of the third blockchain meets the generation conditions, and generates a third area The i-th transaction information of the blockchain; or, if it is determined that the first data is untrusted data, the central node determines that the i-th transaction information of the third blockchain does not meet the generation conditions, and does not Generate the i-th transaction information of the third blockchain; or, if it is determined that the first data is untrusted data, the central node determines that the j-th transaction information of the third blockchain satisfies the generation condition, generate the jth transaction information of the third blockchain.

第二方面,本申请实施例提供了一种数据处理方法,包括:In a second aspect, an embodiment of the present application provides a data processing method, including:

网络节点根据至少一个第一交易信息,生成区块链的区块。其中,所述第一交易信息包括以下至少一项对应的信息:交易标识项、生成所述第一交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。The network node generates a block of the blockchain according to the at least one first transaction information. The first transaction information includes information corresponding to at least one of the following items: transaction identification item, node identification item that generated the first transaction information, data item, data index value item, data hash value item, time Information items, sender items of data, and receiver items of data.

在第二方面,设备节点将交易信息发送至网络节点,能够缓解设备节点的存储压力,另外,在网络节点生成了关于交易信息的区块链,提高了数据存储的有效性。In the second aspect, the device node sends the transaction information to the network node, which can relieve the storage pressure of the device node. In addition, a blockchain about the transaction information is generated at the network node, which improves the effectiveness of data storage.

在一种可选的实施例中,所述网络节点根据至少一个第一交易信息,生成区块链的区块之前,还包括:所述网络节点接收至少一个设备节点发送的数据信息;所述网络节点根据所述数据信息生成至少一个第一交易信息。可以看出,该网络节点的第一交易信息是由网络节点生成的。In an optional embodiment, before the network node generates a block of the blockchain according to at least one first transaction information, the method further includes: receiving, by the network node, data information sent by at least one device node; The network node generates at least one first transaction information according to the data information. It can be seen that the first transaction information of the network node is generated by the network node.

在一种可选的实施例中,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址。可选的,在第一交易信息为根据所述数据信息生成的情况下,第一交易信息中所包含一项或者多项的信息也是通过所述数据信息而确定的。In an optional embodiment, the data information includes at least one of the following: first data, a first hash value of the first data, an index value of the first data, the first data time information, the identifier of the device node sending the data information, the address of the device node and the address of the network node. Optionally, when the first transaction information is generated according to the data information, one or more items of information included in the first transaction information are also determined through the data information.

在一种可选的实施例中,若所述数据信息包括所述第一数据且未包括所述第一散列值,则所述网络节点计算所述第一数据的第一散列值;所述网络节点根据所述数据信息生成至少一个第一交易信息具体是根据所述数据信息和所述第一散列值生成至少一个第一交易信息。可选的,所述第一交易信息可以是关于所述第一数据的,或者,所述第一交易信息也可以是关于所述第一散列值的。In an optional embodiment, if the data information includes the first data and does not include the first hash value, the network node calculates the first hash value of the first data; The generation of the at least one first transaction information by the network node according to the data information is specifically to generate at least one first transaction information according to the data information and the first hash value. Optionally, the first transaction information may be related to the first data, or the first transaction information may also be related to the first hash value.

在一种可选的实施例中,所述网络节点向其他网络节点或至少一个设备节点发送所述至少一个第一交易信息。例如,所述网络节点广播所述至少一个第一交易信息。In an optional embodiment, the network node sends the at least one first transaction information to other network nodes or at least one device node. For example, the network node broadcasts the at least one first transaction information.

在一种可选的实施例中,还包括:所述网络节点接收其他网络节点或者至少一个设备节点发送的至少一个第二交易信息;其中,所述第二交易信息包括以下至少一项对应的信息:交易标识项、生成所述第二交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、所述数据的发送方项和所述数据的接收方项。In an optional embodiment, the method further includes: the network node receives at least one second transaction information sent by other network nodes or at least one device node; wherein the second transaction information includes at least one of the following Information: transaction identification item, node identification item that generates the second transaction information, data item, data index value item, data hash value item, time information item, the sender item of the data, and the data item. Receiver item.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息,基于第一算法,生成第一区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a data item, the network node generates a first area based on a first algorithm according to the at least one first transaction information Blocks of the blockchain.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第二算法,生成第一区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, the network node according to the at least one first transaction information includes a data item. One transaction information and/or the at least one second transaction information, based on the second algorithm, generate a block of the first blockchain.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,基于第三算法,生成第二区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a hash value item of data, the network node, according to the at least one first transaction information, based on a third algorithm, Generate the blocks of the second blockchain.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第四算法,生成第二区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a hash value item of data, and the at least one second transaction information includes a hash value item of data, then the The network node generates a block of the second blockchain based on the fourth algorithm according to the at least one first transaction information and/or the at least one second transaction information.

在一种可选的实施例中,若所述至少一个第一交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息,基于第五算法,生成第一区块链的区块;和,若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第六算法,生成第二区块链的区块;或者,In an optional embodiment, if the at least one first transaction information includes a data item, the network node generates the first blockchain based on the fifth algorithm according to the at least one first transaction information. and, if the at least one first transaction information contains a hash value item of data, and the at least one second transaction information contains a hash value item of data, the network node according to the at least one first transaction information A block of transaction information and/or the at least one second transaction information is generated based on the sixth algorithm; or,

若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第七算法,生成第一区块链的区块;和,所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,基于第八算法,生成第二区块链的区块。If the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, the network node according to the at least one first transaction information and/or the at least one second transaction information, based on the seventh algorithm, generate a block of the first blockchain; and, if the at least one first transaction information contains a hash value item of data, then the network node, according to the at least one first transaction information, Based on the eighth algorithm, a block of the second blockchain is generated.

在一种可选的实施例中,对于所述网络节点生成了关于包含第一数据的第一区块链且存储了第一数据的散列值的情况下,所述网络节点获取第一数据的第一散列值;从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。通过分别存储数据和数据的散列值的方式,即使数据被篡改了,能够实现对所存储数据的有效验证,提高了数据存储的有效性,也提高了数据的防篡改能力。In an optional embodiment, in the case that the network node generates a first blockchain containing the first data and stores the hash value of the first data, the network node obtains the first data obtain the first data from the first blockchain, and calculate the second hash value of the first data; combine the first hash value with the second hash value Compare the column values; if the first hash value is the same as the second hash value, it is determined that the first data is trusted data; or, it is determined that the first data has not been tampered with; or, determining that the first hash value of the first data is a trusted hash value; or, if the first hash value is not the same as the second hash value, determining that the first data is not trusted data; or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value. By storing the data and the hash value of the data separately, even if the data is tampered, effective verification of the stored data can be achieved, the effectiveness of data storage is improved, and the tamper-proof capability of the data is also improved.

在一种可选的实施例中,对于所述网络节点生成了关于包含第一数据的第一散列值的第二区块链且存储了第一数据的情况下,从所述第二区块链获取所述第一数据的第一散列值;获取存储的所述第一数据,并计算所述第一数据的第二散列值;将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。通过分别存储数据和数据的散列值的方式,即使数据被篡改了,能够实现对所存储数据的有效验证,提高了数据存储的有效性,也提高了数据的防篡改能力。In an optional embodiment, in the case that the network node generates a second blockchain about the first hash value containing the first data and stores the first data, the second block chain is stored from the second area. The block chain obtains the first hash value of the first data; obtains the stored first data, and calculates the second hash value of the first data; associates the first hash value with the first hash value Two hash values are compared; if the first hash value is the same as the second hash value, it is determined that the first data is trusted data; or, it is determined that the first data has not been tampered with; Or, determine that the first hash value of the first data is a trusted hash value; or, if the first hash value is not the same as the second hash value, determine that the first data is Untrusted data; or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value. By storing the data and the hash value of the data separately, even if the data is tampered, effective verification of the stored data can be achieved, the effectiveness of data storage is improved, and the tamper-proof capability of the data is also improved.

在一种可选的实施例中,对于所述网络节点生成了关于包含第一数据的第一区块链且生成了关于包含第一数据的散列值的第二区块链的情况下,从所述第二区块链获取所述第一数据的第一散列值;从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。通过分别存储数据和数据的散列值的方式,即使数据被篡改了,能够实现对所存储数据的有效验证,提高了数据存储的有效性,也提高了数据的防篡改能力。In an optional embodiment, when the network node generates a first blockchain containing the first data and generates a second blockchain containing the hash value of the first data, Obtain the first hash value of the first data from the second blockchain; obtain the first data from the first blockchain, and calculate the second hash value of the first data; comparing the first hash value with the second hash value; if the first hash value is the same as the second hash value, determine that the first data is trusted data; Or, it is determined that the first data has not been tampered with; or, it is determined that the first hash value of the first data is a trusted hash value; or, if the first hash value is the same as the second hash value If the values are not the same, it is determined that the first data is untrusted data; or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value. By storing the data and the hash value of the data separately, even if the data is tampered, effective verification of the stored data can be achieved, the effectiveness of data storage is improved, and the tamper-proof capability of the data is also improved.

在一种可选的实施例中,还包括:所述网络节点向中心节点发送所述数据信息或者区块链的区块。可选的,所述网络节点可以在接收到中心节点的数据信息或者区块的获取请求之后发送数据信息或区块链的区块。In an optional embodiment, the method further includes: the network node sends the data information or the block of the blockchain to the central node. Optionally, the network node may send the data information or the block of the blockchain after receiving the data information or the block acquisition request of the central node.

在一种可选的实施例中,所述网络节点根据至少一个第一交易信息,生成区块链的区块之后,还包括:所述网络节点向所述至少一个设备节点发送第一通知消息,所述第一通知消息用于通知设备节点已生成区块链的区块的消息。可选的,这样设备节点在接收到第一通知消息之后,对数据信息进行相应的处理,例如,删除。In an optional embodiment, after the network node generates the block of the blockchain according to the at least one first transaction information, the method further includes: the network node sends a first notification message to the at least one device node , the first notification message is used to notify the device node that a block of the blockchain has been generated. Optionally, after receiving the first notification message, the device node performs corresponding processing on the data information, for example, deletion.

在一种可选的实施例中,还包括:所述网络节点向设备节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。In an optional embodiment, the method further includes: the network node sends a first deletion message to the device node, where the first deletion message is used to instruct the device node to delete the data information or delete the block. Indication message.

在一种可选的实施例中,还包括:所述网络节点接收所述至少一个设备节点发送的第二删除消息,所述第二删除消息为所述至少一个设备节点用于请求删除所述数据信息或者删除区块。可选的,所述网络节点根据所述第二删除消息为所述设备节点确定可删除的数据信息或者可删除的区块,或者,所述网络节点可以向设备节点发送删除允许消息,以指示设备节点自身确定可删除的数据信息或可删除的区块。In an optional embodiment, the method further includes: receiving, by the network node, a second deletion message sent by the at least one device node, where the second deletion message is used by the at least one device node to request deletion of the data information or delete blocks. Optionally, the network node determines the data information or block that can be deleted for the device node according to the second delete message, or the network node can send a delete permission message to the device node to indicate The device node itself determines the data information that can be deleted or the block that can be deleted.

在一种可选的实施例中,还包括:所述网络节点从目标区块链中确定待删除区块,所述目标区块链为所述网络节点所存储的任意一个区块链。In an optional embodiment, the method further includes: the network node determines a block to be deleted from a target blockchain, where the target blockchain is any blockchain stored by the network node.

在一种可选的实施例中,还包括:所述网络节点将所述区块链的区块包含的多个交易信息发送至上一级网络节点。例如,在网络节点存储压力较大的情况下,可以将多个交易信息转移至上一级的网络节点进行存储,以减少该网络节点的存储压力。In an optional embodiment, the method further includes: the network node sends a plurality of transaction information contained in the block of the blockchain to the upper-level network node. For example, when the storage pressure of the network node is high, multiple transaction information can be transferred to the network node of the upper level for storage, so as to reduce the storage pressure of the network node.

在一种可选的实施例中,还包括:所述网络节点将所述目标区块链中的所述待删除区块进行删除。可选的,网络节点从目标区块链中确定待删除区块具体是按照预设删除规则,从目标区块链中确定待删除区块;其中,所述预设删除规则为:所述网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。可选的,所述网络节点记录所述待删除区块的区块头内容,以便于在接收到关于所删除的区块的查询信息时,确定所删除的区块所存储过的节点。In an optional embodiment, the method further includes: the network node deletes the block to be deleted in the target blockchain. Optionally, the network node determines the block to be deleted from the target blockchain by determining the block to be deleted from the target blockchain according to a preset deletion rule; wherein, the preset deletion rule is: the network The number of blocks stored by the node in the target blockchain is greater than a preset threshold, or the block to be deleted is a block whose generation time duration exceeds the time threshold, or the block to be deleted is a block whose serial number is less than the serial number Threshold block. Optionally, the network node records the content of the block header of the block to be deleted, so as to determine the node where the deleted block is stored when receiving the query information about the deleted block.

第三方面,本申请实施例提供了一种数据处理方法,包括:In a third aspect, an embodiment of the present application provides a data processing method, including:

所述网络节点接收至少一个设备节点发送的一个或多个数据信息;The network node receives one or more data information sent by at least one device node;

所述网络节点根据所述一个或多个数据信息,生成至少一个第一交易信息。The network node generates at least one first transaction information according to the one or more pieces of data information.

所述第一交易信息包括以下至少一项对应的信息:交易标识项、生成所述第一交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。The first transaction information includes information corresponding to at least one of the following items: a transaction identification item, a node identification item that generates the first transaction information, a data item, an index value item of the data, a hash value item of the data, and a time information item , the sender item of the data, and the receiver item of the data.

可选的,所述数据信息所述数据信息包括以下至少一项:数据、数据的第一散列值、数据的索引值、数据生成的时间、所述设备节点的标识、所述设备节点的地址和所述网络节点的地址。Optionally, the data information includes at least one of the following: data, the first hash value of the data, the index value of the data, the time when the data is generated, the identifier of the device node, the data of the device node. address and the address of the network node.

可选的,在第一交易信息为根据所述数据信息生成的情况下,第一交易信息中所包含一项或者多项的信息也是通过所述数据信息而确定的。Optionally, when the first transaction information is generated according to the data information, one or more items of information included in the first transaction information are also determined through the data information.

在第二方面,设备节点将数据信息发送至网络节点,能够缓解设备节点的存储压力,另外,在网络节点能够根据数据信息生成交易信息,以进行存储。In the second aspect, the device node sends data information to the network node, which can relieve the storage pressure of the device node. In addition, the network node can generate transaction information according to the data information for storage.

在一种可选的实施例中,还包括:若所述数据信息包括所述第一数据且未包括所述第一散列值,则所述网络节点计算所述第一数据的第一散列值;所述网络节点根据所述数据信息生成至少一个第一交易信息具体是根据所述数据信息和所述第一散列值生成至少一个第一交易信息。In an optional embodiment, the method further includes: if the data information includes the first data and does not include the first hash value, the network node calculates a first hash value of the first data column value; the network node generating at least one first transaction information according to the data information is specifically generating at least one first transaction information according to the data information and the first hash value.

在一种可选的实施例中,还包括:所述网络节点向其他网络节点或至少一个设备节点发送所述至少一个第一交易信息。例如,所述网络节点广播所述至少一个第一交易信息。In an optional embodiment, the method further includes: the network node sending the at least one first transaction information to other network nodes or at least one device node. For example, the network node broadcasts the at least one first transaction information.

在一种可选的实施例中,还包括:所述网络节点接收其他网络节点或者至少一个设备节点发送的至少一个第二交易信息;其中,所述第二交易信息包括以下至少一项对应的信息:交易标识项、生成所述第二交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、所述数据的发送方项和所述数据的接收方项。In an optional embodiment, the method further includes: the network node receives at least one second transaction information sent by other network nodes or at least one device node; wherein the second transaction information includes at least one of the following Information: transaction identification item, node identification item that generates the second transaction information, data item, data index value item, data hash value item, time information item, the sender item of the data, and the data item. Receiver item.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息,基于第一算法,生成第一区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a data item, the network node generates a first area based on a first algorithm according to the at least one first transaction information Blocks of the blockchain.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第二算法,生成第一区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, the network node according to the at least one first transaction information includes a data item. One transaction information and/or the at least one second transaction information, based on the second algorithm, generate a block of the first blockchain.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,基于第三算法,生成第二区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a hash value item of data, the network node, according to the at least one first transaction information, based on a third algorithm, Generate the blocks of the second blockchain.

在一种可选的实施例中,还包括:若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第四算法,生成第二区块链的区块。In an optional embodiment, the method further includes: if the at least one first transaction information includes a hash value item of data, and the at least one second transaction information includes a hash value item of data, then the The network node generates a block of the second blockchain based on the fourth algorithm according to the at least one first transaction information and/or the at least one second transaction information.

在一种可选的实施例中,若所述至少一个第一交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息,基于第五算法,生成第一区块链的区块;和,若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第六算法,生成第二区块链的区块;或者,In an optional embodiment, if the at least one first transaction information includes a data item, the network node generates the first blockchain based on the fifth algorithm according to the at least one first transaction information. and, if the at least one first transaction information contains a hash value item of data, and the at least one second transaction information contains a hash value item of data, the network node according to the at least one first transaction information A block of transaction information and/or the at least one second transaction information is generated based on the sixth algorithm; or,

若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第七算法,生成第一区块链的区块;和,所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,基于第八算法,生成第二区块链的区块。If the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, the network node according to the at least one first transaction information and/or the at least one second transaction information, based on the seventh algorithm, generate a block of the first blockchain; and, if the at least one first transaction information contains a hash value item of data, then the network node, according to the at least one first transaction information, Based on the eighth algorithm, a block of the second blockchain is generated.

其中,“所述网络节点根据所述至少一个第一交易信息,基于第八算法,生成第二区块链的区块”可以等同于“所述网络节点根据所述至少一个第一交易信息,生成第二区块链的区块”。具体地,所述第八算法,可以是用于确定哪个网络节点生成区块的算法,也可以是用于所述网络节点使用所述第八算法来生成区块。例如所述第八算法可以是所述网络节点自己生成所有的第二区块链区块。没有其他网络节点参与生成所述第二区块链的区块。Wherein, "the network node generates a block of the second blockchain based on the eighth algorithm according to the at least one first transaction information" may be equivalent to "the network node, according to the at least one first transaction information, Generate the blocks of the second blockchain". Specifically, the eighth algorithm may be an algorithm for determining which network node generates a block, or may be an algorithm for the network node to use the eighth algorithm to generate a block. For example, the eighth algorithm may be that the network node generates all the second blockchain blocks by itself. No other network nodes are involved in generating the blocks of the second blockchain.

同理,当网络节点没有和其他网络节点共同形成区块链,而只是网络节点自己独立生成所有区块,形成区块链的话,那么第一算法,第三算法,第五算法,可以就是:网络节点生成区块链所有区块。Similarly, when the network node does not form a blockchain with other network nodes, but only the network node independently generates all blocks to form a blockchain, then the first algorithm, the third algorithm, and the fifth algorithm can be: Network nodes generate all blocks in the blockchain.

总之,“所述网络节点根据所述至少一个第一交易信息,基于第五算法,生成第一区块链的区块”,可以等同于“所述网络节点根据所述至少一个第一交易信息,生成第一区块链的区块”;或者,“若所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,基于第三算法,生成第二区块链的区块”可等同于“若所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,生成第二区块链的区块”;或者“所述网络节点根据所述至少一个第一交易信息,基于第一算法,生成第一区块链的区块”可等同于“所述网络节点根据所述至少一个第一交易信息,生成第一区块链的区块”。In a word, "the network node generates a block of the first blockchain based on the fifth algorithm according to the at least one first transaction information", which can be equivalent to "the network node generates a block of the first blockchain according to the at least one first transaction information" , to generate a block of the first blockchain"; or, "If the at least one first transaction information contains the hash value item of the data, the network node will, according to the at least one first transaction information, based on the third Algorithm to generate the block of the second blockchain" can be equivalent to "if the at least one first transaction information contains the hash value item of the data, the network node generates the first transaction information according to the at least one first transaction information. two blocks of the blockchain"; or "the network node generates a block of the first blockchain according to the at least one first transaction information and based on the first algorithm" may be equivalent to "the network node generates a block of the first blockchain according to the Describe at least one first transaction information to generate a block of the first blockchain".

针对所述网络节点与其他网络节点,如果只是所述网络节点单独生成所有区块链的区块,其他网络节点不生成区块的话,那么例如所述第四算法也是网络节点生成所有区块链区块。如此类推。所述算法可以是用于决定谁生成区块。例如,如果默认就是所述网络节点生成,那么所述网络节点就可以直接生成区块,不需要每次判断一次算法。For the network node and other network nodes, if only the network node generates blocks of all blockchains alone, and other network nodes do not generate blocks, for example, the fourth algorithm is also the network node that generates all blockchains block. And so on. The algorithm may be used to decide who generates blocks. For example, if the network node generates the block by default, the network node can directly generate the block without needing to judge the algorithm every time.

在一种可选的实施例中,还包括:对于所述网络节点生成了关于包含第一数据的第一区块链且存储了第一数据的散列值的情况下,获取第一数据的第一散列值;从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。通过分别存储数据和数据的散列值的方式,即使数据被篡改了,能够实现对所存储数据的有效验证,提高了数据存储的有效性,也提高了数据的防篡改能力。In an optional embodiment, the method further includes: in the case that the network node generates a first blockchain including the first data and stores the hash value of the first data, obtaining the first data a first hash value; obtain the first data from the first blockchain, and calculate a second hash value of the first data; combine the first hash value with the second hash If the first hash value is the same as the second hash value, it is determined that the first data is trusted data; or, it is determined that the first data has not been tampered with; or, it is determined that The first hash value of the first data is a trusted hash value; or, if the first hash value is different from the second hash value, it is determined that the first data is untrusted data or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value. By storing the data and the hash value of the data separately, even if the data is tampered, effective verification of the stored data can be achieved, the effectiveness of data storage is improved, and the tamper-proof capability of the data is also improved.

在一种可选的实施例中,还包括:对于所述网络节点生成了关于包含第一数据的第一散列值的第二区块链且存储了第一数据的情况下,从所述第二区块链获取所述第一数据的第一散列值;获取存储的所述第一数据,并计算所述第一数据的第二散列值;将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。通过分别存储数据和数据的散列值的方式,即使数据被篡改了,能够实现对所存储数据的有效验证,提高了数据存储的有效性,也提高了数据的防篡改能力。In an optional embodiment, the method further includes: in the case that the network node generates a second blockchain about the first hash value including the first data and stores the first data, from the The second blockchain obtains the first hash value of the first data; obtains the stored first data, and calculates the second hash value of the first data; associates the first hash value with The second hash value is compared; if the first hash value is the same as the second hash value, it is determined that the first data is trusted data; or, it is determined that the first data is not tampered; or, determine that the first hash value of the first data is a trusted hash value; or, if the first hash value is different from the second hash value, determine that the first hash value is A piece of data is untrusted data; or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value. By storing the data and the hash value of the data separately, even if the data is tampered, effective verification of the stored data can be achieved, the effectiveness of data storage is improved, and the tamper-proof capability of the data is also improved.

在一种可选的实施例中,还包括:对于所述网络节点生成了关于包含第一数据的第一区块链且生成了关于包含第一数据的散列值的第二区块链的情况下,从所述第二区块链获取所述第一数据的第一散列值;从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。通过分别存储数据和数据的散列值的方式,即使数据被篡改了,能够实现对所存储数据的有效验证,提高了数据存储的有效性,也提高了数据的防篡改能力。In an optional embodiment, the method further includes: generating, for the network node, a first block chain containing the first data and a second block chain containing the hash value of the first data. In the case of obtaining the first hash value of the first data from the second blockchain; obtaining the first data from the first blockchain, and calculating the second hash value of the first data column value; compare the first hash value with the second hash value; if the first hash value is the same as the second hash value, determine that the first data is valid or, determining that the first data has not been tampered with; or, determining that the first hash value of the first data is a trusted hash value; or, if the first hash value is the same as the first hash value If the two hash values are different, it is determined that the first data is untrusted data; or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value. By storing the data and the hash value of the data separately, even if the data is tampered, effective verification of the stored data can be achieved, the effectiveness of data storage is improved, and the tamper-proof capability of the data is also improved.

在一种可选的实施例中,还包括:所述网络节点向中心节点发送所述数据信息或者区块链的区块。可选的,所述网络节点可以在接收到中心节点的数据信息或者区块的获取请求之后发送数据信息或区块链的区块。In an optional embodiment, the method further includes: the network node sends the data information or the block of the blockchain to the central node. Optionally, the network node may send the data information or the block of the blockchain after receiving the data information or the block acquisition request of the central node.

在一种可选的实施例中,所述网络节点根据至少一个第一交易信息,生成区块链的区块之后,还包括:所述网络节点向所述至少一个设备节点发送第一通知消息,所述第一通知消息用于通知设备节点已生成区块链的区块的消息。可选的,这样设备节点在接收到第一通知消息之后,对数据信息进行相应的处理,例如,删除。In an optional embodiment, after the network node generates the block of the blockchain according to the at least one first transaction information, the method further includes: the network node sends a first notification message to the at least one device node , the first notification message is used to notify the device node that a block of the blockchain has been generated. Optionally, after receiving the first notification message, the device node performs corresponding processing on the data information, for example, deletion.

在一种可选的实施例中,还包括:所述网络节点向设备节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。In an optional embodiment, the method further includes: the network node sends a first deletion message to the device node, where the first deletion message is used to instruct the device node to delete the data information or delete the block. Indication message.

在一种可选的实施例中,还包括:所述网络节点接收所述至少一个设备节点发送的第二删除消息,所述第二删除消息为所述至少一个设备节点用于请求删除所述数据信息或者删除区块。可选的,所述网络节点根据所述第二删除消息为所述设备节点确定可删除的数据信息或者可删除的区块,或者,所述网络节点可以向设备节点发送删除允许消息,以指示设备节点自身确定可删除的数据信息或可删除的区块。In an optional embodiment, the method further includes: receiving, by the network node, a second deletion message sent by the at least one device node, where the second deletion message is used by the at least one device node to request deletion of the data information or delete blocks. Optionally, the network node determines the data information or block that can be deleted for the device node according to the second delete message, or the network node can send a delete permission message to the device node to indicate The device node itself determines the data information that can be deleted or the block that can be deleted.

在一种可选的实施例中,还包括:所述网络节点从目标区块链中确定待删除区块,所述目标区块链为所述网络节点所存储的任意一个区块链。In an optional embodiment, the method further includes: the network node determines a block to be deleted from a target blockchain, where the target blockchain is any blockchain stored by the network node.

在一种可选的实施例中,还包括:所述网络节点将所述区块链的区块包含的多个交易信息发送至上一级网络节点。例如,在网络节点存储压力较大的情况下,可以将多个交易信息转移至上一级的网络节点进行存储,以减少该网络节点的存储压力。In an optional embodiment, the method further includes: the network node sends a plurality of transaction information contained in the block of the blockchain to the upper-level network node. For example, when the storage pressure of the network node is high, multiple transaction information can be transferred to the network node of the upper level for storage, so as to reduce the storage pressure of the network node.

在一种可选的实施例中,还包括:所述网络节点将所述目标区块链中的所述待删除区块进行删除。可选的,所述网络节点记录所述待删除区块的区块头内容,以便于在接收到关于所删除的区块的查询信息时,确定所删除的区块所存储过的节点。In an optional embodiment, the method further includes: the network node deletes the block to be deleted in the target blockchain. Optionally, the network node records the content of the block header of the block to be deleted, so as to determine the node where the deleted block is stored when receiving the query information about the deleted block.

在一种可选的实施例中,所述网络节点从目标区块链中确定待删除区块,包括:按照预设删除规则,从目标区块链中确定待删除区块;其中,所述预设删除规则为:所述网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。In an optional embodiment, the network node determining the block to be deleted from the target blockchain includes: determining the block to be deleted from the target blockchain according to a preset deletion rule; wherein, the The preset deletion rule is: the number of blocks stored in the target blockchain by the network node is greater than a preset threshold, or the block to be deleted is a block whose generation time duration exceeds the time threshold, or the block to be deleted The deleted block is the block whose block sequence number is less than the sequence number threshold.

第四方面,本申请实施例提供了一种数据处理方法,包括:In a fourth aspect, an embodiment of the present application provides a data processing method, including:

设备节点向网络节点发送一个或者多个数据信息,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址;所述数据信息用于所述网络节点生成第一交易信息。这样所述设备节点通过将数据信息发送至网络节点的方式,能够减少设备节点的存储压力。The device node sends one or more pieces of data information to the network node, where the data information includes at least one of the following: first data, a first hash value of the first data, an index value of the first data, the The time information of the first data, the identifier of the device node sending the data information, the address of the device node and the address of the network node; the data information is used by the network node to generate the first transaction information. In this way, the device node can reduce the storage pressure of the device node by sending the data information to the network node.

或者,设备节点根据一个或者多个数据信息,生成至少一个第二交易信息,并将所述至少一个第二交易信息发送至网络节点;所述第二交易信息包括以下至少一项对应的信息:数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。这样所述设备节点通过将交易信息发送至网络节点的方式,也能够减少设备节点的存储压力。Alternatively, the device node generates at least one second transaction information according to one or more pieces of data information, and sends the at least one second transaction information to the network node; the second transaction information includes at least one of the following information: A data item, an index value item of the data, a hash value item of the data, a time information item, a sender item of the data, and a receiver item of the data. In this way, the device node can also reduce the storage pressure of the device node by sending the transaction information to the network node.

在一种可选的实施例中,所述设备节点接收网络节点发送的区块链第一通知消息,所述第一通知消息用于通知所述网络节点已经根据所述数据信息生成区块链的区块的消息。In an optional embodiment, the device node receives a blockchain first notification message sent by a network node, where the first notification message is used to notify the network node that the blockchain has been generated according to the data information message of the block.

在一种可选的实施例中,所述设备节点接收网络节点发送的区块。In an optional embodiment, the device node receives the block sent by the network node.

在一种可选的实施例中,还包括:所述设备节点接收到所述网络节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。所述设备节点可以在接收到第一删除消息的情况下,对数据信息或者区块执行删除处理。In an optional embodiment, the method further includes: the device node receives a first deletion message sent by the network node, where the first deletion message is used to instruct the device node to delete the data information or delete Indication message for the block. The device node may perform deletion processing on the data information or the block in the case of receiving the first deletion message.

在一种可选的实施例中,还包括:所述设备节点向所述网络节点发送的第二删除消息,所述第二删除消息用于请求删除所述数据信息或者删除区块。例如,在存储压力较大的情况下,设备节点可以向网络节点发送第二删除消息。In an optional embodiment, the method further includes: a second deletion message sent by the device node to the network node, where the second deletion message is used to request deletion of the data information or deletion of a block. For example, in the case of high storage pressure, the device node may send a second delete message to the network node.

在一种可选的实施例中,还包括:所述设备节点删除所述数据信息。In an optional embodiment, the method further includes: the device node deletes the data information.

在一种可选的实施例中,所述设备节点删除数据信息具体是将生成时长超过第一时间阈值的数据信息进行删除,这样可以减少设备节点的存储压力。In an optional embodiment, the deletion of the data information by the device node specifically deletes the data information whose generation duration exceeds the first time threshold, which can reduce the storage pressure of the device node.

在一种可选的实施例中,In an optional embodiment,

第五方面,本申请实施例提供了一种中心节点,包括:In a fifth aspect, an embodiment of the present application provides a central node, including:

获取模块,用于从第一网络节点获取第一数据的第一散列值;an acquisition module for acquiring the first hash value of the first data from the first network node;

计算模块,用于从第二网络节点获取所述第一数据,并计算所述第一数据的第二散列值;a calculation module, configured to obtain the first data from the second network node, and calculate a second hash value of the first data;

比对模块,用于将所述第一散列值与所述第二散列值进行比对;a comparison module, configured to compare the first hash value with the second hash value;

确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值。a determining module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or, determine The first hash value of the first data is a trusted hash value.

本申请实施例第五方面提供的中心节点用于执行本申请第一方面提供的数据处理方法,具体的可参见本申请实施例第一方面的描述,在此不再赘述。The central node provided by the fifth aspect of the embodiment of the present application is configured to execute the data processing method provided by the first aspect of the present application. For details, reference may be made to the description of the first aspect of the embodiment of the present application, which will not be repeated here.

在一个可能的设计中,中心节点的结构中包括处理器和收发器,所述处理器用于执行本申请第一方面提供的数据处理方法。可选的,还可以包括存储器,所述存储器用于存储支持中心节点执行上述方法的应用程序代码,所述处理器被配置为用于执行所述存储器中存储的应用程序。In a possible design, the structure of the central node includes a processor and a transceiver, and the processor is configured to execute the data processing method provided by the first aspect of the present application. Optionally, it may further include a memory, where the memory is configured to store application program codes that support the central node to execute the above method, and the processor is configured to execute the application program stored in the memory.

第六方面,本申请实施例提供了一种网络节点,包括:In a sixth aspect, an embodiment of the present application provides a network node, including:

区块生成模块,用于根据至少一个第一交易信息,生成区块链的区块。The block generation module is configured to generate a block of the blockchain according to at least one first transaction information.

所述第一交易信息包括以下至少一项对应的信息:交易标识项、生成所述第一交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。The first transaction information includes information corresponding to at least one of the following items: a transaction identification item, a node identification item that generates the first transaction information, a data item, an index value item of the data, a hash value item of the data, and a time information item , the sender item of the data, and the receiver item of the data.

本申请实施例第六方面提供的网络节点用于执行本申请第二方面提供的数据处理方法,具体的可参见本申请实施例第二方面的描述,在此不再赘述。The network node provided by the sixth aspect of the embodiment of the present application is configured to execute the data processing method provided by the second aspect of the present application. For details, reference may be made to the description of the second aspect of the embodiment of the present application, which will not be repeated here.

第七方面,本申请实施例提供了另一种网络节点,包括:In a seventh aspect, an embodiment of the present application provides another network node, including:

接收模块,用于接收至少一个设备节点发送的一个或多个数据信息;a receiving module, configured to receive one or more data information sent by at least one device node;

生成模块,用于根据所述一个或多个数据信息,生成至少一个第一交易信息。所述第一交易信息包括以下至少一项对应的信息:交易标识项、生成所述第一交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。A generating module, configured to generate at least one first transaction information according to the one or more pieces of data information. The first transaction information includes information corresponding to at least one of the following items: a transaction identification item, a node identification item that generates the first transaction information, a data item, an index value item of the data, a hash value item of the data, and a time information item , the sender item of the data, and the receiver item of the data.

本申请实施例第七方面提供的网络节点用于执行本申请第三方面提供的数据处理方法,具体的可参见本申请实施例第三方面的描述,在此不再赘述。The network node provided by the seventh aspect of the embodiment of the present application is configured to execute the data processing method provided by the third aspect of the present application. For details, reference may be made to the description of the third aspect of the embodiment of the present application, which is not repeated here.

在一个可能的设计中,网络节点的结构中包括处理器和收发器,所述处理器用于执行本申请第二方面或第三方面提供的数据处理方法。可选的,还可以包括存储器,所述存储器用于存储支持网络节点执行上述方法的应用程序代码,所述处理器被配置为用于执行所述存储器中存储的应用程序。In a possible design, the structure of the network node includes a processor and a transceiver, and the processor is configured to execute the data processing method provided in the second aspect or the third aspect of the present application. Optionally, a memory may be further included, the memory is used for storing application program codes that support the network node to perform the above method, and the processor is configured to execute the application program stored in the memory.

第八方面,本申请实施例提供了一种设备节点,包括:In an eighth aspect, an embodiment of the present application provides a device node, including:

发送模块,用于向网络节点发送一个或者多个数据信息,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址;A sending module, configured to send one or more data information to a network node, the data information including at least one of the following: first data, a first hash value of the first data, and an index value of the first data , the time information of the first data, the identifier of the device node sending the data information, the address of the device node and the address of the network node;

所述数据信息用于所述网络节点生成第一交易信息;The data information is used by the network node to generate the first transaction information;

或者,or,

生成模块,用于根据一个或者多个数据信息,生成至少一个第二交易信息,并将所述至少一个第二交易信息发送至网络节点;a generating module, configured to generate at least one second transaction information according to one or more data information, and send the at least one second transaction information to the network node;

所述第二交易信息包括以下至少一项对应的信息:数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。The second transaction information includes information corresponding to at least one of the following items: data item, data index value item, data hash value item, time information item, data sender item and data receiver item.

本申请实施例第八方面提供的设备节点用于执行本申请第四方面提供的数据处理方法,具体的可参见本申请实施例第四方面的描述,在此不再赘述。The device node provided by the eighth aspect of the embodiment of the present application is used to execute the data processing method provided by the fourth aspect of the present application. For details, reference may be made to the description of the fourth aspect of the embodiment of the present application, which is not repeated here.

在一个可能的设计中,设备节点的结构中包括处理器和收发器,所述处理器用于执行本申请第四方面提供的数据处理方法。可选的,还可以包括存储器,所述存储器用于存储支持设备节点执行上述方法的应用程序代码,所述处理器被配置为用于执行所述存储器中存储的应用程序。In a possible design, the structure of the device node includes a processor and a transceiver, where the processor is configured to execute the data processing method provided by the fourth aspect of the present application. Optionally, a memory may be further included, where the memory is configured to store application program code that supports the device node to perform the above method, and the processor is configured to execute the application program stored in the memory.

第九方面,本申请实施例提供了一种计算机存储介质,用于储存为上述中心节点所用的计算机软件指令,其包含用于执行上述方面所设计的程序。In a ninth aspect, an embodiment of the present application provides a computer storage medium for storing computer software instructions used by the above-mentioned central node, which includes a program designed for executing the above-mentioned aspects.

第十方面,本申请实施例提供了一种计算机存储介质,用于储存为上述网络节点所用的计算机软件指令,其包含用于执行上述方面所设计的程序。In a tenth aspect, an embodiment of the present application provides a computer storage medium for storing computer software instructions used by the above-mentioned network node, which includes a program designed for executing the above-mentioned aspects.

第十一方面,本申请实施例提供了一种计算机存储介质,用于储存为上述设备节点所用的计算机软件指令,其包含用于执行上述方面所设计的程序。In an eleventh aspect, an embodiment of the present application provides a computer storage medium for storing computer software instructions used by the above-mentioned device node, which includes a program designed for executing the above-mentioned aspects.

本申请实施例中,中心节点、网络节点、设备节点、第一网络节点、第二网络节点的名字对设备本身不构成限定,在实际实现中,这些设备可以以其他名称出现。只要各个设备的功能和本申请类似,属于本申请权利要求及其等同技术的范围之内。In the embodiments of this application, the names of the central node, network node, device node, first network node, and second network node do not limit the devices themselves. In actual implementation, these devices may appear with other names. As long as the functions of the respective devices are similar to those of the present application, they fall within the scope of the claims of the present application and their equivalents.

在本申请实施例中,通过将设备节点中的一个或者多个第一数据发送至其他网络节点进行存储,能够缓解设备节点的存储压力,另外,在网络节点中能够分别存储数据和散列值,即使根据数据都被篡改的情况下,能够通过存储的散列值对数据进行验证,因此这样提高了数据的防篡改能力。In the embodiment of the present application, by sending one or more first data in the device node to other network nodes for storage, the storage pressure of the device node can be relieved, and in addition, the data and the hash value can be stored separately in the network node , even if the data has been tampered with, the data can be verified by the stored hash value, so the tamper-proof capability of the data is improved.

附图说明Description of drawings

图1为本申请实施例提供的一种可能的网络结构图;FIG. 1 is a possible network structure diagram provided by an embodiment of the present application;

图2为本申请实施例提供的另一种可能的网络结构图;FIG. 2 is another possible network structure diagram provided by an embodiment of the present application;

图3为本申请实施例提供的一种数据处理方法的流程示意图;3 is a schematic flowchart of a data processing method provided by an embodiment of the present application;

图4为本申请实施例提供的另一种数据处理方法的流程示意图;4 is a schematic flowchart of another data processing method provided by an embodiment of the present application;

图5为本申请实施例提供的另一种数据处理方法的流程示意图;5 is a schematic flowchart of another data processing method provided by an embodiment of the present application;

图6为本申请实施例提供的另一种数据处理方法的流程示意图;6 is a schematic flowchart of another data processing method provided by an embodiment of the present application;

图7为本申请实施例提供的另一种数据处理方法的流程示意图;FIG. 7 is a schematic flowchart of another data processing method provided by an embodiment of the present application;

图8为本申请实施例提供了一种中心节点的模块化示意图;FIG. 8 provides a modular schematic diagram of a central node according to an embodiment of the present application;

图9为本申请实施例提供了另一种中心节点的结构示意图;FIG. 9 provides a schematic structural diagram of another central node according to an embodiment of the present application;

图10为本申请实施例提供了一种网络节点的模块化示意图;FIG. 10 provides a modular schematic diagram of a network node according to an embodiment of the present application;

图11为本申请实施例提供了另一种网络节点的结构示意图;FIG. 11 provides a schematic structural diagram of another network node according to an embodiment of the present application;

图12为本申请实施例提供了一种设备节点的模块化示意图;FIG. 12 provides a modular schematic diagram of a device node according to an embodiment of the present application;

图13为本申请实施例提供了另一种设备节点的模块化示意图;FIG. 13 provides a modular schematic diagram of another device node according to an embodiment of the present application;

图14为本申请实施例提供了一种设备节点的结构示意图。FIG. 14 provides a schematic structural diagram of a device node according to an embodiment of the present application.

具体实施方式Detailed ways

下面结合附图,对本申请的实施例进行描述。The embodiments of the present application will be described below with reference to the accompanying drawings.

请参见图1,为本申请实施例提供了一种可能的网络架构图。图1所述的网络架构中包括第一网络节点、第二网络节点和设备节点。设备节点是采集数据或者生成数据的来源,第一网络节点可以用于存储设备节点发送的数据,第二网络节点可以用于存储由设备节点中的数据生成的散列值。这样在设备节点的存储能力有限的情况下,还可以通过其他网络节点进行存储,缓解了设备节点的存储压力。Referring to FIG. 1 , a possible network architecture diagram is provided for this embodiment of the present application. The network architecture shown in FIG. 1 includes a first network node, a second network node and a device node. The device node is a source for collecting data or generating data, the first network node may be used to store data sent by the device node, and the second network node may be used to store a hash value generated from the data in the device node. In this way, when the storage capacity of the device node is limited, other network nodes can be used for storage, which relieves the storage pressure of the device node.

进一步的,第一网络节点和第二网络节点均可以生成各自的区块链,例如,第一网络节点可以根据设备节点发送的数据的散列值生成第二区块链,第二网络节点可以根据设备节点发送的数据生成第一区块链。通过区块链来分别存储数据和散列值,即使由数据所生成的第一区块链的全部数据都被篡改的情况下,能够通过第二区块链的散列值对第一区块链中的数据进行验证,因此这样提高了数据的防篡改能力。Further, both the first network node and the second network node may generate their own blockchains. For example, the first network node may generate the second blockchain according to the hash value of the data sent by the device node, and the second network node may The first blockchain is generated according to the data sent by the device node. The data and the hash value are stored separately through the blockchain, and even if all the data of the first blockchain generated from the data is tampered with, the first block can be identified by the hash value of the second blockchain. The data in the chain is verified, so this improves the tamper resistance of the data.

进一步的,请参见图2,为本申请实施例提供了另一种可能的网络架构图。图2所述的网络架构中包括第一网络节点和设备节点。设备节点与图1所示的设备节点功能相同,而图2中所示的第一网络节点既可以存储设备节点发送的数据,还可以用于存储由设备节点中的数据生成的散列值。在图2所示的网络架构下依旧可以在设备节点的存储能力有限的情况下,通过第一网络节点存储数据和散列值的方式缓解设备节点的存储压力。Further, referring to FIG. 2 , another possible network architecture diagram is provided in this embodiment of the present application. The network architecture shown in FIG. 2 includes a first network node and a device node. The device node has the same function as the device node shown in FIG. 1 , and the first network node shown in FIG. 2 can not only store the data sent by the device node, but also store the hash value generated from the data in the device node. Under the network architecture shown in FIG. 2 , the storage pressure of the device node can still be relieved by storing the data and the hash value by the first network node when the storage capacity of the device node is limited.

进一步的,第一网络节点可以根据设备节点发送的数据生成第一区块链,并根据设备节点发送的数据的散列值生成第二区块链。实现了通过区块链来分别存储数据和散列值,即使由数据所生成的第一区块链的全部数据都被篡改的情况下,能够通过第二区块链的散列值对第一区块链中的数据进行验证,因此这样提高了数据的防篡改能力。Further, the first network node may generate the first blockchain according to the data sent by the device node, and generate the second blockchain according to the hash value of the data sent by the device node. It is realized that the data and the hash value are stored separately through the blockchain. Even if all the data of the first blockchain generated from the data are tampered with, the hash value of the second blockchain can be used for the first blockchain. The data in the blockchain is verified, so this improves the tamper resistance of the data.

本申请中所涉及的设备节点可以包括工业设备节点、各类工业传感器、控制单元等等;还可以包括可穿戴设备,家用电器,家居传感器,家居控制单元等;还可以包括用户设备,包含手机、智能终端、多媒体设备、流媒体设备等。本申请对设备节点的形式和类型不做任何限制。设备节点具备数据采集和/或数据发送的能力。The device nodes involved in this application may include industrial device nodes, various industrial sensors, control units, etc.; may also include wearable devices, household appliances, home sensors, home control units, etc.; may also include user equipment, including mobile phones , intelligent terminals, multimedia equipment, streaming media equipment, etc. This application does not make any limitation on the form and type of the device node. The device node has the capability of data collection and/or data transmission.

本申请中所涉及的网络节点为具备存储、通信功能的设备,例如,具备接收设备节点的数据或者数据散列值,以及接收来自其他网络节点的数据或者散列值的能力。网络节点可以是基站,网关(gateway),网络存储单元,云服务器,计算机设备等等。The network nodes involved in this application are devices with storage and communication functions, for example, capable of receiving data or data hash values of device nodes, and receiving data or hash values from other network nodes. A network node can be a base station, a gateway, a network storage unit, a cloud server, a computer device, and so on.

请参见图3,为本申请实施例提供了一种数据处理方法的流程示意图,如图3所示,本申请实施例中涉及第一网络节点、第二网络节点和、设备节点和中心节点,其中数据处理方法是由中心节点在执行的,具体的执行过程请参见以下详细介绍。Please refer to FIG. 3 , which provides a schematic flowchart of a data processing method according to an embodiment of the present application. As shown in FIG. 3 , the embodiment of the present application involves a first network node, a second network node, a device node, and a central node. The data processing method is executed by the central node. For the specific execution process, please refer to the following detailed introduction.

101,中心节点从第一网络节点获取第一数据的第一散列值。101. The central node acquires the first hash value of the first data from the first network node.

可选的,所述第一网络节点可以直接存储所述第一数据的第一散列值,或者,所述第一数据的第一散列值存储于所述第一网络节点中的第二区块链中,其中,第二区块链为由包含数据的散列值项的交易信息生成的区块组成的。Optionally, the first network node may directly store the first hash value of the first data, or the first hash value of the first data may be stored in a second hash value of the first network node. In the blockchain, the second blockchain is composed of blocks generated by transaction information including hash value items of data.

可选的,所述中心节点从第一网络节点获取所述第一数据的第一散列值关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。Optionally, the central node obtains first hash value association information of the first data from a first network node, and the association information includes at least one of the following: an index value of the first data, the first hash value of the first data Time information of a piece of data, an identifier of a device node that sends the first data, an address for sending the first data, and an address for receiving the first data.

102,所述中心节点从第二网络节点获取所述第一数据,并计算所述第一数据的第二散列值。102. The central node acquires the first data from the second network node, and calculates a second hash value of the first data.

可选的,所述第二网络节点可以直接存储所述第一数据,或者,所述第一数据存储于所述第二网络节点中的第一区块链中,其中,第一区块链为由包含数据项的交易信息生成的区块组成的。Optionally, the second network node may directly store the first data, or the first data may be stored in a first blockchain in the second network node, where the first blockchain Consists of blocks generated from transaction information containing data items.

所述中心节点从第二网络节点获取所述第一数据的关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。The central node acquires association information of the first data from the second network node, and the association information includes at least one of the following: an index value of the first data, time information of the first data, sending the The device node identification of the first data, the address for sending the first data, and the address for receiving the first data.

需要说明的是,在本申请的实施例中,将存储第一数据的区块链设定为第一区块链,存储第一区块链的网络节点设定为第二网络节点。将存储第一数据的第一散列值的区块链设定为第二区块链,存储第二区块链的网络节点设定为第一网络节点,但第一数据是否存储于第一区块链,以及第一数据的第一散列值是否存储于第二区块链,本申请实施例并不限定。接下来,基于以上设定,完成对本申请实施例的描述。It should be noted that, in the embodiments of the present application, the blockchain storing the first data is set as the first blockchain, and the network node storing the first blockchain is set as the second network node. The blockchain storing the first hash value of the first data is set as the second blockchain, and the network node storing the second blockchain is set as the first network node, but whether the first data is stored in the first The blockchain and whether the first hash value of the first data is stored in the second blockchain are not limited in the embodiments of the present application. Next, based on the above settings, the description of the embodiments of the present application is completed.

第一可选的方案中,第一数据的第一散列值并非存储于第一网络节点的第二区块链中,而是由第一网络节点直接存储的;而第一数据是存储于第二网络节点的第一区块链中。在这一方案中,中心节点向第一网络节点直接获取第一数据的第一散列值;中心节点通过第二网络节点的第一区块链来获取所述第一数据,并计算所述第一数据的第二散列值。接着所述中心节点执行步骤103将所述第一散列值与所述第二散列值进行比对,并得到如步骤104或者步骤105的比对结果。In the first optional solution, the first hash value of the first data is not stored in the second blockchain of the first network node, but is directly stored by the first network node; and the first data is stored in in the first blockchain of the second network node. In this solution, the central node directly obtains the first hash value of the first data from the first network node; the central node obtains the first data through the first blockchain of the second network node, and calculates the The second hash value of the first data. Next, the central node performs step 103 to compare the first hash value with the second hash value, and obtains the comparison result as in step 104 or step 105 .

第二可选的方案中,第一数据的第一散列值存储于第一网络节点的第二区块链中;而第一数据并非存储于第二网络节点的第一区块链中,而是由第二网络节点直接存储的。在这一方案中,中心节点通过第一网络节点的第一区块链来获取第一数据的第一散列值;中心节点向第二网络节点直接获取第一数据,并计算第一数据的第二散列值。接着所述中心节点执行步骤103将所述第一散列值与所述第二散列值进行比对,并得到如步骤104或者步骤105的比对结果。In the second optional solution, the first hash value of the first data is stored in the second blockchain of the first network node; and the first data is not stored in the first blockchain of the second network node, Instead, it is directly stored by the second network node. In this solution, the central node obtains the first hash value of the first data through the first blockchain of the first network node; the central node directly obtains the first data from the second network node, and calculates the hash value of the first data. The second hash value. Next, the central node performs step 103 to compare the first hash value with the second hash value, and obtains the comparison result as in step 104 or step 105 .

第三可选的方案中,第一数据的第一散列值存储于第一网络节点的第二区块链中;第一数据是存储于第二网络节点的第一区块链中。在这一方案中,中心节点通过第一网络节点的第二区块链来获取第一数据的第一散列值;中心节点通过第二网络节点的第一区块链来获取所述第一数据,并计算所述第一数据的第二散列值。接着所述中心节点执行步骤103将所述第一散列值与所述第二散列值进行比对,并得到如步骤104或者步骤105的比对结果。In a third optional solution, the first hash value of the first data is stored in the second blockchain of the first network node; the first data is stored in the first blockchain of the second network node. In this solution, the central node obtains the first hash value of the first data through the second blockchain of the first network node; the central node obtains the first hash value through the first blockchain of the second network node data, and calculate a second hash value of the first data. Next, the central node performs step 103 to compare the first hash value with the second hash value, and obtains the comparison result as in step 104 or step 105 .

103,所述中心节点将所述第一散列值与所述第二散列值进行比对。103. The central node compares the first hash value with the second hash value.

104,若所述第一散列值与所述第二散列值相同,则所述中心节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值。104. If the first hash value is the same as the second hash value, the central node determines that the first data is trusted data; or, determines that the first data has not been tampered with; or, It is determined that the first hash value of the first data is a trusted hash value.

106,若确定所述第一数据是可信数据,则所述中心节点确定第三区块链的第i个交易信息满足生成条件,生成第三区块链的第i个交易信息。106. If it is determined that the first data is trusted data, the central node determines that the i-th transaction information of the third blockchain meets the generation condition, and generates the i-th transaction information of the third blockchain.

具体的,所述中心节点可以设定所述第一数据是否为可行数据,设定为所述中心节点判断是否生成第三区块链的第i个交易信息的生成条件,这样在确定第一数据为可信数据之后,确定第三区块链的第i个交易信息满足生成条件,并生成第i个交易信息。Specifically, the central node can set whether the first data is feasible data, and set it as the generation condition for the central node to determine whether to generate the i-th transaction information of the third blockchain, so as to determine the first After the data is trusted data, it is determined that the i-th transaction information of the third blockchain meets the generation conditions, and the i-th transaction information is generated.

105,若所述第一散列值与所述第二散列值不相同,则所述中心节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。105. If the first hash value is different from the second hash value, the central node determines that the first data is untrusted data; or, determines that the first data has been tampered with; or , determining that the first hash value of the first data is an untrusted hash value.

107,若确定所述第一数据是不可信数据,则所述中心节点确定所述第三区块链的第i个交易信息不满足所述生成条件,不生成所述第三区块链的第i个交易信息。107. If it is determined that the first data is untrusted data, the central node determines that the i-th transaction information of the third blockchain does not meet the generation condition, and does not generate the transaction information of the third blockchain. i-th transaction information.

具体的,结合步骤106中所述中心节点对是否生成第三区块链的第i个交易信息的生成条件的设定,在确定所述第一数据是不可信数据之后,确定所述第三区块链的第i个交易信息不满足所述生成条件,不生成所述第三区块链的第i个交易信息。Specifically, in combination with the central node's setting of the conditions for generating the i-th transaction information of the third blockchain in step 106, after determining that the first data is untrusted data, determine the third If the i-th transaction information of the blockchain does not meet the generation condition, the i-th transaction information of the third blockchain is not generated.

进一步可选的,若确定所述第一数据是不可信数据,则所述中心节点确定所述第三区块链的第j个交易信息满足生成条件,生成所述第三区块链的第j个交易信息。Further optionally, if it is determined that the first data is untrusted data, the central node determines that the jth transaction information of the third blockchain meets the generation conditions, and generates the jth transaction information of the third blockchain. j transaction information.

针对步骤106和步骤107的方案,举例说明:For the solution of step 106 and step 107, an example is given:

步骤106,例如生成第三区块链第i个交易的条件是确定所述第一数据是可信数据,当第一数据是可信数据时,利用所述第一数据来处理某些事情,例如调取第一数据做大数据分析,做各种数据分析和提取,在此不做限制。Step 106, for example, the condition for generating the i-th transaction of the third blockchain is to determine that the first data is trusted data, and when the first data is trusted data, use the first data to process certain things, For example, fetching the first data for big data analysis, and doing various data analysis and extraction, is not limited here.

例如第一数据是PM2.5的测量值,提取一段时间内(例如1个星期)的第一数据,根据第一数据来计算多个第一数据来计算这段时间内的PM2.5浓度,从而获得这周的空气质量。For example, the first data is the measured value of PM2.5, extract the first data within a period of time (for example, one week), and calculate a plurality of first data according to the first data to calculate the PM2.5 concentration during this period, To get this week's air quality.

例如第一数据是工业设备的仪表测量数据值,提取一段时间内(例如1个星期)的第一数据,根据第一数据来获得超过门限1的测量数据值,通过数据的个数和对应时间,来判断仪表故障率。For example, the first data is the measurement data value of the instrument of the industrial equipment, extract the first data within a period of time (for example, one week), and obtain the measurement data value exceeding the threshold 1 according to the first data, through the number of data and the corresponding time , to judge the instrument failure rate.

例如第一数据是医院的病患病历,政府机构或者第三方机构(报销单位)或者外方医院,在第一数据是可信数据的情况下,调用第一数据。For example, the first data is a medical record of a hospital, a government agency or a third-party agency (reimbursement unit) or a foreign hospital, if the first data is trusted data, the first data is called.

例如第i个交易信息为:调用第一数据,交易信息具体包括以下至少一项:调用第一数据的用户标识,调用第一数据的时间,调用第一数据的权限,第一数据的索引值,第一数据的来源(发送方地址)等等。For example, the i-th transaction information is: calling the first data, and the transaction information specifically includes at least one of the following: the user ID of calling the first data, the time of calling the first data, the authority to call the first data, the index value of the first data , the source of the first data (sender address), and so on.

生成第i个交易的条件为:当第一数据的可信数据时,调用第一数据。调用第一数据可以用于进行大数据分析,可以查看第一数据等。The condition for generating the i-th transaction is: when the first data is trusted data, the first data is called. The calling of the first data can be used for big data analysis, the first data can be viewed, and the like.

同理,针对步骤107第j个交易信息,也是类似。例如第j交易可以为:调用第一数据。第j交易信息可以是中心节点发送数据错误消息给设备1。因此生成第j个交易信息的条件为:当第一数据的为可信数据时,调用第一数据;或者生成第j个交易信息的条件为:当第一数据为不可信数据时,中心节点发送数据错误消息给设备1;Similarly, for the jth transaction information in step 107, the same is true. For example, the jth transaction may be: calling the first data. The jth transaction information may be that the central node sends a data error message to the device 1 . Therefore, the condition for generating the jth transaction information is: when the first data is trusted data, the first data is called; or the condition for generating the jth transaction information is: when the first data is untrustworthy data, the central node Send a data error message to device 1;

当然形成区块链的交易信息,可以是各种各样的,本申请不限制第三区块链交易的内容和形式,第三区块链的交易信息,并不限定于是调用第一数据。以比特币为例,交易就是发送方A给接收方B一笔钱(例如10元)。但是在物联网里面,设备执行的动作就是一种交易信息,例如设备A给设备B发送了一个信息。或者调用设备A的数据就是一种交易信息。Of course, the transaction information forming the blockchain can be of various kinds. This application does not limit the content and form of the third blockchain transaction, and the transaction information of the third blockchain is not limited to calling the first data. Taking Bitcoin as an example, a transaction is a sum of money (for example, 10 yuan) from sender A to receiver B. But in the Internet of Things, the action performed by the device is a kind of transaction information, for example, device A sends a message to device B. Or the data of the calling device A is a kind of transaction information.

步骤106和步骤107是可选步骤。Steps 106 and 107 are optional steps.

又一需要说明的是,本申请实施例中对中心节点、第一网络节点、第二网络节点在是否为不同的具备通信或者存储功能的设备不做限定。接下来对中心节点、第一网络节点和第二网络节点的可实现方式进行跟描述。It should be noted that, in the embodiments of the present application, it is not limited whether the central node, the first network node, and the second network node are different devices with communication or storage functions. Next, the implementation manner of the central node, the first network node and the second network node will be described.

可选的方案A中,中心节点、第一网络节点和第二网络节点为物理上分离的具备通信或者存储功能的设备,例如,第一网络节点为基站、第二网络节点为存储设备、中心节点为第三方设备。其中,第一数据可以是由设备节点发送至第二网络节点存储的数据;第一数据的第一散列值可以是由设备节点发送至第一网络节点的数据的散列值,或者,第一数据的第一散列值是第一网络节点根据设备节点发送的第一数据所生成的。In optional solution A, the central node, the first network node and the second network node are physically separated devices with communication or storage functions, for example, the first network node is a base station, the second network node is a storage device, and the center Nodes are third-party devices. The first data may be data sent by the device node to the second network node for storage; the first hash value of the first data may be the hash value of the data sent by the device node to the first network node, or the The first hash value of a piece of data is generated by the first network node according to the first data sent by the device node.

基于可选的方案A,进一步可选的,如图1所示的系统中包括多个设备节点、多个第一网络节点、多个第二网络节点的情况下。其中,第二区块链是所述多个第一网络节点,基于算法(例如共识算法)生成的,在所述中心节点从第一网络节点的第二区块链中获取第一数据的第一散列值之前,可以从多个第一网络节点中选择一个第一网络节点确定为目标第一网络节点。一种可选的方案中,所述中心节点可以随意选择一个第一网络节点确定为目标第一网络节点。或者,另一种可选的方案中,所述中心节点从至少一个第一网络节点中选择一个满足第一合法条件的第一网络节点为目标第一网络节点。其中,所述第一合法条件为:与所述目标第一网络节点的第二区块链的第一数据的第一散列值相同的节点数量超过第一阈值。例如,假设第一网络节点的数量为10个,第一阈值为5,中心节点在存储有所述第一数据的区块中获取所述第一数据的第一散列值,若多个第一网络节点中存在3种数值的第一数据的第一散列值,则分别统计各个数值的第一数据的第一散列值的数量,若存在同一数值的第一散列值的数量超过5,则从该数值的第一散列值所在的第一网络节点中选择一个确定为目标第一网络节点。Based on the optional solution A, it is further optional that the system as shown in FIG. 1 includes multiple device nodes, multiple first network nodes, and multiple second network nodes. Wherein, the second blockchain is generated by the plurality of first network nodes based on an algorithm (such as a consensus algorithm), and the central node obtains the first data from the second blockchain of the first network node. Before a hash value, a first network node may be selected from a plurality of first network nodes and determined as the target first network node. In an optional solution, the central node may randomly select a first network node and determine it as the target first network node. Or, in another optional solution, the central node selects a first network node that satisfies the first legal condition from at least one first network node as the target first network node. The first legal condition is that the number of nodes that are the same as the first hash value of the first data of the second blockchain of the target first network node exceeds a first threshold. For example, assuming that the number of first network nodes is 10, the first threshold is 5, and the central node obtains the first hash value of the first data in the block storing the first data. There are three first hash values of the first data in a network node, the number of the first hash values of the first data of each value is counted separately, if the number of the first hash values of the same value exceeds 5, select one of the first network nodes where the first hash value of the numerical value is located and determine it as the target first network node.

在图1所示的系统中,进一步可选的,第一区块链是所述多个第二网络节点,基于算法生成的,在所述中心节点从第二网络节点的第一区块链中获取第一数据之前,可以从多个第二网络节点中选择一个第二网络节点确定为目标第二网络节点。一种可选的方案中,所述中心节点可以随意选择一个第二网络节点确定为目标第二网络节点。或者,另一种可选的方案中,所述中心节点从至少一个第二网络节点中选择一个满足第二合法条件的第二网络节点为目标第二网络节点。其中,所述第二合法条件为:与所述目标第二网络节点的第一区块链的第一数据相同的节点数量超过第二阈值。例如,假设第二网络节点的数量为10个,第二阈值为5,中心节点在存储有所述第一数据的区块中获取所述第一数据,若多个第二网络节点中存在3种数值的第一数据,则分别统计各个数值的第一数据的数量,若存在同一数值的第一数据的数量超过5,则从该数值的第一数据所在的第二网络节点中选择一个确定为目标第二网络节点。In the system shown in FIG. 1 , further optionally, the first blockchain is generated by the plurality of second network nodes based on an algorithm, and the central node is generated from the first blockchain of the second network node at the central node. Before acquiring the first data in the process, a second network node may be selected from a plurality of second network nodes and determined as the target second network node. In an optional solution, the central node may randomly select a second network node and determine it as the target second network node. Or, in another optional solution, the central node selects a second network node that satisfies the second legal condition from at least one second network node as the target second network node. Wherein, the second legal condition is: the number of nodes identical to the first data of the first blockchain of the target second network node exceeds a second threshold. For example, assuming that the number of second network nodes is 10, the second threshold is 5, and the central node obtains the first data in the block storing the first data, if there are 3 second network nodes in the plurality of second network nodes If the number of first data of the same value exceeds 5, select one of the second network nodes where the first data of the value is located to determine the number of first data of each value. is the target second network node.

可选的方案B中,第一网络节点和第二网络节点为物理上分离的具备通信或存储功能的设备,中心节点为第一网络节点或者第二网络节点中的任一个。其中,第一数据可以是由设备节点发送至第二网络节点存储的数据;第一数据的第一散列值可以是由设备节点发送至第一网络节点的数据的散列值,或者,第一数据的第一散列值是第一网络节点根据设备节点发送的第一数据所生成的。In optional solution B, the first network node and the second network node are physically separated devices with communication or storage functions, and the central node is either the first network node or the second network node. The first data may be data sent by the device node to the second network node for storage; the first hash value of the first data may be the hash value of the data sent by the device node to the first network node, or the The first hash value of a piece of data is generated by the first network node according to the first data sent by the device node.

可选的,参考图1所示的系统架构以第一网络节点为基站、第二网络节点为存储设备、中心节点为第一网络节点进行说明。由于中心节点为第一网络节点,因此,第一网络节点可以从多个第二网络节点中选择一个确定为目标第二网络节点,具体的选择方法可以参见可选的方案A中的具体介绍,在此不再赘述。由于第一网络节点和第二网络节点的区别在存储有不同数据的区块链,如,第二网络节点存储有第一数据的第一区块链,第一网络节点存储有第一数据的散列值的第二区块链,因此,中心节点为第二网络节点的方案可以参考可选的方案B中心节点为第一网络节点的描述,在此不再赘述。Optionally, with reference to the system architecture shown in FIG. 1 , the first network node is the base station, the second network node is the storage device, and the central node is the first network node. Since the central node is the first network node, the first network node may select one of multiple second network nodes and determine it as the target second network node. For the specific selection method, please refer to the specific introduction in the optional solution A. It is not repeated here. Because the difference between the first network node and the second network node is in the blockchains that store different data, for example, the second network node stores the first blockchain with the first data, the first network node stores the first data The second blockchain of the hash value, therefore, for the scheme in which the central node is the second network node, reference may be made to the description of the optional scheme B that the central node is the first network node, which will not be repeated here.

可选的方案C中,第一网络节点和第二网络节点为同一个具备通信或存储功能的设备,中心节点为第三方设备。参见图2,在图2所示的系统架构中,第一数据和第一数据的第一散列值均存储在第一网络节点中,第一网络节点可以通过接收设备节点发送的第一数据进行存储或生成第一区块链的区块,以及在存储阶段所述第一网络节点根据接收到的第一数据,计算第一数据的第一散列值并进行存储或生成第二区块链的区块。In the optional solution C, the first network node and the second network node are the same device with a communication or storage function, and the central node is a third-party device. Referring to FIG. 2, in the system architecture shown in FIG. 2, both the first data and the first hash value of the first data are stored in the first network node, and the first network node can receive the first data sent by the device node by Store or generate blocks of the first blockchain, and in the storage phase, the first network node calculates the first hash value of the first data according to the received first data and stores or generates the second block block of the chain.

基于可选的方案C,进一步可选的,第一区块链是接收到所述第一数据的第一网络节点生成的,第二区块链是多个第一网络节点基于算法(例如共识算法)并根据第一数据的第一散列值生成的。或者,第一区块链是多个第一网络节点基于算法(例如共识算法)并根据第一数据生成的;第二区块链是接收到所述第一数据的第一网络节点先计算获得第一散列值进而生成的。Based on the optional solution C, further optional, the first blockchain is generated by the first network node that receives the first data, and the second blockchain is generated by multiple first network nodes based on algorithms (such as consensus algorithm) and generated according to the first hash value of the first data. Alternatively, the first blockchain is generated by a plurality of first network nodes based on an algorithm (for example, a consensus algorithm) and according to the first data; the second blockchain is obtained by first calculating the first network node that receives the first data The first hash value is then generated.

一种可选的方案中,在第一区块链是接收到所述第一数据的第一网络节点生成的,且第二区块链是多个第一网络节点基于算法(例如共识算法)并根据第一数据的第一散列值生成的情况下,所述中心节点执行步骤101时,可以先从多个第一网络节点中确定一个目标第一网络节点,再从目标第一网络节点中获取第二区块链中的第一数据的第一散列值;所述中心节点执行步骤102可以直接从第一数据所在的第一网络节点中获取。In an optional solution, the first blockchain is generated by the first network node that receives the first data, and the second blockchain is generated by multiple first network nodes based on an algorithm (such as a consensus algorithm) In the case of generating according to the first hash value of the first data, when the central node executes step 101, it can first determine a target first network node from a plurality of first network nodes, and then select a target first network node from the target first network node. Obtain the first hash value of the first data in the second blockchain; the central node may directly obtain the first data from the first network node where the first data is located by performing step 102 .

另一种可选的方案中,在第一区块链是多个第一网络节点基于算法(例如共识算法)并根据第一数据生成的;第二区块链是接收到所述第一数据的第一网络节点先计算获得第一散列值进而生成的,中心节点执行步骤101时,可以从接收到所述第一数据并计算获得第一散列值的第一网络节点所生成的第二区块链中获取,对于中心节点执行步骤102时,可以先从多个第一网络节点中确定一个目标第一网络节点,再从目标第一网络节点中获取第一区块链中的第一数据。In another optional solution, the first blockchain is generated by multiple first network nodes based on an algorithm (such as a consensus algorithm) and according to the first data; the second blockchain receives the first data The first network node of the first network node first calculates and obtains the first hash value and then generates it. When the central node performs step 101, it can obtain the first hash value from the first network node that receives the first data and calculates and obtains the first hash value. The second block chain is obtained. When step 102 is performed for the central node, a target first network node may be determined from a plurality of first network nodes, and then the first block chain in the first block chain may be obtained from the target first network node. a data.

其中,对于从多个第一网络节点中确定目标第一网络节点的方案可以参考可选的方案A中的具体介绍,在此不再赘述。Wherein, for the solution of determining the target first network node from the multiple first network nodes, reference may be made to the specific introduction in the optional solution A, which will not be repeated here.

可选的方案D中,中心节点、第一网络节点和第二网络节点为同一个具备通信或存储功能的设备。具体的中心节点在执行步骤101和步骤102的具体实现方式可以参照可选的方案C中具体介绍,在此不再赘述。In the optional solution D, the central node, the first network node and the second network node are the same device with a communication or storage function. The specific implementation manner of the specific central node performing step 101 and step 102 can be specifically introduced with reference to the optional solution C, which is not repeated here.

在本申请实施例中,中心节点获取第一网络节点的第一数据的第一散列值,并获取第二网络节点的第一数据,并计算第一数据的第二散列值,将第一散列值和散列值进行比对,进而确定第一数据是否为可信数据。这种方案能够实现了对所存储数据的有效验证,进而提高了数据存储的有效性。另外在分别生成关于第一数据的区块链和关于第一数据的第一散列值的区块链的场景中,即使根据数据所生成的第一区块链的数据都被篡改的情况下,能够通过第二区块链的散列值对第一区块链中的数据进行验证,因此这样提高了数据的防篡改能力。In this embodiment of the present application, the central node obtains the first hash value of the first data of the first network node, obtains the first data of the second network node, and calculates the second hash value of the first data, A hash value is compared with the hash value, so as to determine whether the first data is authentic data. This solution can realize effective verification of the stored data, thereby improving the effectiveness of data storage. In addition, in the scenario of separately generating a blockchain related to the first data and a blockchain related to the first hash value of the first data, even if the data of the first blockchain generated from the data are all tampered with , the data in the first blockchain can be verified through the hash value of the second blockchain, thus improving the tamper-proof capability of the data.

请参见图4,为本申请实施例提供了一种数据处理方法的流程示意图,如图4所示,本申请实施例中涉及第一网络节点、其他第一网络节点、第二网络节点、其他第二网络节点和设备节点。其中,第一网络节点和第二网络节点为不同的通信设备,可以参考图1所示的网络架构,所述数据处理方法是由以上节点共同完成的,其中,所述设备节点在执行步骤201至步骤210的过程中,所述设备节点为与所述第二网络节点建立通信连接的多个设备节点中的任意一个,进一步的,所述设备节点可以向建立通信连接的第一网络节点执行步骤211至步骤216。具体的执行过程请参见以下详细介绍。Please refer to FIG. 4 , which provides a schematic flowchart of a data processing method according to an embodiment of the present application. As shown in FIG. 4 , an embodiment of the present application involves a first network node, other first network nodes, a second network node, and other The second network node and the device node. Wherein, the first network node and the second network node are different communication devices, and reference may be made to the network architecture shown in FIG. 1 , and the data processing method is jointly completed by the above nodes, wherein the device node executes step 201 In the process to step 210, the device node is any one of a plurality of device nodes that establish a communication connection with the second network node, and further, the device node may execute the first network node that establishes a communication connection. Steps 211 to 216. For the specific execution process, please refer to the following detailed introduction.

201,设备节点向第二网络节点发送一个或者多个数据信息。201. The device node sends one or more pieces of data information to a second network node.

其中,在本申请实施例的步骤201中,所述数据信息包括第一数据,还可以包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址。可选的,所述第一数据的时间信息可以是所述第一数据的发送时间或所述第一数据的产生时间,本申请实施例对此不做限定。Wherein, in step 201 of this embodiment of the present application, the data information includes first data, and may also include at least one of the following: an index value of the first data, time information of the first data, sending the The identification of the device node of the data information, the address of the device node and the address of the network node. Optionally, the time information of the first data may be the sending time of the first data or the generation time of the first data, which is not limited in this embodiment of the present application.

需要说明的是,步骤201设备节点将第一数据发送给了第二网络节点;步骤211,设备节点将第一数据的散列值发送给了第一网络节点。步骤201和步骤211执行次序不分先后。It should be noted that, in step 201, the device node sends the first data to the second network node; in step 211, the device node sends the hash value of the first data to the first network node. Steps 201 and 211 are executed in no particular order.

举例来说,可以参见表1,表1为一种可能的数据信息。For example, please refer to Table 1, which is a possible data information.

表1Table 1

Figure GDA0003268638430000151
Figure GDA0003268638430000151

相应的,第二网络节点接收所述设备节点发送的一个或者多个数据信息。Correspondingly, the second network node receives one or more pieces of data information sent by the device node.

202,所述第二网络节点根据所述一个或者多个数据信息生成至少一个第一交易信息。202. The second network node generates at least one first transaction information according to the one or more pieces of data information.

其中,若所述数据信息为一个,则所述第二网络节点可以生成一个第一交易信息。若所述数据信息为多个,则所述第二网络节点可以生成一个第一交易信息,或者生成不大于所述数据信息数量的多个第一交易信息。可选的,所述第一交易信息包括以下至少一项对应的信息:交易标识、数据项、数据的散列值、生成所述第一交易信息的节点标识项、数据的索引值项、时间信息项、数据的发送方项和数据的接收方项。其中时间信息项可以是指数据的发送时间或者交易的生成时间,本申请实施例对此不做限定。Wherein, if there is one piece of data information, the second network node may generate one piece of first transaction information. If there are multiple pieces of data information, the second network node may generate one piece of first transaction information, or generate multiple pieces of first transaction information not greater than the number of data information. Optionally, the first transaction information includes information corresponding to at least one of the following items: transaction identifier, data item, data hash value, node identifier item that generates the first transaction information, data index value item, time Information items, sender items of data, and receiver items of data. The time information item may refer to the sending time of the data or the generating time of the transaction, which is not limited in this embodiment of the present application.

适用于本申请所有实施例,无论是所述第一交易信息还是其他交易信息:假设在第一交易信息是表示第一数据的交易信息的情况下,其中,数据项对应的信息为第一数据,数据的散列值项对应的信息为第一数据的散列值、数据的索引值项对应的信息为数据的索引值,数据发送项对应的信息为数据的发送方地址,数据的接收方项对应的信息为数据的接收方地址,设备节点的标识项对应的信息为设备节点的标识,生成所述第一交易信息的节点标识项对应的信息为网络节点标识。Applicable to all the embodiments of this application, whether it is the first transaction information or other transaction information: assuming that the first transaction information is transaction information representing the first data, wherein the information corresponding to the data item is the first data , the information corresponding to the hash value item of the data is the hash value of the first data, the information corresponding to the index value item of the data is the index value of the data, the information corresponding to the data sending item is the sender address of the data, the receiver of the data The information corresponding to the item is the recipient address of the data, the information corresponding to the identification item of the device node is the identification of the device node, and the information corresponding to the identification item of the node generating the first transaction information is the identification of the network node.

进一步的,举例来说,对于所述第二网络节点根据多个数据信息生成一个第一交易信息的情况,所述第二网络节点是通过将多个数据信息进行打包生成一个数据包,进而对一个数据包生成一个第一交易信息。可选的,本申请实施例对由多个数据信息生成少于数据信息的数量的第一交易信息的数量不做限定。由于本申请实施例会涉及到其他交易信息,这里由第二网络节点生成的不论是一个还是多个第一交易信息都用A1表示,以加以区分。Further, for example, in the case where the second network node generates a first transaction information according to a plurality of data information, the second network node generates a data packet by packaging the plurality of data information, and further One data packet generates a first transaction message. Optionally, the embodiment of the present application does not limit the number of first transaction information generated from multiple pieces of data information, which is less than the number of data information. Since other transaction information may be involved in this embodiment of the present application, here, whether one or more first transaction information generated by the second network node is represented by A1 to distinguish it.

以表1为例,所述第二网络节点可以生成三个交易信息,如表2所示。Taking Table 1 as an example, the second network node may generate three transaction information, as shown in Table 2.

表2Table 2

Figure GDA0003268638430000161
Figure GDA0003268638430000161

进一步需要说明的是,对于交易信息中包含散列值项的情况请参见表2A。It should be further noted that, please refer to Table 2A for the case where the hash value item is included in the transaction information.

表2ATable 2A

Figure GDA0003268638430000162
Figure GDA0003268638430000162

进一步需要说明的是,对于表2还可以以表2B的形式标识。It should be further noted that, Table 2 may also be identified in the form of Table 2B.

表2BTable 2B

Figure GDA0003268638430000171
Figure GDA0003268638430000171

由于在所述第一交易信息中,数据项指第一数据,数据的索引值项指第一数据的索引值,数据发送项指数据的发送方地址,数据的接收方项指数据的接收方地址,设备节点的标识项指设备节点的标识,或者网络节点标识项指网络节点标识。以此类推,使用本申请所有实施例。表3,表4表5表6或者表7都可以类似地有对应的表3B,表4B表5B表6B或者表7B,不一一赘述。总之本申请中涉及的第一交易信息,第二交易信息等交易信息,上述等同关系都可以适用。In the first transaction information, the data item refers to the first data, the index value item of the data refers to the index value of the first data, the data sending item refers to the sender address of the data, and the data receiver item refers to the receiver of the data. The address, the identification item of the device node refers to the identification of the device node, or the identification item of the network node refers to the identification of the network node. By analogy, all the examples of this application are used. Table 3, Table 4, Table 5, Table 6 or Table 7 may have corresponding Table 3B, Table 4B, Table 5B, Table 6B or Table 7B similarly, and they will not be repeated. In a word, the first transaction information, the second transaction information and other transaction information involved in this application, the above-mentioned equivalent relationship can all be applied.

或者,所述第二网络节点可以生成两个交易信息,如表3所示。Alternatively, the second network node may generate two transaction information, as shown in Table 3.

表3table 3

Figure GDA0003268638430000172
Figure GDA0003268638430000172

表3中举例,交易1的数据项中的数据1就是第一数据,数据索引值项中100为数据1的索引值项。以此类推,不一一赘述。For example in Table 3, data 1 in the data item of transaction 1 is the first data, and 100 in the data index value item is the index value item of data 1. And so on, without repeating them one by one.

或者,所述第二网络节点可以生成两个交易信息,如表4所示。Alternatively, the second network node may generate two transaction information, as shown in Table 4.

表4Table 4

Figure GDA0003268638430000173
Figure GDA0003268638430000173

203、所述第二网络节点将生成的所述至少一个第一交易信息发送至其他第二网络节点。203. The second network node sends the generated at least one first transaction information to other second network nodes.

其中,本申请实施例所涉及的第二网络节点为多个第二网络节点中的任意一个,而其他第二网络节点是多个第二网络节点中除了这一个第二网络节点之外的其他第二网络节点。The second network node involved in the embodiment of the present application is any one of multiple second network nodes, and the other second network nodes are other than the one second network node among the multiple second network nodes the second network node.

相应的,其他第二网络节点中的任一第二网络节点接收所述至少一个第一交易信息A1。Correspondingly, any one of the other second network nodes receives the at least one first transaction information A1.

可选的,所述第二网络节点可以执行步骤204,根据接收到的所述至少一个第一交易信息生成第一区块链中的区块。该步骤中的第一区块链用L1表示。举例来说,如表5所示,给出了一种可选的由所述至少一个第一交易信息生成的区块,而表5所示的第一交易信息是由一个数据信息生成。若第一交易信息是由多个第一交易信息生成的情况,可以参见表6所示。Optionally, the second network node may perform step 204 to generate a block in the first blockchain according to the received at least one first transaction information. The first blockchain in this step is denoted by L1. For example, as shown in Table 5, an optional block generated by the at least one first transaction information is given, and the first transaction information shown in Table 5 is generated by a piece of data information. If the first transaction information is generated by a plurality of first transaction information, please refer to Table 6.

表5table 5

Figure GDA0003268638430000181
Figure GDA0003268638430000181

表6Table 6

Figure GDA0003268638430000182
Figure GDA0003268638430000182

205,所述其他第二网络节点向所述第二网络节点发送的至少一个第二交易信息。205. At least one second transaction information sent by the other second network node to the second network node.

其中,本申请实施例中,其他第二网络节点发送的第二交易信息用A2表示,需要说明的是,这里的第二交易信息A2和第一交易信息A1均包含有数据项,进而能够实现生成由数据项生成的交易信息生成第一区块链中的区块。举例说明,具体地,第二网络节点例如是网络节点A,基于它收到的设备节点A发送的数据信息,数据信息中包含一个第一数据,所述第一数据例如是数据A。网络节点A基于数据A,根据步骤303中生成第一交易的方式,生成了第一交易信息A1。其他第二网络节点例如是网络节点B基于它收到的设备节点B发送的数据信息,数据信息中包含一个第一数据,所述第一数据例如是数据B。网络节点B基于数据B,根据上述步骤303中生成第一交易的方式,生成了第二交易信息A2。Among them, in the embodiment of the present application, the second transaction information sent by other second network nodes is represented by A2. It should be noted that the second transaction information A2 and the first transaction information A1 here both contain data items, which can further realize Generating transaction information generated by the data item generates a block in the first blockchain. For example, specifically, the second network node is, for example, the network node A. Based on the data information sent by the device node A, the data information includes a piece of first data, and the first data is data A, for example. Based on the data A, the network node A generates the first transaction information A1 according to the method of generating the first transaction in step 303 . The other second network node is, for example, the network node B based on the data information sent by the device node B received by the network node B, and the data information includes a piece of first data, and the first data is data B, for example. Based on the data B, the network node B generates the second transaction information A2 according to the method of generating the first transaction in the above step 303 .

可选的,第二交易信息的生成方式与本申请实施例中第一交易信息的生成方式相同,具体可以参考步骤201至步骤202中的详细描述,在此不再赘述。Optionally, the generation method of the second transaction information is the same as the generation method of the first transaction information in the embodiment of the present application. For details, reference may be made to the detailed descriptions in steps 201 to 202 , which will not be repeated here.

相应的,所述第二网络节点接收其他第二网络节点发送的至少一个第二交易信息。Correspondingly, the second network node receives at least one second transaction information sent by other second network nodes.

206、所述第二网络节点根据第一交易信息和/或所述第二交易信息生成第一区块链中的区块。206. The second network node generates a block in the first blockchain according to the first transaction information and/or the second transaction information.

可选地,第二网络节点将生成的第一区块链区块广播给其他网络节点。Optionally, the second network node broadcasts the generated first blockchain block to other network nodes.

在本实施例中,是以第二网络节点来生成第一区块链区块为例。实际上,可以是其他网络节点(例如网络节点B)根据第一交易信息B1和第二交易信息B2生成第一区块链的区块。同理,其他第二网络节点(例如网络节点B)将生成的第一区块链区块广播给其他第二网络节点(除了网络节点B以外的其他网络节点,第二网络节点)。例如一种情况下是第二网络节点生成区块,一种情况下是其他网络节点生成区块。第二网络节点和其他网络节点可根据某个算法来确定谁生成第i个区块(i为大于等于1的自然数)。总之,根据上述步骤,第而网络节点与其他网络节点形成了第一区块链。In this embodiment, the generation of the first blockchain block by the second network node is taken as an example. In fact, other network nodes (eg, network node B) may generate blocks of the first blockchain according to the first transaction information B1 and the second transaction information B2. Similarly, other second network nodes (eg, network node B) broadcast the generated first blockchain block to other second network nodes (other network nodes other than network node B, second network nodes). For example, in one case, the second network node generates blocks, and in another case, other network nodes generate blocks. The second network node and other network nodes may determine who generates the ith block (i is a natural number greater than or equal to 1) according to a certain algorithm. In conclusion, according to the above steps, the first network node and other network nodes form the first blockchain.

其中,步骤206的所述第一区块链和步骤204中的第一区块链都是由包含数据项的交易信息所生成的区块组成的,但两个步骤的第一区块链所根据的交易信息不同,因此通过第一区块链L1和第一区块链L2加以区分。Wherein, the first block chain in step 206 and the first block chain in step 204 are both composed of blocks generated by transaction information including data items, but the first block chain in the two steps is composed of blocks. According to different transaction information, they are distinguished by the first blockchain L1 and the first blockchain L2.

进一步的,在生成第一区块链L2的区块的过程中,所述第二网络节点和其他第二网络节点,需要基于预设的机制或者算法(例如共识算法),来确定由哪个网络节点生成第一区块链L2中的区块。以共识算法举例,其中,预设的共识算法是为了计算出多个第二网络节点中哪一个第二网络节点具有在第一区块链L2中写入区块的算法,若其中一个目标第二网络节点获得在第一区块链L2中写入区块的权利,则目标第二网络节点将这一区块向多个第二网络节点中除目标第二网络节点之外的节点发送写入的区块,以使在各个第二网络接收到这一区块之后,将该区块保存在各自的第一区块链L2中。共识算法可以是但不仅限于,例如是实用拜占庭容错(PBFT)共识算法,Paxos/Raft算法,工作量证明Proof-of-Work(PoW),股权持有证明Proof-of-Stake(PoS)。关于预设的机制或者算法,上述内容适用于本申请所有实施例。Further, in the process of generating the blocks of the first blockchain L2, the second network node and other second network nodes need to determine which network to use based on a preset mechanism or algorithm (for example, a consensus algorithm). Nodes generate blocks in the first blockchain L2. Taking the consensus algorithm as an example, the preset consensus algorithm is to calculate which second network node among the multiple second network nodes has the algorithm for writing blocks in the first blockchain L2. The second network node obtains the right to write a block in the first blockchain L2, then the target second network node sends the block to the nodes other than the target second network node among the plurality of second network nodes. The incoming block, so that after each second network receives this block, the block is stored in the respective first blockchain L2. The consensus algorithm can be, but is not limited to, for example, Practical Byzantine Fault Tolerance (PBFT) consensus algorithm, Paxos/Raft algorithm, Proof-of-Work (PoW), Proof-of-Stake (PoS). Regarding the preset mechanism or algorithm, the above content is applicable to all embodiments of the present application.

本申请中算法还可以是机制,算法可以是共识算法或者其他算法,本申请不做限定。本申请多以共识算法举例说明申请内容。另外本发明中,所述预设的机制或者算法可以共识机制或者共识算法,用于决定哪个网络节点有生成区块的权利,所述预设的机制或者算法还可以是用于网络节点如何生成区块的算法。总之作为机制或者算法的具体定义和用途,本发明不做过多限制。上述适用于全文。The algorithm in this application may also be a mechanism, and the algorithm may be a consensus algorithm or other algorithms, which are not limited in this application. In this application, consensus algorithms are used as examples to illustrate the application content. In addition, in the present invention, the preset mechanism or algorithm may be a consensus mechanism or a consensus algorithm for determining which network node has the right to generate blocks, and the preset mechanism or algorithm may also be used for how network nodes generate blocks block algorithm. In short, as the specific definition and use of the mechanism or algorithm, the present invention does not limit too much. The above applies to the full text.

在本申请的所有实施例和申请内容中,共识算法可以等同于共识机制,算法可以等同于机制。In all the embodiments and application contents of this application, a consensus algorithm may be equivalent to a consensus mechanism, and an algorithm may be equivalent to a mechanism.

针对本申请全文中涉及的第一算法,第二算法,第三算法,第四算法等等,彼此两个算法可以是一样的算法,也可以是不一样的算法。在本申请实施例中不做限制。For the first algorithm, the second algorithm, the third algorithm, the fourth algorithm, etc. involved in the whole of this application, the two algorithms may be the same algorithm or different algorithms. There is no limitation in this embodiment of the present application.

针对本申请全文中涉及的第一算法,第二算法,第三算法、第四算法等,所述算法可以是共识算法,也可以不是共识算法。在大部分的实施例中,我们用共识算法来举例说明问题,但本申请不做任何算法上的限定。For the first algorithm, the second algorithm, the third algorithm, the fourth algorithm, etc. involved in the full text of this application, the algorithms may or may not be consensus algorithms. In most of the embodiments, we use the consensus algorithm to illustrate the problem, but this application does not make any limitations on the algorithm.

207,在生成第一区块链之后,所述第二网络节点向设备节点发送第一通知消息。207. After generating the first blockchain, the second network node sends a first notification message to the device node.

其中,所述第一通知消息用于通知设备节点所述第二网络节点已根据所述数据信息生成区块链的区块的消息。可选的,第一通知消息可以在生成第一区块链L1和生成第二区块链L2中的任意一个区块链之后发送。需要说明的是,步骤207为可选步骤。The first notification message is used to notify the device node that the second network node has generated a block of the blockchain according to the data information. Optionally, the first notification message may be sent after any one of the first blockchain L1 and the second blockchain L2 is generated. It should be noted that step 207 is an optional step.

相应的,所述设备节点接收所述第二网络节点发送的第一通知消息。Correspondingly, the device node receives the first notification message sent by the second network node.

210,在生成第一区块链之后,所述设备节点将删除所述数据信息。210. After generating the first blockchain, the device node will delete the data information.

可选的,所述设备节点可以将生成时间时长超过第一时间阈值的数据信息进行删除。所述设备节点可以通过记录所述数据信息的生成时长,在生成时长超过第一时间阈值的情况下,将其删除。Optionally, the device node may delete data information whose generation time duration exceeds the first time threshold. The device node may record the generation duration of the data information, and delete it when the generation duration exceeds the first time threshold.

进一步,可选的,所述第二网络节点执行步骤209,向所述设备节点发送第一删除消息。相应的,所述设备节点在接收到第二网络节点发送的第一删除消息之后,执行步骤210。其中,所述第一删除消息为用于指示所述设备节点删除数据信息的指示消息。可选的方案中,所述第二网络节点可以在第一删除消息中指明所要删除的数据信息。又一可选的方案中,所述第二网络节点也可以不指明删除的数据信息,由设备节点自行确定,这样所述第一删除消息的作用为通知设备节点执行删除数据信息即可。Further, optionally, the second network node executes step 209 to send a first delete message to the device node. Correspondingly, after receiving the first deletion message sent by the second network node, the device node performs step 210 . The first deletion message is an instruction message used to instruct the device node to delete data information. In an optional solution, the second network node may indicate the data information to be deleted in the first deletion message. In another optional solution, the second network node may not specify the data information to be deleted, but is determined by the device node, so that the function of the first deletion message is to notify the device node to delete the data information.

进一步,可选的,所述第二网络节点执行步骤209,也可以是在所述第二网络节点接收到设备节点发送的第二删除消息之后,向所述设备节点发送的第一删除消息。其中,所述第二删除消息为所述至少一个设备节点用于请求删除数据信息。第二删除消息可以为所述设备节点向所述第二网络节点进行申请是否允许删除某一个或者多个数据信息的消息,这样所述第二网络节点可以反馈一个包含允许的第一删除消息或者不允许删除的消息。或者,第二删除消息也可以为所述设备节点向所述第二网络节点请求为所述设备节点确定可以删除的数据信息的消息,这样所述第二网络节点可以确定出一个待删除的数据信息,并添加至第一删除消息中发送至所述设备节点。本申请实施例第二删除消息的所采用的方式不做限定。Further, optionally, the second network node performs step 209, which may also be a first delete message sent to the device node after the second network node receives the second delete message sent by the device node. The second deletion message is used by the at least one device node to request deletion of data information. The second deletion message may be a message for the device node to apply to the second network node for permission to delete one or more pieces of data information, so that the second network node may feed back a first deletion message containing the permission or Messages that are not allowed to be deleted. Alternatively, the second deletion message may also be a message for the device node to request the second network node to determine data information that can be deleted for the device node, so that the second network node can determine a piece of data to be deleted. information, and add it to the first delete message and send it to the device node. The manner used for the second deletion message in this embodiment of the present application is not limited.

接下来对第一网络节点和设备节点的交互过程进行详细介绍。Next, the interaction process between the first network node and the device node is introduced in detail.

211,所述设备节点向第一网络设备发送一个或者多个数据信息。211. The device node sends one or more pieces of data information to the first network device.

其中,在本申请实施例的步骤211中,所述数据信息包括第一数据的散列值,其中第一数据为步骤201中的数据信息所包括的内容。所述设备节点通过向第二网络节点发送第一数据,向第一网络节点发送第一数据的散列值,这样将第一数据和第一数据的散列值进行分别存储,即时第一数据被篡改了,还可以通过散列值对第一数据进行验证,以提高数据的防篡改能力。所述数据信息还可以包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址。可选的,所述第一数据的时间信息可以是所述第一数据的散列值的发送时间或所述第一数据的散列值的产生时间或所述第一数据的产生时间,本申请实施例对此不做限定。Wherein, in step 211 of this embodiment of the present application, the data information includes a hash value of first data, where the first data is content included in the data information in step 201 . The device node sends the first data to the second network node, and sends the hash value of the first data to the first network node, so that the first data and the hash value of the first data are stored separately. If it has been tampered with, the first data can also be verified through the hash value, so as to improve the tamper-proof capability of the data. The data information may further include at least one of the following: an index value of the first data, time information of the first data, an identifier of a device node sending the data information, an address of the device node, and the The address of the network node. Optionally, the time information of the first data may be the sending time of the hash value of the first data or the generation time of the hash value of the first data or the generation time of the first data. The application embodiments do not limit this.

相应的,所述第一网络节点接收所述设备节点发送的一个或者多个数据信息。Correspondingly, the first network node receives one or more pieces of data information sent by the device node.

212,所述第一网络节点根据所述一个或者多个数据信息生成至少一个第一交易信息。212. The first network node generates at least one first transaction information according to the one or more pieces of data information.

其中,这里的第一交易信息是在第一网络节点生成的,采用B1表示,以加以区分。第一交易信息B1的生成方式与第一交易信息A1的生成方式相同,进而可以参考步骤202中的详细描述,在此不再赘述。Wherein, the first transaction information here is generated at the first network node, and is represented by B1 to distinguish it. The generation method of the first transaction information B1 is the same as the generation method of the first transaction information A1, and further reference may be made to the detailed description in step 202, which will not be repeated here.

213、所述第一网络节点将生成的所述至少一个第一交易信息发送至其他第一网络节点。213. The first network node sends the generated at least one first transaction information to other first network nodes.

可选的,所述第一网络节点可以执行步骤204,根据接收到的所述至少一个第一交易信息生成第二区块链中的区块。该步骤中的第二区块链用L3表示。第二区块链L3的区块的生成可以参考步骤203中第一区块链用L1的生成方式,在此不再赘述。Optionally, the first network node may execute step 204 to generate a block in the second blockchain according to the received at least one first transaction information. The second blockchain in this step is denoted by L3. For the generation of the blocks of the second blockchain L3, reference may be made to the generation method of the first blockchain L1 in step 203, and details are not repeated here.

215,所述其他第一网络节点向所述第一网络节点发送的至少一个第二交易信息。215. At least one second transaction information sent by the other first network node to the first network node.

其中,本步骤中第二交易信息用B2表示。Wherein, the second transaction information in this step is represented by B2.

216、所述第一网络节点根据第一交易信息和/或所述第二交易信息生成第二区块链中的区块。216. The first network node generates a block in the second blockchain according to the first transaction information and/or the second transaction information.

可选地,第一网络节点将生成的第二区块链区块广播给其他网络节点。Optionally, the first network node broadcasts the generated second blockchain block to other network nodes.

在本实施例中,是以第一网络节点来生成第二区块链区块为例。实际上,可以是其他网络节点(例如网络节点B)根据第一交易信息B1和第二交易信息B2生成第二区块链的区块。同理,其他网络节点(例如网络节点B)将生成的第二区块链区块广播给其他网络节点(除了网络节点B以外的其他网络节点,第一网络节点)。例如一种情况下是第一网络节点生成区块,一种情况下是其他网络节点生成区块。第一网络节点和其他网络节点可根据某个算法(例如共识算法)来确定谁生成第i个区块(i为大于等于1的自然数)。总之,根据上述步骤,第一网络节点与其他网络节点形成了第二区块链。In this embodiment, the generation of the second blockchain block by the first network node is taken as an example. In fact, other network nodes (eg, network node B) may generate blocks of the second blockchain according to the first transaction information B1 and the second transaction information B2. Similarly, other network nodes (eg, network node B) broadcast the generated second blockchain block to other network nodes (other network nodes other than network node B, the first network node). For example, in one case, the first network node generates blocks, and in another case, other network nodes generate blocks. The first network node and other network nodes can determine who generates the ith block (i is a natural number greater than or equal to 1) according to a certain algorithm (eg, a consensus algorithm). In conclusion, according to the above steps, the first network node and other network nodes form a second blockchain.

其中,本步骤中的第二区块链用L4表示。第一网络节点根据第一交易信息B1和/或所述第二交易信息B2生成第二区块链L4的方式,与第二网络节点根据第一交易信息A1和/或所述第二交易信息A2生成第一区块链L2的方式相同,具体可以参考步骤206中的详细描述,在此不再赘述。Wherein, the second blockchain in this step is represented by L4. The first network node generates the second blockchain L4 according to the first transaction information B1 and/or the second transaction information B2, and the second network node generates the second blockchain L4 according to the first transaction information A1 and/or the second transaction information. The manner in which A2 generates the first blockchain L2 is the same. For details, please refer to the detailed description in step 206, which will not be repeated here.

进一步,可选的,所述第一网络节点也可以在生成第二区块链之后,向设备节点发送第一通知消息,用于通知设备节点所述第一网络节点已根据所述数据信息生成区块链的区块的消息。Further, optionally, the first network node may also send a first notification message to the device node after generating the second blockchain, for notifying the device node that the first network node has generated the data information according to the data information. The message of the block of the blockchain.

进一步的,所述第一网络节点可以将第一数据的散列值发送给中心节点,所述第二网络节点可以将第一数据发送至中心节点,以使中心节点计算所述第一数据的第二散列值,并将第二散列值和第一散列值进行比对,以检验第一数据是否被篡改,是否为可信数据等,具体的实现过程可以参考图1所示实施例的具体描述,在此不再赘述。Further, the first network node can send the hash value of the first data to the central node, and the second network node can send the first data to the central node, so that the central node can calculate the hash value of the first data. The second hash value, and the second hash value is compared with the first hash value to check whether the first data has been tampered with, whether it is trusted data, etc. The specific implementation process can refer to the implementation shown in FIG. 1 . The specific description of the example will not be repeated here.

进一步可选的,所述第一网络节点或第二网络节点均可以从目标区块链中确定待删除区块。Further optionally, both the first network node or the second network node may determine the block to be deleted from the target blockchain.

其中,对于第一网络节点而言,所述目标区块链为所述第一网络节点中的第二区块链L3或第二区块链L4;对于第二网络节点而言,所述目标区块链为所述第二网络节点中的第一区块链L1或第一区块链L2。Wherein, for the first network node, the target blockchain is the second blockchain L3 or the second blockchain L4 in the first network node; for the second network node, the target blockchain The blockchain is the first blockchain L1 or the first blockchain L2 in the second network node.

第一网络节点或第二网络节点在确定待删除区块的可选方案可以为:以第二网络节点为例,所述第二网络节点可以按照预设删除规则,从目标区块链中确定待删除区块。其中,所述预设删除规则可以包括但不限定于所述第二网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。在将待删除区块删除之后,所述第一网络节点或第二网络节点可以记录所述待删除区块的区块头内容。An optional solution for the first network node or the second network node to determine the block to be deleted may be: taking the second network node as an example, the second network node may determine from the target blockchain according to preset deletion rules Blocks to be deleted. Wherein, the preset deletion rule may include, but is not limited to, the number of blocks stored in the target blockchain by the second network node is greater than a preset threshold, or the block to be deleted is the generation time duration exceeding the time period A block with a threshold value, or the block to be deleted is a block with a block sequence number smaller than the sequence number threshold value. After the block to be deleted is deleted, the first network node or the second network node may record the content of the block header of the block to be deleted.

进一步可选的,所述第一网络节点或第二网络节点可以将所生成的区块链的区块包含的多个交易信息发送至上一级网络节点。可选的,所述第一网络节点或第二网络节点在确定待删除区块之后,可以将待删除区块所包含的至少一个交易信息发送至上一级网络节点。可选的,在上一级网络节点中可以记录所述至少一个交易信息的原存储位置信息。其中,第一网络节点的上一级网络节点与第二网络节点的上一级网络节点可以相同,也可以不同,本申请实施例对此不做限定。Further optionally, the first network node or the second network node may send a plurality of transaction information contained in the blocks of the generated blockchain to the upper-level network node. Optionally, after determining the block to be deleted, the first network node or the second network node may send at least one transaction information included in the block to be deleted to the upper-level network node. Optionally, the original storage location information of the at least one transaction information may be recorded in the upper-level network node. The upper-level network node of the first network node and the upper-level network node of the second network node may be the same or different, which is not limited in this embodiment of the present application.

需要说明的是,所述设备节点执行步骤211中向所述第一网络节点发送的一个或者多个数据信息中包含第一数据的第一散列值,具体是设备节点根据第一数据计算获取第一数据的第一散列值,并将包含第一数据的第一散列值的数据信息发送至所述第一网络节点。或者,所述设备节点可以向所述第一网络数据节点发送的一个或者多个数据信息包含第一数据,在第一网络节点接收到该数据信息之后,根据数据信息中包含的第一数据,计算获取第一数据的第一散列值。或者,所述设备节点可以向所述第一网络数据节点发送的一个或者多个数据信息既包含第一数据又包含第一数据的第一散列值,本申请实施例对此不做限定。It should be noted that the one or more pieces of data information sent by the device node to the first network node in step 211 include the first hash value of the first data. Specifically, the device node calculates and obtains the data according to the first data. the first hash value of the first data, and sending data information including the first hash value of the first data to the first network node. Alternatively, one or more pieces of data information sent by the device node to the first network data node may include first data, and after the first network node receives the data information, according to the first data included in the data information, The calculation obtains the first hash value of the first data. Alternatively, the one or more pieces of data information sent by the device node to the first network data node include both the first data and the first hash value of the first data, which is not limited in this embodiment of the present application.

本实施例以第一网络节点与其他第一网节点形成第二区块链,第二网络节点与其他第二网络节点形成第一区块链为例说明本申请内容。其中设备节点可以是多个设备节点执行步骤201和211。另外,实际上图4所示实施例还可以是只有第二网络节点与其他第二网络节点形成第一区块链,而第一网络节点在收到设备节点的数据信息(步骤211)后,可以只是不断的存储收到的数据信息,不形成第二区块链。或者,图4所示实施例还可以是只有第一网络节点与其他第一网络节点形成第二区块链,而第二网络节点在收到设备节点的数据信息(步骤201)后,可以只是不断的存储收到的数据信息,不形成第一区块链。In this embodiment, the content of the present application is described by taking the first network node and other first network nodes forming a second blockchain, and the second network node and other second network nodes forming a first blockchain as an example. The device nodes may be multiple device nodes to perform steps 201 and 211 . In addition, in fact, in the embodiment shown in FIG. 4 , only the second network node and other second network nodes may form the first blockchain, and after the first network node receives the data information of the device node (step 211 ), You can just keep storing the received data information without forming a second blockchain. Alternatively, in the embodiment shown in FIG. 4 , only the first network node and other first network nodes may form a second blockchain, and after receiving the data information of the device node (step 201 ), the second network node may only The received data information is continuously stored, and the first blockchain is not formed.

在本申请实施例中,通过将设备节点中的一个或者多个第一数据发送至其他网络节点进行存储,能够缓解设备节点的存储压力,另外,在第一网络节点中和第二网络节点分别生成了关于第一数据的区块链和关于第一数据的第一散列值的区块链,实现了通过区块链来分别存储数据和散列值,即使根据数据所生成的第一区块链的数据都被篡改的情况下,能够通过第二区块链的散列值对第一区块链中的数据进行验证,因此这样提高了数据的防篡改能力。In the embodiment of the present application, by sending one or more first data in the device node to other network nodes for storage, the storage pressure of the device node can be relieved. In addition, the first network node and the second network node are respectively A block chain related to the first data and a block chain related to the first hash value of the first data are generated, and the data and the hash value are respectively stored through the block chain, even if the first area generated according to the data is used. When all the data in the blockchain is tampered with, the data in the first blockchain can be verified through the hash value of the second blockchain, thus improving the tamper-proof capability of the data.

请参见图5,为本申请实施例提供了另一种数据处理方法的流程示意图,如图5所示,本申请实施例中涉及第一网络节点、其他第一网络节点和设备节点。可以参考图2所示的网络架构,所述数据处理方法是由以上节点共同完成的,其中,所述设备节点在执行步骤301至步骤312的过程中,所述设备节点为与所述第一网络节点建立通信连接的多个设备节点中的任意一个。需要说明的是,本申请实施例中,第一网络节点和其他第一网络节点所执行的步骤,也可以换为第二网络节点和其他第二网络节点来执行,图5所示实施例是以第一网络节点为例进行的说明。具体的执行过程请参见以下详细介绍。Please refer to FIG. 5 , which provides a schematic flowchart of another data processing method in an embodiment of the present application. As shown in FIG. 5 , the embodiment of the present application involves a first network node, other first network nodes, and device nodes. Referring to the network architecture shown in FIG. 2, the data processing method is jointly completed by the above nodes, wherein, in the process of executing steps 301 to 312 by the device node, the device node is the same as the first node. Any one of a plurality of device nodes to which a network node establishes a communication connection. It should be noted that, in this embodiment of the present application, the steps performed by the first network node and other first network nodes may also be performed by the second network node and other second network nodes. The embodiment shown in FIG. 5 is The description is made by taking the first network node as an example. For the specific execution process, please refer to the following detailed introduction.

301,设备节点向第一网络节点发送一个或者多个数据信息。301. The device node sends one or more pieces of data information to the first network node.

其中,所述设备节点可以将包含第一数据的数据信息发送至所述第一网络节点。或者,所述设备节点可以将包含第一数据和第一数据的第一散列值的数据信息发送至所述第一网络节点。在以上两种可选的数据信息的基础上,所述数据信息还可以包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和接收所述数据信息的第一网络节点的地址。可选的,所述第一数据的时间信息可以是所述第一数据的发送时间或所述第一数据的产生时间,本申请实施例对此不做限定。The device node may send data information including the first data to the first network node. Alternatively, the device node may send data information including the first data and the first hash value of the first data to the first network node. On the basis of the above two optional data information, the data information may further include at least one of the following: the index value of the first data, the time information of the first data, the device sending the data information The identity of the node, the address of the device node and the address of the first network node that receives the data information. Optionally, the time information of the first data may be the sending time of the first data or the generation time of the first data, which is not limited in this embodiment of the present application.

可选的,一个或者多个数据信息的表现形式可以参考图4所示实施例中步骤201中数据信息的详细描述,在此不再赘述。Optionally, for the representation form of one or more data information, reference may be made to the detailed description of the data information in step 201 in the embodiment shown in FIG. 4 , which will not be repeated here.

302、所述第一网络节点计算所述第一数据的第一散列值。302. The first network node calculates a first hash value of the first data.

其中,对于数据信息中未包含第一数据的第一散列值的情况,所述第一网络节点执行步骤302。对于数据信息中包含第一数据的第一散列值的情况,所述第一网络节点可以计算第一数据的第一散列值,并根据携带的第一散列值进行比较,以确定第一数据在传输过程中是否被篡改,若两者不相同,则确定第一数据已被篡改,可以通知设备节点第一数据已被篡改的通知消息,以及不执行本申请实施例后续步骤,这样增强了第一数据传输的安全性。Wherein, in the case that the first hash value of the first data is not included in the data information, the first network node executes step 302 . In the case where the data information includes the first hash value of the first data, the first network node may calculate the first hash value of the first data, and compare the carried first hash value to determine the first hash value of the first data. Whether a piece of data has been tampered with during the transmission process, if the two are not the same, it is determined that the first data has been tampered with, the device node can be notified of a notification message that the first data has been tampered with, and the subsequent steps of this embodiment of the present application are not performed, so that The security of the first data transmission is enhanced.

总之,所述第一网络节点可以从数据信息中获得或者计算得到每一个第一数据对应的一个第一散列值。可以理解的是,第一网络节点除了可以接收所述设备节点发送的一个或者多个数据信息,还可以接收其他设备节点发送的一个或者多个数据信息。In conclusion, the first network node may obtain or calculate a first hash value corresponding to each first data from the data information. It can be understood that, in addition to receiving one or more pieces of data information sent by the device node, the first network node can also receive one or more pieces of data information sent by other device nodes.

举例来说,如表7所示,包含了第一网络节点确定的多个第一散列值。表7中,数据索引值可以是第一数据的索引值,也可以是与第一数据的索引值对应的第一散列值的索引值。不论是那种方式,在从分别查找第一数据和第一数据的第一散列值的情况下,可以通过第一数据的索引值,或者第一数据的索引值和第一散列值的索引值之间的对应关系,能够查找到第一数据和所述第一数据对应的第一散列值。For example, as shown in Table 7, a plurality of first hash values determined by the first network node are included. In Table 7, the data index value may be the index value of the first data, or may be the index value of the first hash value corresponding to the index value of the first data. Either way, in the case of searching for the first data and the first hash value of the first data respectively, the index value of the first data or the combination of the index value of the first data and the first hash value can be used. The correspondence between the index values can be searched for the first data and the first hash value corresponding to the first data.

表7Table 7

Figure GDA0003268638430000231
Figure GDA0003268638430000231

303、所述第一网络节点根据所述第一散列值生成第一交易信息B1。303. The first network node generates first transaction information B1 according to the first hash value.

其中,第一交易信息是采用散列值生成的,本申请实施例采用B1对本步骤生成的第一交易信息进行表示,以加以区分。The first transaction information is generated by using a hash value, and in this embodiment of the present application, B1 is used to represent the first transaction information generated in this step to distinguish.

进一步的,若第一散列值的数量为1个,则所述第一网络节点可以生成一个第一交易信息B1。例如第一数据可以是数据1,数据2,数据3……或者数据n。不同的数据有不同的散列值,那么例如数据1的散列值是散列值1,数据2的散列值是散列值2,如此类推。若第一散列值的数量为多个,则所述第一网络节点可以生成至少一个第一交易信息B1。可选的,所述第一交易信息包括以下至少一项对应的信息:交易标识、数据项、数据的散列值、生成所述第一交易信息的节点标识项、数据的索引值项、时间信息项、数据的发送方项和数据的接收方项。其中时间信息项例如可以是指数据的发送时间或者交易的生成时间,本申请实施例对此不做限定。Further, if the number of first hash values is one, the first network node may generate one first transaction information B1. For example, the first data may be data 1, data 2, data 3 . . . or data n. Different data have different hash values, so for example, the hash value of data 1 is hash value 1, the hash value of data 2 is hash value 2, and so on. If the number of the first hash values is multiple, the first network node may generate at least one first transaction information B1. Optionally, the first transaction information includes information corresponding to at least one of the following items: transaction identifier, data item, data hash value, node identifier item that generates the first transaction information, data index value item, time Information items, sender items of data, and receiver items of data. The time information item may refer to, for example, the sending time of the data or the generating time of the transaction, which is not limited in this embodiment of the present application.

表8Table 8

Figure GDA0003268638430000232
Figure GDA0003268638430000232

以表7为中所包含的第一散列值为例,所述第一网络节点可以生成如表8所示的第一交易信息B1。Taking the first hash value included in Table 7 as an example, the first network node may generate the first transaction information B1 as shown in Table 8.

或者,以表7为中所包含的第一散列值为例,所述第一网络节点可以生成如表9所示的第一交易信息B1。其中,Tx可以为数据包1生成的时间或者交易1生成的时间,本申请实施例对此不做限定。其中,第一网络节点将多个数据的数据散列值作为一个数据包,数据包作为交易的数据项内容。关于地址,具体地,举例说明表9,接收方地址,例如可以是第一网络节点地址,发送方地址,例如所述数据包1的数据散列值所有都来自于设备节点1的情况,即设发送方地址为设备节点1的地址。Or, taking the first hash value included in Table 7 as an example, the first network node may generate the first transaction information B1 shown in Table 9. Wherein, Tx may be the time when the data packet 1 is generated or the time when the transaction 1 is generated, which is not limited in this embodiment of the present application. Wherein, the first network node regards the data hash values of the plurality of data as a data packet, and the data packet is regarded as the data item content of the transaction. Regarding addresses, specifically, Table 9 is illustrated as an example, the address of the receiver can be, for example, the address of the first network node, and the address of the sender, for example, the data hash value of the data packet 1 all comes from the device node 1, that is Let the sender address be the address of device node 1.

表9Table 9

Figure GDA0003268638430000241
Figure GDA0003268638430000241

其中,数据包内容可以参见表10所示。Among them, the content of the data packet can be referred to as shown in Table 10.

表10Table 10

Figure GDA0003268638430000242
Figure GDA0003268638430000242

304,所述第一网络节点向其他第一网络节点发送所述至少一个第一交易信息。304. The first network node sends the at least one first transaction information to other first network nodes.

其中,本申请实施例所涉及的第一网络节点为多个第一网络节点中的任意一个,而其他第一网络节点是多个第一网络节点中除了这一个第一网络节点之外的其他第一网络节点。Wherein, the first network node involved in the embodiment of the present application is any one of multiple first network nodes, and the other first network nodes are other than the one first network node among the multiple first network nodes The first network node.

相应的,其他第一网络节点中的任一第一网络节点接收所述至少一个第一交易信息B1。Correspondingly, any one of the other first network nodes receives the at least one first transaction information B1.

305,所述其他第一网络节点向所述第一网络节点发送的至少一个第二交易信息。305. At least one second transaction information sent by the other first network node to the first network node.

其中,本申请实施例中,其他第一网络节点发送的第二交易信息用B2表示,需要说明的是,这里的第二交易信息B2和第一交易信息B1均包含有数据的散列值项,进而能够实现生成由数据的散列值项生成的交易信息生成第二区块链中的区块。举例说明,具体地,第一网络节点例如是网络节点A,基于它收到的设备节点A发送的数据信息,数据信息中包含一个第一数据,所述第一数据例如是数据A。网络节点A根据数据A,获得所述数据A的散列值A(例如利用数据A计算出散列值A)。基于散列值A,根据上述步骤303中生成第一交易的方式,生成了第一交易信息B1。其他第一网络节点例如是网络节点B基于它收到的设备节点B发送的数据信息,数据信息中包含一个第一数据,所述第一数据例如是数据B。网络节点B根据数据B,获得所述数据B的散列值B(利用数据B计算出散列值B)。基于散列值B,根据上述步骤303中生成第一交易的方式,生成了第二交易信息B2。Among them, in the embodiment of the present application, the second transaction information sent by other first network nodes is represented by B2. It should be noted that both the second transaction information B2 and the first transaction information B1 here contain the hash value item of the data. , and then can realize the generation of transaction information generated by the hash value item of the data to generate the block in the second block chain. For example, specifically, the first network node is, for example, the network node A. Based on the data information sent by the device node A, the data information includes a piece of first data, for example, data A. The network node A obtains the hash value A of the data A according to the data A (for example, the hash value A is calculated by using the data A). Based on the hash value A, the first transaction information B1 is generated according to the method of generating the first transaction in the above step 303 . The other first network node is, for example, the network node B based on the data information sent by the device node B received by the network node B, and the data information includes a piece of first data, and the first data is data B, for example. The network node B obtains the hash value B of the data B according to the data B (using the data B to calculate the hash value B). Based on the hash value B, the second transaction information B2 is generated according to the method of generating the first transaction in the above step 303 .

可选的,第二交易信息的生成方式与本申请实施例中第一交易信息的生成方式相同,具体可以参考步骤301至步骤203中的详细描述,在此不再赘述。Optionally, the generation method of the second transaction information is the same as the generation method of the first transaction information in this embodiment of the present application. For details, reference may be made to the detailed descriptions in steps 301 to 203 , which will not be repeated here.

相应的,所述第一网络节点接收其他第一网络节点发送的至少一个第二交易信息。Correspondingly, the first network node receives at least one second transaction information sent by other first network nodes.

306、所述第一网络节点根据第一交易信息和/或所述第二交易信息生成第二区块链中的区块。306. The first network node generates a block in the second blockchain according to the first transaction information and/or the second transaction information.

其中,所述第一网络节点根据第一交易信息B1和接收到的所述第二交易信息B2生成第二区块链中的区块。可选地,第一网络节点将生成的第二区块链区块广播给其他网络节点。Wherein, the first network node generates a block in the second blockchain according to the first transaction information B1 and the received second transaction information B2. Optionally, the first network node broadcasts the generated second blockchain block to other network nodes.

在本实施例中,是以第一网络节点来生成第二区块链区块为例。实际上,可以是其他网络节点(例如网络节点B)根据第一交易信息B1和第二交易信息B2生成第二区块链的区块。同理,其他网络节点(例如网络节点B)将生成的第二区块链区块广播给其他网络节点(除了网络节点B以外的其他网络节点,第一网络节点)。本申请实施例中第二区块链L4的生成方法可以参考图4所示实施例中步骤216中第二区块链L4的生成方式,在此不再赘述。In this embodiment, the generation of the second blockchain block by the first network node is taken as an example. In fact, other network nodes (eg, network node B) may generate blocks of the second blockchain according to the first transaction information B1 and the second transaction information B2. Similarly, other network nodes (eg, network node B) broadcast the generated second blockchain block to other network nodes (other network nodes other than network node B, the first network node). For the generation method of the second blockchain L4 in the embodiment of the present application, reference may be made to the generation method of the second blockchain L4 in step 216 in the embodiment shown in FIG. 4 , and details are not repeated here.

307,所述第一网络节点根据所述第一数据生成第一交易信息A1。307. The first network node generates first transaction information A1 according to the first data.

步骤307与步骤302是并列步骤,执行次序不分先后。Step 307 and step 302 are parallel steps, and the order of execution is not specific.

308,所述第一网络节点根据所述第一交易信息A1,生成第一区块链L1的区块。308. The first network node generates a block of the first blockchain L1 according to the first transaction information A1.

其中,步骤307和步骤308是第一网络节点根据接收到设备节点的数据信息所包含的第一数据,生成第一交易信息。具体实现方式可以是,例如根据设备节点1发送的第一数据1生成第一交易A1(1),根据设备节点2发送的第一数据2生成第一交易A1(2),根据第一数据3生成第一交易A2(3)。或者,第一网络节点根据所述第一数据1,第一数据2,第一数据3组成的数据包,生成了第一交易A1。总之,第一网络节点根据一个或者多个数据信息包含的第一数据,生成至少一个第一交易信息,并根据生成的至少一个交易信息,生成第一区块链的区块的过程。具体的实现方式可以参考图4所示实施例中步骤212至步骤214的详细描述,在此不再赘述。Wherein, in steps 307 and 308, the first network node generates the first transaction information according to the first data included in the data information received from the device node. The specific implementation may be, for example, generating the first transaction A1(1) according to the first data 1 sent by the device node 1, generating the first transaction A1(2) according to the first data 2 sent by the device node 2, and generating the first transaction A1(2) according to the first data 3 A first transaction A2(3) is generated. Or, the first network node generates the first transaction A1 according to the data packet composed of the first data 1, the first data 2, and the first data 3. In a word, the first network node generates at least one first transaction information according to the first data contained in one or more data information, and generates a block of the first blockchain according to the generated at least one transaction information. For a specific implementation manner, reference may be made to the detailed description of steps 212 to 214 in the embodiment shown in FIG. 4 , which will not be repeated here.

具体地,所述第一网络节点独自生成第一区块链的所有区块,独立形成一个第一区块链。具体地所述网络节点可以将区块发送给自己,和/或将自己不断生成的区块保存。Specifically, the first network node independently generates all the blocks of the first blockchain to independently form a first blockchain. Specifically, the network node can send the blocks to itself, and/or save the blocks that it continuously generates.

具体地,所述第一网络节点所述第一网络节点根据至少一个第一交易信息A1,基于第一算法,生成第一区块链的区块。所述第一算法可以等同于第一机制。所述第一算法可以用于确定哪个网络节点生成第一区块链的区块,因此所述第一算法,举例可以是:所述第一网络节点为生成第一区块链区块的唯一节点。或者,所述第一算法还可以用于所述第一网络节点如何生成所述区块的算法。Specifically, the first network node generates a block of the first blockchain based on the first algorithm according to at least one first transaction information A1. The first algorithm may be equivalent to the first mechanism. The first algorithm can be used to determine which network node generates the block of the first blockchain, so the first algorithm, for example, can be: the first network node is the only one that generates the first blockchain block. node. Alternatively, the first algorithm may also be used for an algorithm of how the first network node generates the block.

同理,针对权利要求中提到的第一算法,第三算法,第五算法,第七算法,所述算法等同于机制,所述算法可以是具体的算法,也可以是非常简单的机制,例如规定某个节点为生成该区块链的区块的唯一节点,或者所述网络节点根据交易直接生成区块等等。总之作为机制或者算法的具体定义和用途,本发明不做过多限制。Similarly, for the first algorithm, the third algorithm, the fifth algorithm, and the seventh algorithm mentioned in the claims, the algorithms are equivalent to the mechanism, and the algorithm may be a specific algorithm or a very simple mechanism. For example, a certain node is specified as the only node that generates the block of the blockchain, or the network node directly generates the block according to the transaction, and so on. In short, as the specific definition and usage of the mechanism or algorithm, the present invention does not limit too much.

309,在所述第一网络节点生成区块链之后,向所述设备节点发送第一通知消息。309. After the first network node generates the blockchain, send a first notification message to the device node.

其中,所述第一通知消息用于通知设备节点所述第一网络节点已根据所述数据信息生成区块链的区块的消息。可选的,第一通知消息可以在生成第一区块链L1和生成第二区块链L4中的任意一个区块链之后发送。需要说明的是,步骤309为可选步骤。The first notification message is used to notify the device node that the first network node has generated a block of the blockchain according to the data information. Optionally, the first notification message may be sent after any one of the first blockchain L1 and the second blockchain L4 is generated. It should be noted that step 309 is an optional step.

相应的,所述设备节点接收所述第一网络节点发送的第一通知消息。Correspondingly, the device node receives the first notification message sent by the first network node.

310,所述设备节点向所述第一网络设备发送所述第二删除消息。310. The device node sends the second delete message to the first network device.

其中,所述第二删除消息为所述至少一个设备节点用于请求删除数据信息。The second deletion message is used by the at least one device node to request deletion of data information.

311,所述第一网络节点向所述设备节点发送第一删除消息。311. The first network node sends a first delete message to the device node.

其中,所述第一删除消息为用于指示所述设备节点删除数据信息的指示消息。The first deletion message is an instruction message used to instruct the device node to delete data information.

312,所述设备节点删除所述数据信息。312. The device node deletes the data information.

其中,可选地,所述设备节点删除所述数据信息,可以是根据删除条件去删除数据信息。例如将时间超过门限1的数据信息删除。例如设备节点删除存储时间超过门限1的数据信息。Wherein, optionally, the device node may delete the data information according to a deletion condition. For example, the data information whose time exceeds the threshold 1 is deleted. For example, the device node deletes data information whose storage time exceeds the threshold 1.

需要说明的是,步骤310、步骤311、步骤312均为可选步骤,具体的实现方式可以参考图4所示实施例中步骤208、步骤209和步骤210的详细描述,在此不再赘述。It should be noted that step 310, step 311, and step 312 are all optional steps, and the specific implementation can refer to the detailed description of step 208, step 209 and step 210 in the embodiment shown in FIG. 4, which will not be repeated here.

进一步可选的,所述第一网络节点可以从目标区块链中确定待删除区块。其中,所述目标区块链为所述第一网络节点中的第一区块链L1或第二区块链L4。Further optionally, the first network node may determine the block to be deleted from the target blockchain. The target blockchain is the first blockchain L1 or the second blockchain L4 in the first network node.

第一网络节点在确定待删除区块的可选方案可以为:以第一网络节点为例,所述第一网络节点可以按照预设删除规则,从目标区块链中确定待删除区块。其中,所述预设删除规则可以包括但不限定于所述第一网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。在将待删除区块删除之后,所述第一网络节点可以记录所述待删除区块的区块头内容。An optional solution for the first network node to determine the block to be deleted may be: taking the first network node as an example, the first network node may determine the block to be deleted from the target blockchain according to a preset deletion rule. Wherein, the preset deletion rule may include, but is not limited to, the number of blocks stored in the target blockchain by the first network node is greater than a preset threshold, or the block to be deleted is the generation time duration exceeding the time period A block with a threshold value, or the block to be deleted is a block with a block sequence number smaller than the sequence number threshold value. After deleting the block to be deleted, the first network node may record the content of the block header of the block to be deleted.

进一步可选的,所述第一网络节点可以将所生成的区块链的区块包含的多个交易信息发送至上一级网络节点。可选的,所述第一网络节点或第一网络节点在确定待删除区块之后,可以将待删除区块所包含的至少一个交易信息发送至上一级网络节点。可选的,在上一级网络节点中可以记录所述至少一个交易信息的原存储位置信息。Further optionally, the first network node may send a plurality of transaction information contained in the blocks of the generated blockchain to the upper-level network node. Optionally, after determining the block to be deleted, the first network node or the first network node may send at least one transaction information included in the block to be deleted to the upper-level network node. Optionally, the original storage location information of the at least one transaction information may be recorded in the upper-level network node.

进一步的,所述第一网络节点可以将第一数据的散列值和第一数据发送给中心节点,以使中心节点计算所述第一数据的第二散列值,并将第二散列值和第一散列值进行比对,以检验第一数据是否被篡改,是否为可信数据等,具体的实现过程可以参考图2所示系统的实施例的具体描述,在此不再赘述。Further, the first network node may send the hash value of the first data and the first data to the central node, so that the central node calculates the second hash value of the first data, and sends the second hash value to the central node. The value and the first hash value are compared to check whether the first data has been tampered with, whether it is trusted data, etc. The specific implementation process can refer to the specific description of the embodiment of the system shown in FIG. 2, which will not be repeated here. .

本实施例以第一网络节点与其他第一网节点形成第二区块链,第一网络节点根据接收的数据信息生成第一交易从而形成第一区块链。其中设备节点可以是至少一个设备节点执行步骤301.另外,实际上本实施例二还可以只有第一网络节点与其他第一网络节点形成第二区块链,而第一网络节点在收到设备节点的数据信息(步骤301)后,不执行步骤307和308,可以只是不断的存储收到的数据信息,不形成第一区块链。In this embodiment, the first network node and other first network nodes form the second blockchain, and the first network node generates the first transaction according to the received data information to form the first blockchain. The device node may be at least one device node to perform step 301. In addition, in the second embodiment, only the first network node and other first network nodes may form a second blockchain, and the first network node receives the device After the data information of the node (step 301), steps 307 and 308 are not performed, and the received data information can be stored continuously without forming the first blockchain.

在本申请实施例中,通过将设备节点中的一个或者多个第一数据发送至第一网络节点进行存储,能够缓解设备节点的存储压力,另外,在第一网络节点中分别生成了关于第一数据的区块链和关于第一数据的第一散列值的区块链,实现了通过区块链来分别存储数据和散列值,即使根据数据所生成的第一区块链的数据都被篡改的情况下,能够通过第二区块链的散列值对第一区块链中的数据进行验证,因此这样提高了数据的防篡改能力。In this embodiment of the present application, by sending one or more first data in the device node to the first network node for storage, the storage pressure of the device node can be relieved. A block chain of data and a block chain about the first hash value of the first data, realizes that the data and the hash value are stored separately through the block chain, even if the data of the first block chain is generated according to the data In the case of tampering, the data in the first blockchain can be verified through the hash value of the second blockchain, thus improving the tamper-proof capability of the data.

请参见图6,为本申请实施例提供了另一种数据处理方法的流程示意图。如图6所示,本申请实施例中涉及第一网络节点、其他第一网络节点、设备节点和其他设备节点。可以参考图2所示的网络架构,所述数据处理方法是由以上节点共同完成的,其中,所述设备节点在执行步骤401至步骤413的过程中,所述设备节点为与所述第一网络节点建立通信连接的多个设备节点中的任意一个。具体的执行过程请参见以下详细介绍。Referring to FIG. 6 , a schematic flowchart of another data processing method is provided in this embodiment of the present application. As shown in FIG. 6 , the embodiment of the present application involves a first network node, other first network nodes, device nodes, and other device nodes. Referring to the network architecture shown in FIG. 2, the data processing method is jointly completed by the above nodes, wherein, in the process of performing steps 401 to 413 on the device node, the device node is the same as the first node. Any one of a plurality of device nodes to which a network node establishes a communication connection. For the specific execution process, please refer to the following detailed introduction.

401,设备节点根据一个或者多个数据信息,生成至少一个第二交易信息。401. The device node generates at least one second transaction information according to one or more pieces of data information.

其中,所述第二交易信息包括数据项对应的信息,例如第一数据。可选的所述第二交易信息还可以包括至少一项对应的信息:数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。其中,若包含数据的散列值项,则该项对应的信息为所述设备节点对第一数据计算的第一散列值。其中,时间信息项可以是指第一数据的生成时间或者该第二交易信息的生成时间,本申请实施例对此不做限定。在本申请实施例中设备节点生成的第二交易信息用C1表示,以加以区分。Wherein, the second transaction information includes information corresponding to the data item, such as first data. Optionally, the second transaction information may further include at least one item of corresponding information: data index value item, data hash value item, time information item, data sender item and data receiver item. Wherein, if the hash value item of the data is included, the information corresponding to the item is the first hash value calculated by the device node for the first data. The time information item may refer to the generation time of the first data or the generation time of the second transaction information, which is not limited in this embodiment of the present application. In the embodiment of the present application, the second transaction information generated by the device node is denoted by C1 to distinguish it.

402,所述设备节点将所述至少一个第二交易信息发送至第一网络节点。402. The device node sends the at least one second transaction information to the first network node.

相应的,所述第一网络节点接收所述至少一个第二交易信息。Correspondingly, the first network node receives the at least one second transaction information.

402a、其他设备节点向所述第一网络节点发送第二交易信息。402a. Other device nodes send second transaction information to the first network node.

其中,网络中有多个设备节点,步骤402中所述第一网络节点接收所述设备节点发送的第二交易信息(用C1表示)外,所述第一网络节点还可以接收与所述第一网络节点建立通信连接的其他设备节点发送的第二交易信息,其他设备发送的第二交易信息用C2表示,以加以区分。所述第二交易信息所包含的内容可以参考步骤401中第二交易信息所包含内容的详细介绍,在此不再赘述。There are multiple device nodes in the network. In step 402, the first network node receives the second transaction information (represented by C1) sent by the device node, and the first network node can also receive and communicate with the first network node. The second transaction information sent by other device nodes that establish a communication connection by a network node, and the second transaction information sent by other devices are represented by C2 to distinguish them. For the content included in the second transaction information, reference may be made to the detailed introduction of the content included in the second transaction information in step 401, which is not repeated here.

403,所述第一网络节点根据至少一个第二交易信息,生成第一区块链的区块。403. The first network node generates a block of the first blockchain according to the at least one second transaction information.

其中,所述第一控制节点根据与其连接的多个设备节点发送第二交易信息,生成区块链。基于第二交易信息包含数据项的情况下,所述第一网络节点可以生成第一区块链L1的区块。Wherein, the first control node generates the blockchain according to the second transaction information sent by multiple device nodes connected to it. Based on the fact that the second transaction information includes data items, the first network node may generate a block of the first blockchain L1.

具体地,所述第一网络节点独自生成第一区块链的所有区块,独立形成一个第一区块链。具体地所述网络节点可以将区块发送给自己,和/或将自己不断生成的区块保存下来。Specifically, the first network node independently generates all the blocks of the first blockchain to independently form a first blockchain. Specifically, the network node can send the blocks to itself, and/or save the blocks that it continuously generates.

具体地,所述第一网络节点所述第一网络节点根据至少一个第二交易信息,基于第一算法,生成第一区块链的区块。所述第一算法可以等同于第一机制。所述第一算法用于确定哪个网络节点生成第一区块链的区块,因此所述第一算法,举例可以是:所述第一网络节点为生成第一区块链区块的唯一节点。Specifically, the first network node generates a block of the first blockchain based on the first algorithm according to at least one second transaction information. The first algorithm may be equivalent to the first mechanism. The first algorithm is used to determine which network node generates the block of the first blockchain, so the first algorithm, for example, can be: the first network node is the only node that generates the first blockchain block .

404,所述第一网络节点根据至少一个第二交易信息确定包含的至少一个第一数据。具体地,所述第一网络节点根据第一个第二交易信息(C1),从第二交易信息C1所包含的第一数据C1,确定第一个第一数据C1;所述第一网络节点根据第二个第二交易信息(C2)确定第二个第一数据C2;所述第一网络节点根据第三个第二交易信息(C3)确定第三个第一数据C3,以此类推。综上所述,所述第一网络节点根据至少一个第二交易信息确定包含的至少一个第一数据。404. The first network node determines at least one piece of included first data according to at least one piece of second transaction information. Specifically, the first network node determines the first first data C1 from the first data C1 included in the second transaction information C1 according to the first second transaction information (C1); the first network node The second first data C2 is determined according to the second second transaction information (C2); the first network node determines the third first data C3 according to the third second transaction information (C3), and so on. To sum up, the first network node determines the included at least one first data according to the at least one second transaction information.

其中,所述第一网络节点可以根据由设备节点发送来的交易信息中,确定出多个数据信息,所述数据信息包括第一数据,还可以包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址。Wherein, the first network node may determine a plurality of data information according to the transaction information sent by the device node, the data information includes first data, and may also include at least one of the following: The index value, the time information of the first data, the identifier of the device node sending the data information, the address of the device node, and the address of the network node.

405,所述第一网络节点计算第一数据的第一散列值。405. The first network node calculates a first hash value of the first data.

可选的,若设备节点发送的每个交易信息中包含数据的散列值项,则所述第一网络节点可以不执行步骤405。Optionally, if each transaction information sent by the device node includes a hash value item of data, the first network node may not perform step 405.

406,所述第一网络节点根据所述第一散列值生成第一交易信息B1。406. The first network node generates first transaction information B1 according to the first hash value.

步骤405与步骤403可以是并行步骤,不限制先后顺序。同理,步骤406与步骤403可以是并行步骤,不限制先后顺序。Steps 405 and 403 may be parallel steps, and the sequence is not limited. Similarly, step 406 and step 403 may be parallel steps, and the sequence is not limited.

其中,所述第一网络节点从设备节点发送来的交易信息中,确定出多个数据信息。在所述第一网络节点通过步骤405计算出所述数据信息中第一数据的第一散列值之后,可以根据该第一数据对应的数据信息中的其他信息确定出时间信息项、数据的索引值项、数据的发送方项和数据的接收方项。Wherein, the first network node determines a plurality of data information from the transaction information sent by the device node. After the first network node calculates the first hash value of the first data in the data information through step 405, it can determine the time information item and the value of the data according to other information in the data information corresponding to the first data. Index value item, sender item of data, and receiver item of data.

407,所述第一网络节点向其他第一网络节点发送生成的至少一个第一交易信息B1。407. The first network node sends the generated at least one first transaction information B1 to other first network nodes.

408,所述第一网络节点还可以接收其他第一网络节点发送的至少一个第二交易信息B2。408. The first network node may also receive at least one second transaction information B2 sent by other first network nodes.

409,所述第一网络节点根据至少一个第一交易信息B1和/或至少一个第二交易信息B2,生成第二区块链L4的区块。或者,所述第一网络节点和其他第一网络节点,基于算法,根据至少一个第一交易信息B1和/或至少一个第二交易信息B2,生成第二区块链L4。409. The first network node generates a block of the second blockchain L4 according to at least one first transaction information B1 and/or at least one second transaction information B2. Alternatively, the first network node and other first network nodes, based on an algorithm, generate a second blockchain L4 according to at least one first transaction information B1 and/or at least one second transaction information B2.

关于“所述第一网络节点根据至少一个第一交易信息B1和/或至少一个第二交易信息B2,生成第二区块链L4的区块。”的说明:在本实施例中,是以第一网络节点来生成第一区块链区块为例。实际上,可以是其他网络节点(例如网络节点B)根据第一交易信息B1和第二交易信息B2生成第一区块链的区块。同理,其他第一网络节点(例如网络节点B)将生成的第一区块链区块广播给其他第一网络节点(除了网络节点B以外的其他网络节点,第一网络节点)。例如一种情况下是第一网络节点生成区块,一种情况下是其他网络节点生成区块。第一网络节点和其他网络节点可根据某个算法来确定谁生成第i个区块(i为大于等于1的自然数)。总之,根据上述步骤,第而网络节点与其他网络节点形成了第一区块链L4。因此,所述第一网络节点和其他第一网络节点,基于算法,根据至少一个第一交易信息B1和/或至少一个第二交易信息B2,生成第二区块链L4。Regarding "the first network node generates the blocks of the second blockchain L4 according to at least one first transaction information B1 and/or at least one second transaction information B2.": In this embodiment, the Take the first network node to generate the first blockchain block as an example. In fact, other network nodes (eg, network node B) may generate blocks of the first blockchain according to the first transaction information B1 and the second transaction information B2. Similarly, other first network nodes (eg, network node B) broadcast the generated first blockchain block to other first network nodes (other network nodes other than network node B, first network node). For example, in one case, the first network node generates blocks, and in another case, other network nodes generate blocks. The first network node and other network nodes may determine who generates the ith block (i is a natural number greater than or equal to 1) according to a certain algorithm. In conclusion, according to the above steps, the first network node and other network nodes form the first blockchain L4. Therefore, the first network node and other first network nodes, based on an algorithm, generate a second blockchain L4 according to at least one first transaction information B1 and/or at least one second transaction information B2.

后续可选步骤:完成“生成第二区块链L4的区块”之后,第一网络节点将生成的第一区块链区块广播给其他网络节点。Subsequent optional steps: After completing the "generate block of the second blockchain L4", the first network node broadcasts the generated first blockchain block to other network nodes.

其中,步骤407至步骤409是生成关于散列值项的第二区块链,且是由多个第一网络节点基于算法生成的,这里用L4表示第二区块链,具体的生成第二区块链L4的执行过程可以参考图4所示实施例中步骤216的详细描述,在此不再赘述。Among them, steps 407 to 409 are to generate a second blockchain about the hash value item, and are generated by a plurality of first network nodes based on an algorithm. Here, L4 is used to represent the second blockchain. Specifically, the second blockchain is generated. For the execution process of the blockchain L4, reference may be made to the detailed description of step 216 in the embodiment shown in FIG. 4 , which will not be repeated here.

410,在所述第一网络节点生成区块链之后,向所述设备节点发送第一通知消息。410. After the first network node generates the blockchain, send a first notification message to the device node.

其中,所述第一通知消息用于通知设备节点所述第一网络节点已根据所述数据信息生成区块链的区块的消息。可选的,第一通知消息可以在生成第一区块链L1和生成第二区块链L4中的任意一个区块链之后发送。需要说明的是,步骤410为可选步骤。The first notification message is used to notify the device node that the first network node has generated a block of the blockchain according to the data information. Optionally, the first notification message may be sent after any one of the first blockchain L1 and the second blockchain L4 is generated. It should be noted that step 410 is an optional step.

相应的,所述设备节点接收所述第一网络节点发送的第一通知消息。Correspondingly, the device node receives the first notification message sent by the first network node.

411,所述设备节点向所述第一网络设备发送所述第二删除消息。411. The device node sends the second delete message to the first network device.

其中,所述第二删除消息为所述至少一个设备节点用于请求删除数据信息。The second deletion message is used by the at least one device node to request deletion of data information.

412,所述第一网络节点向所述设备节点发送第一删除消息。412. The first network node sends a first delete message to the device node.

其中,所述第一删除消息为用于指示所述设备节点删除数据信息的指示消息。The first deletion message is an instruction message used to instruct the device node to delete data information.

413,所述设备节点将删除所述数据信息。413, the device node will delete the data information.

需要说明的是,步骤411、步骤412、步骤413均为可选步骤,具体的实现方式可以参考图4所示实施例中步骤208、步骤209和步骤210的详细描述,在此不再赘述。It should be noted that step 411, step 412, and step 413 are all optional steps, and the specific implementation can refer to the detailed description of step 208, step 209 and step 210 in the embodiment shown in FIG. 4, which will not be repeated here.

进一步可选的,所述第一网络节点可以从目标区块链中确定待删除区块。其中,所述目标区块链为所述第一网络节点中的第一区块链L1或第二区块链L4。Further optionally, the first network node may determine the block to be deleted from the target blockchain. The target blockchain is the first blockchain L1 or the second blockchain L4 in the first network node.

第一网络节点在确定待删除区块的可选方案可以为:所述第一网络节点可以按照预设删除规则,从目标区块链中确定待删除区块。其中,所述预设删除规则可以包括但不限定于所述第一网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。在将待删除区块删除之后,所述第一网络节点可以记录所述待删除区块的区块头内容。An optional solution for the first network node to determine the block to be deleted may be: the first network node may determine the block to be deleted from the target blockchain according to a preset deletion rule. Wherein, the preset deletion rule may include, but is not limited to, the number of blocks stored in the target blockchain by the first network node is greater than a preset threshold, or the block to be deleted is the generation time duration exceeding the time period A block with a threshold value, or the block to be deleted is a block with a block sequence number smaller than the sequence number threshold value. After deleting the block to be deleted, the first network node may record the content of the block header of the block to be deleted.

进一步可选的,所述第一网络节点可以将所生成的区块链的区块包含的多个交易信息发送至上一级网络节点。可选的,所述第一网络节点或第一网络节点在确定待删除区块之后,可以将待删除区块所包含的至少一个交易信息发送至上一级网络节点。可选的,在上一级网络节点中可以记录所述至少一个交易信息的原存储位置信息。Further optionally, the first network node may send a plurality of transaction information contained in the blocks of the generated blockchain to the upper-level network node. Optionally, after determining the block to be deleted, the first network node or the first network node may send at least one transaction information included in the block to be deleted to the upper-level network node. Optionally, the original storage location information of the at least one transaction information may be recorded in the upper-level network node.

进一步的,所述第一网络节点可以将第一数据的散列值和第一数据发送给中心节点,以使中心节点计算所述第一数据的第二散列值,并将第二散列值和第一散列值进行比对,以检验第一数据是否被篡改,是否为可信数据等,具体的实现过程可以参考图2所示系统的实施例的具体描述,在此不再赘述。Further, the first network node may send the hash value of the first data and the first data to the central node, so that the central node calculates the second hash value of the first data, and sends the second hash value to the central node. The value and the first hash value are compared to check whether the first data has been tampered with, whether it is trusted data, etc. The specific implementation process can refer to the specific description of the embodiment of the system shown in FIG. 2, which will not be repeated here. .

进一步可选的,所述第一网络节点从所述第二区块链获取所述第一数据的第一散列值;所述第一网络节点从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;所述第一网络节点将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则所述第一网络节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则所述第一网络节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。Further optionally, the first network node obtains the first hash value of the first data from the second blockchain; the first network node obtains the first hash value from the first blockchain. data, and calculate a second hash value of the first data; the first network node compares the first hash value with the second hash value; if the first hash value If the value is the same as the second hash value, the first network node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that the first data is The first hash value is a trusted hash value; or, if the first hash value is different from the second hash value, the first network node determines that the first data is untrusted data or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value.

在本申请实施例中,设备节点可以将一个或者多个关于数据信息的交易信息发送至第一网络节点进行存储,并且在第一网络节点分别生成了关于第一数据的区块链和关于第一数据的第一散列值的区块链,实现了通过区块链来分别存储数据和散列值,即使由数据所生成的第一区块链的全部数据都被篡改的情况下,能够通过第二区块链的散列值对第一区块链中的数据进行验证,因此这样提高了数据的防篡改能力。In this embodiment of the present application, the device node may send one or more transaction information about the data information to the first network node for storage, and the first network node generates a block chain about the first data and a block chain about the first data respectively at the first network node. A block chain of the first hash value of the data realizes that the data and the hash value are stored separately through the block chain. Even if all the data of the first block chain generated by the data is tampered with, it can be The data in the first blockchain is verified through the hash value of the second blockchain, thus improving the tamper-proof capability of the data.

请参见图7,为本申请实施例提供了另一种数据处理方法的流程示意图。如图7所示,本申请实施例中涉及第一网络节点、其他第一网络节点、设备节点和其他设备节点。可以参考图2所示的网络架构,所述数据处理方法是由以上节点共同完成的,其中,所述设备节点在执行步骤501至步骤514的过程中,所述设备节点为与所述第一网络节点建立通信连接的多个设备节点中的任意一个。具体的执行过程请参见以下详细介绍。Please refer to FIG. 7 , which is a schematic flowchart of another data processing method provided in this embodiment of the present application. As shown in FIG. 7 , the embodiment of the present application involves a first network node, other first network nodes, device nodes, and other device nodes. Referring to the network architecture shown in FIG. 2, the data processing method is jointly completed by the above nodes, wherein, in the process of executing steps 501 to 514 on the device node, the device node is the same as the first node. Any one of a plurality of device nodes to which a network node establishes a communication connection. For the specific execution process, please refer to the following detailed introduction.

501,设备节点根据一个或者多个数据信息,生成至少一个第二交易信息。501. The device node generates at least one second transaction information according to one or more pieces of data information.

其中,所述第二交易信息包括数据项对应的信息,例如第一数据。可选的所述第二交易信息还可以包括至少一项对应的信息:数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。其中,若包含数据的散列值项,则该项对应的信息为所述设备节点对第一数据计算的第一散列值。其中时间信息项可以是指第一数据的生成时间或者该第二交易信息的生成时间,本申请实施例对此不做限定。在本申请实施例中设备节点生成的第二交易信息用C1表示,以加以区分。Wherein, the second transaction information includes information corresponding to the data item, such as first data. Optionally, the second transaction information may further include at least one item of corresponding information: data index value item, data hash value item, time information item, data sender item and data receiver item. Wherein, if the hash value item of the data is included, the information corresponding to the item is the first hash value calculated by the device node for the first data. The time information item may refer to the generation time of the first data or the generation time of the second transaction information, which is not limited in this embodiment of the present application. In the embodiment of the present application, the second transaction information generated by the device node is denoted by C1 to distinguish it.

502,所述设备节点将所述至少一个第二交易信息发送至第一网络节点和其他设备节点。502. The device node sends the at least one second transaction information to the first network node and other device nodes.

相应的,所述第一网络节点接收所述至少一个第二交易信息C1。其他设备节点接收所述至少一个第二交易信息C1。其中,所述其他设备节点以及所述设备节点均与所述第一网络节点建立了通信连接,且各个设备节点之间也可以相互通信。Correspondingly, the first network node receives the at least one second transaction information C1. The other device nodes receive the at least one second transaction information C1. Wherein, the other device nodes and the device nodes have established communication connections with the first network node, and each device node can also communicate with each other.

503,所述其他设备节点向所述设备节点和所述第一网络节点发送至少一个第二交易信息C2。503. The other device node sends at least one second transaction information C2 to the device node and the first network node.

相应的,所述设备节点接收其他设备节点发送的至少一个第二交易信息C2。Correspondingly, the device node receives at least one second transaction information C2 sent by other device nodes.

所述第一网络节点接收其他设备节点发送的至少一个第二交易信息C2。The first network node receives at least one second transaction information C2 sent by other device nodes.

其中,具体地该步骤503,可以是其他设备节点广播第二交易信息C2,由此所述设备节点收到所述第二交易信息C2,第一网络节点收到所述第二交易信息C2。由此,针对所述设备节点侧,所述设备节点接收其他设备节点发送的至少一个第二交易信息C2。Specifically, in step 503, other device nodes may broadcast the second transaction information C2, whereby the device node receives the second transaction information C2, and the first network node receives the second transaction information C2. Therefore, for the device node side, the device node receives at least one second transaction information C2 sent by other device nodes.

其中,设备节点可以接收其他设备节点发送的第二交易信息,其他设备发送的第二交易信息用C2表示。所述第二交易信息所包含的内容可以参考步骤501中第二交易信息所包含内容的详细介绍,在此不再赘述。The device node can receive the second transaction information sent by other device nodes, and the second transaction information sent by other devices is represented by C2. For the content included in the second transaction information, reference may be made to the detailed introduction of the content included in the second transaction information in step 501, which is not repeated here.

504,所述设备节点根据至少一个一个第二交易信息,生成第二区块链L2的区块。或者,所述设备节点、其他设备节点和第一网络节点,基于算法,根据第二交易信息,生成第一区块链L2。504. The device node generates a block of the second blockchain L2 according to the at least one second transaction information. Alternatively, the device node, other device nodes and the first network node generate the first blockchain L2 based on the second transaction information based on an algorithm.

关于“所述设备节点根据至少一个第二交易信息,生成第二区块链L2的区块。”的说明:在本实施例中,是以所述设备节点来生成第二区块链区块为例。实际上,可以是其他设备节点(例如设备节点B)或者第一网络节点根据第二交易信息生成第二区块链的区块。同理,其他所述设备节点(例如网络节点B)或者第一网络节点将生成的第二区块链区块广播给其他所述设备节点(除了网络节点B以外的其他网络节点,所述设备节点)。因此例如一种情况下,所述设备节点生成区块,另外一种情况下是其他设备节点生成区块或者第一网络节点生成区块。所述设备节点,其他设备节点和第一网络节点可根据某个算法来确定谁生成第i个区块(i为大于等于1的自然数)。总之,根据上述步骤,所述设备节点、其他设备节点和第一网络节点形成了第二区块链L2。因此,所述设备节点、其他设备节点和第一网络节点,基于算法,根据至少一个第二交易信息C1和/或至少一个第一交易信息C2,生成第一区块链L2。Explanation on "The device node generates a block of the second blockchain L2 according to at least one second transaction information.": In this embodiment, the device node is used to generate the second blockchain block For example. In fact, other device nodes (eg, device node B) or the first network node may generate blocks of the second blockchain according to the second transaction information. Similarly, other said device nodes (eg network node B) or the first network node broadcasts the generated second blockchain block to other said device nodes (other network nodes except network node B, said device node). Therefore, for example, in one case, the device node generates blocks, and in another case, other device nodes generate blocks or the first network node generates blocks. The device node, other device nodes and the first network node may determine who generates the ith block (i is a natural number greater than or equal to 1) according to a certain algorithm. In conclusion, according to the above steps, the device node, other device nodes and the first network node form a second blockchain L2. Therefore, the device node, other device nodes and the first network node, based on an algorithm, generate a first blockchain L2 according to at least one second transaction information C1 and/or at least one first transaction information C2.

后续可选步骤:完成“生成第二区块链L2的区块”之后,所述设备节点将生成的第一区块链区块广播给其他设备节点和第一网络节点。Subsequent optional steps: After completing "generating the block of the second blockchain L2", the device node broadcasts the generated first blockchain block to other device nodes and the first network node.

其中,具体的生成第二区块链L2的执行过程可以参考图4所示实施例中步骤216的详细描述,在此不再赘述。For the specific execution process of generating the second blockchain L2, reference may be made to the detailed description of step 216 in the embodiment shown in FIG. 4 , which will not be repeated here.

505,所述第一网络节点根据至少一个第二交易信息确定包含的至少一个第一数据。505. The first network node determines at least one piece of included first data according to at least one piece of second transaction information.

步骤502和/或步骤503之后,第一网络节点就可以执行步骤505。After step 502 and/or step 503, the first network node may execute step 505.

506,所述第一网络节点计算第一数据的第一散列值。506. The first network node calculates a first hash value of the first data.

507,所述第一网络节点根据所述第一散列值生成第一交易信息B1。507. The first network node generates first transaction information B1 according to the first hash value.

508,所述第一网络节点向其他第一网络节点发送生成的至少一个第一交易信息B1。508. The first network node sends the generated at least one first transaction information B1 to other first network nodes.

509,所述第一网络节点还可以接收其他第一网络节点发送的至少一个第二交易信息B2。509. The first network node may also receive at least one second transaction information B2 sent by other first network nodes.

510,所述第一网络节点和其他第一网络节点,基于算法,根据至少一个第一交易信息B1和/或至少一个第二交易信息B2,生成第二区块链L4的区块。510. The first network node and other first network nodes, based on an algorithm, generate blocks of the second blockchain L4 according to at least one first transaction information B1 and/or at least one second transaction information B2.

在本实施例中,是以第一网络节点来生成第一区块链区块为例。实际上,可以是其他网络节点(例如网络节点B)根据第一交易信息B1和第二交易信息B2生成第一区块链的区块。同理,其他第一网络节点(例如网络节点B)将生成的第一区块链区块广播给其他第一网络节点(除了网络节点B以外的其他网络节点,第一网络节点)。例如,一种情况下是第一网络节点生成区块,另一种情况下是其他网络节点生成区块。第一网络节点和其他网络节点可根据某个算法来确定谁生成第i个区块(i为大于等于1的自然数)。总之,根据上述步骤,第而网络节点与其他网络节点形成了第一区块链L4。In this embodiment, the generation of the first blockchain block by the first network node is taken as an example. In fact, other network nodes (eg, network node B) may generate blocks of the first blockchain according to the first transaction information B1 and the second transaction information B2. Similarly, other first network nodes (eg, network node B) broadcast the generated first blockchain block to other first network nodes (other network nodes other than network node B, first network node). For example, in one case, the first network node generates blocks, and in the other case, other network nodes generate blocks. The first network node and other network nodes may determine who generates the ith block (i is a natural number greater than or equal to 1) according to a certain algorithm. In conclusion, according to the above steps, the first network node and other network nodes form the first blockchain L4.

“生成区块”之后的可选步骤:可选地,第一网络节点将生成的第一区块链区块广播给其他网络节点。Optional step after "generate block": Optionally, the first network node broadcasts the generated first blockchain block to other network nodes.

其中,步骤505至步骤510与图6所示实施例中步骤404至步骤409的内容相同,具体可以参考图6所示实施例的具体介绍,在此不再赘述。The contents of steps 505 to 510 are the same as those of steps 404 to 409 in the embodiment shown in FIG. 6 . For details, reference may be made to the specific introduction of the embodiment shown in FIG. 6 , which will not be repeated here.

511,在所述第一网络节点生成区块链之后,向所述设备节点发送第一通知消息。511. After the first network node generates the blockchain, send a first notification message to the device node.

相应的,所述设备节点接收所述第一网络节点发送的第一通知消息。Correspondingly, the device node receives the first notification message sent by the first network node.

512,所述设备节点向所述第一网络设备发送所述第二删除消息。512. The device node sends the second delete message to the first network device.

其中,所述第二删除消息为所述至少一个设备节点用于请求删除区块。Wherein, the second deletion message is used by the at least one device node to request to delete a block.

513,所述第一网络节点删除待删除区块。513. The first network node deletes the block to be deleted.

其中,所述第一网络节点在生成第一区块连L2或第二区块链L4之后,可确定出待删除区块,并将待删除区块删除。其中,所述第一网络节点可以按照预设删除规则,从目标区块链中确定待删除区块。对于第一网络节点而言,所述目标区块链为第一区块链L2或第二区块链L4。所述预设删除规则可以包括但不限定于所述第一网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。在将待删除区块删除之后,所述第一网络节点或第一网络节点可以记录所述待删除区块的区块头内容。Wherein, after generating the first block chain L2 or the second block chain L4, the first network node may determine the block to be deleted, and delete the block to be deleted. Wherein, the first network node may determine the block to be deleted from the target blockchain according to a preset deletion rule. For the first network node, the target blockchain is the first blockchain L2 or the second blockchain L4. The preset deletion rules may include, but are not limited to, the number of blocks stored in the target blockchain by the first network node is greater than a preset threshold, or the blocks to be deleted are those whose generation time and duration exceed the time threshold. block, or the block to be deleted is a block whose block serial number is less than the serial number threshold. After deleting the block to be deleted, the first network node or the first network node may record the content of the block header of the block to be deleted.

进一步可选的,所述第一网络节点可以将所生成的区块链的区块包含的多个交易信息发送至上一级网络节点。可选的,所述第一网络节点或第二网络节点在确定待删除区块之后,可以将待删除区块所包含的至少一个交易信息发送至上一级网络节点。可选的,在上一级网络节点中可以记录所述至少一个交易信息的原存储位置信息。Further optionally, the first network node may send a plurality of transaction information contained in the blocks of the generated blockchain to the upper-level network node. Optionally, after determining the block to be deleted, the first network node or the second network node may send at least one transaction information included in the block to be deleted to the upper-level network node. Optionally, the original storage location information of the at least one transaction information may be recorded in the upper-level network node.

可选的,所述第一网络节点还可以在接收到所述第二删除消息之后,执行步骤513。Optionally, the first network node may also perform step 513 after receiving the second delete message.

514,所述第一网络节点向所述设备节点发送第一删除消息。514. The first network node sends a first delete message to the device node.

其中,所述第一删除消息为用于指示所述设备节点删除区块的指示消息。可选的方案中,所述第一网络节点可以在第一删除消息中指明所要删除的区块,可选的所要删除的区块可以为步骤513中所述第一网络节点删除的待删除区块。又一可选的方案中,所述第一网络节点也可以不指明删除的区块,由设备节点自行确定所要删除的区块,这样所述第一删除消息的作用为通知设备节点执行删除数据消息即可。The first deletion message is an instruction message for instructing the device node to delete a block. In an optional solution, the first network node may indicate the block to be deleted in the first deletion message, and the optional block to be deleted may be the area to be deleted deleted by the first network node in step 513. piece. In another optional solution, the first network node may not specify the block to be deleted, and the device node can determine the block to be deleted by itself, so that the function of the first deletion message is to notify the device node to delete the data. message.

515,所述设备节点将删除区块。515, the device node will delete the block.

可选的,所述设备节点可以在未执行步骤512和接收步骤514中的第一删除消息的情况下,执行步骤删除第一区块链L2中的区块。具体可以按照预设删除规则,从第一区块链L2中确定待删除区块。其中,所述预设删除规则可以包括但不限定于所述第一网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。Optionally, the device node may execute the step to delete the block in the first blockchain L2 without executing the step 512 and receiving the first deletion message in the step 514 . Specifically, the block to be deleted may be determined from the first blockchain L2 according to the preset deletion rule. Wherein, the preset deletion rule may include, but is not limited to, the number of blocks stored in the target blockchain by the first network node is greater than a preset threshold, or the block to be deleted is the generation time duration exceeding the time period A block with a threshold value, or the block to be deleted is a block with a block sequence number smaller than the sequence number threshold value.

可选的,所述设备节点可以在接收到步骤514中的第一删除消息之后执行步骤515。若所述第一删除消息携带了待删除的区块,则所述设备节点将所携带的区块进行删除即可;若所述第一删除消息中未携带待删除的区块,则所述设备节点可以按照第一种可选的方案,确定所要删除的区块。Optionally, the device node may perform step 515 after receiving the first delete message in step 514 . If the first deletion message carries the block to be deleted, the device node may delete the carried block; if the first deletion message does not carry the block to be deleted, the The device node may determine the block to be deleted according to the first optional solution.

进一步可选的,在删除区块链中的区块之后,所述设备节点可以记录所述待删除区块的区块头内容。所述设备节点可以将待删除区块所包含的至少一个交易信息发送至上一级节点。可选的,在上一级节点中可以记录所述至少一个交易信息的原存储位置信息。在本申请实施例中,上一级节点可以为第一网络节点,还可以为其他节点,本申请实施例对此不作限定。Further optionally, after deleting the block in the blockchain, the device node may record the block header content of the block to be deleted. The device node may send at least one transaction information contained in the block to be deleted to the upper-level node. Optionally, the original storage location information of the at least one transaction information may be recorded in the upper-level node. In this embodiment of the present application, the upper-level node may be the first network node, or may be another node, which is not limited in this embodiment of the present application.

通过执行步骤515删除区块链中的区块,能够减小设备节点的存储压力。By executing step 515 to delete the block in the blockchain, the storage pressure of the device node can be reduced.

进一步的,所述第一网络节点或所述设备节点可以将第一数据发送给中心节点,所述第一网络节点可以将第一数据的散列值发送给中心节点,以使中心节点计算所述第一数据的第二散列值,并将第二散列值和第一散列值进行比对,以检验第一数据是否被篡改,是否为可信数据等,具体的实现过程可以参考图2所示系统的实施例的具体描述,在此不再赘述。Further, the first network node or the device node can send the first data to the central node, and the first network node can send the hash value of the first data to the central node, so that the central node can calculate all the data. Describe the second hash value of the first data, and compare the second hash value with the first hash value to check whether the first data has been tampered with, whether it is trusted data, etc. The specific implementation process can refer to The specific description of the embodiment of the system shown in FIG. 2 will not be repeated here.

进一步可选的,所述设备节点从所述第二区块链获取所述第一数据的第一散列值;所述设备节点从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;所述设备节点将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则所述设备节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则所述设备节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。Further optionally, the device node obtains the first hash value of the first data from the second blockchain; the device node obtains the first data from the first blockchain, and Calculate the second hash value of the first data; the device node compares the first hash value with the second hash value; if the first hash value and the second hash value If the hash values are the same, the device node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that the first hash value of the first data is trusted or, if the first hash value is different from the second hash value, the device node determines that the first data is untrusted data; or, determines that the first data has been tampered; or, it is determined that the first hash value of the first data is an untrusted hash value.

进一步可选的,所述第一网络节点从所述第二区块链获取所述第一数据的第一散列值;所述第一网络节点从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;所述第一网络节点将所述第一散列值与所述第二散列值进行比对;若所述第一散列值与所述第二散列值相同,则所述第一网络节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,若所述第一散列值与所述第二散列值不相同,则所述第一网络节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。Further optionally, the first network node obtains the first hash value of the first data from the second blockchain; the first network node obtains the first hash value from the first blockchain. data, and calculate a second hash value of the first data; the first network node compares the first hash value with the second hash value; if the first hash value If the value is the same as the second hash value, the first network node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that the first data is The first hash value is a trusted hash value; or, if the first hash value is different from the second hash value, the first network node determines that the first data is untrusted data or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value.

在本申请实施例中,设备节点可以将一个或者多个关于数据信息的交易信息发送至第一网络节点进行存储,并能够与第一网络节点共同生成关于第一数据的区块链,另外,在第一网络节点生成了关于第一数据的第一散列值的区块链,实现了通过区块链来分别存储数据和散列值,即使由数据所生成的第一区块链的全部数据都被篡改的情况下,能够通过第二区块链的散列值对第一区块链中的数据进行验证,因此这样提高了数据的防篡改能力。In this embodiment of the present application, the device node can send one or more transaction information about the data information to the first network node for storage, and can jointly generate a blockchain about the first data with the first network node. In addition, A block chain about the first hash value of the first data is generated at the first network node, so that the data and the hash value are stored separately through the block chain, even if all the first block chain generated by the data is used. In the case that all data has been tampered with, the data in the first blockchain can be verified through the hash value of the second blockchain, thus improving the tamper-proof capability of the data.

图8为本申请实施例提供了一种中心节点的模块化示意图。本申请实施例中的中心节点可以是图3所示任一方法实施例描述的中心节点。因此,图3所示方法实施例中重复内容,本实施例可能不再赘述。FIG. 8 provides a modular schematic diagram of a central node according to an embodiment of the present application. The central node in this embodiment of the present application may be the central node described in any of the method embodiments shown in FIG. 3 . Therefore, content is repeated in the method embodiment shown in FIG. 3 , and details may not be repeated in this embodiment.

如图8所示,本申请实施例的中心节点1可以包括:获取模块11、计算模块12、比对模块13和确定模块14。可选的,所述中心节点1还包括生成模块15。As shown in FIG. 8 , the central node 1 in this embodiment of the present application may include: an acquisition module 11 , a calculation module 12 , a comparison module 13 , and a determination module 14 . Optionally, the central node 1 further includes a generating module 15 .

获取模块11,用于从第一网络节点获取第一数据的第一散列值;an obtaining module 11, configured to obtain the first hash value of the first data from the first network node;

计算模块12,用于从第二网络节点获取所述第一数据,并计算所述第一数据的第二散列值;a calculation module 12, configured to obtain the first data from the second network node, and calculate a second hash value of the first data;

比对模块13,用于将所述获取模块11获取的所述第一散列值与所述计算模块12计算的所述第二散列值进行比对;A comparison module 13, configured to compare the first hash value obtained by the obtaining module 11 with the second hash value calculated by the calculation module 12;

确定模块14,用于若所述比对模块13确定所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值。A determination module 14, configured to determine that the first data is trusted data if the comparison module 13 determines that the first hash value is the same as the second hash value; or, determine the first data The data has not been tampered with; or, it is determined that the first hash value of the first data is a trusted hash value.

可选的,所述确定模块14,还用于若所述比对模块13确定所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。Optionally, the determining module 14 is further configured to determine that the first data is untrusted data if the comparison module 13 determines that the first hash value is different from the second hash value or, it is determined that the first data has been tampered with; or, it is determined that the first hash value of the first data is an untrusted hash value.

可选的,所述获取模块11具体用于:从第一网络节点的第二区块链中获取第一数据对应的第一散列值;其中,所述第二区块链为由包含数据的散列值项的交易信息生成的区块组成的。Optionally, the obtaining module 11 is specifically configured to: obtain the first hash value corresponding to the first data from the second blockchain of the first network node; wherein, the second blockchain is composed of data containing data The hash value of the item's transaction information is composed of blocks generated.

可选的,所述计算模块12具体用于:从第二网络节点的第一区块链中的所述第一数据,其中,所述第一区块链为由包含数据项的交易信息生成的区块组成的。Optionally, the computing module 12 is specifically configured to: obtain the first data from the first blockchain of the second network node, wherein the first blockchain is generated from transaction information including data items of blocks.

可选的,所述获取模块11,还用于从第一网络节点获取所述第一数据的以下至少一项关联信息:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。Optionally, the obtaining module 11 is further configured to obtain from the first network node at least one of the following associated information of the first data: the index value of the first data, the time information of the first data, The identification of the device node sending the first data, the address for sending the first data, and the address for receiving the first data.

可选的,所述获取模块11,还用于从第二网络节点获取所述第一数据的第一散列值的以下至少一项关联信息:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。Optionally, the obtaining module 11 is further configured to obtain from the second network node at least one of the following associated information of the first hash value of the first data: the index value of the first data, the first hash value of the first data Time information of a piece of data, an identifier of a device node that sends the first data, an address for sending the first data, and an address for receiving the first data.

可选的,所述确定模块14,还用于选择一个第一网络节点确定为目标第一网络节点;Optionally, the determining module 14 is further configured to select a first network node and determine it as the target first network node;

所述获取模块11具体用于从目标第一网络节点的第二区块链中获取第一数据的第一散列值。The obtaining module 11 is specifically configured to obtain the first hash value of the first data from the second blockchain of the target first network node.

可选的,在选择一个第一网络节点确定为目标第一网络节点方面,所述确定模块14具体用于从至少一个第一网络节点中选择一个满足第一合法条件的第一网络节点为目标第一网络节点;Optionally, in terms of selecting a first network node and determining it as a target first network node, the determining module 14 is specifically configured to select a first network node that satisfies the first legal condition from at least one first network node as a target. a first network node;

所述第一合法条件为:与所述目标第一网络节点的第二区块链的第一数据的第一散列值相同的节点数量超过第一阈值。The first legal condition is that the number of nodes that are the same as the first hash value of the first data of the second blockchain of the target first network node exceeds a first threshold.

可选的,所述确定模块14,还用于选择一个第二网络节点确定为目标第二网络节点。Optionally, the determining module 14 is further configured to select a second network node and determine it as the target second network node.

所述获取模块11具体用于从所述目标第二网络节点的第一区块链中获取第一数据。The obtaining module 11 is specifically configured to obtain the first data from the first blockchain of the target second network node.

可选的,在选择一个第二网络节点确定为目标第二网络节点方面,所述确定模块具体用于从至少一个第二网络节点中选择一个满足第二合法条件的网络节点为第二目标网络节点;Optionally, in terms of selecting a second network node and determining it as the target second network node, the determining module is specifically configured to select a network node that satisfies the second legal condition from the at least one second network node as the second target network. node;

所述第二合法条件为:与所述目标第二网络节点的第一区块链的第一数据相同的网络节点的数量超过第二阈值。The second legal condition is that the number of network nodes that are identical to the first data of the first blockchain of the target second network node exceeds a second threshold.

可选的,还包括:生成模块15,用于若确定所述第一数据是可信数据,则确定第三区块链的第i个交易信息满足生成条件,生成第三区块链的第i个交易信息;或者Optionally, it also includes: a generating module 15, configured to determine that the i-th transaction information of the third blockchain satisfies the generation condition if it is determined that the first data is trusted data, and generate the i-th transaction information of the third blockchain. i transaction information; or

所述生成模块15,还用于若确定所述第一数据是不可信数据,则确定所述第三区块链的第i个交易信息不满足所述生成条件,不生成所述第三区块链的第i个交易信息;或者The generation module 15 is further configured to determine that the i-th transaction information of the third blockchain does not meet the generation condition if it is determined that the first data is untrusted data, and the third area is not generated. The i-th transaction information of the blockchain; or

所述生成模块15,还用于若确定所述第一数据是不可信数据,则确定所述第三区块链的第j个交易信息满足生成条件,生成所述第三区块链的第j个交易信息。The generation module 15 is further configured to, if it is determined that the first data is untrusted data, determine that the jth transaction information of the third blockchain satisfies the generation condition, and generate the jth transaction information of the third blockchain. j transaction information.

图8所示实施例中的中心节点可以以图9所示的中心节点实现。如图9所示,为本申请实施例提供了一种中心节点的结构示意图,图9所示的中心节点1000包括:处理器1001和收发器1004。其中,处理器1001和收发器1004相连,如通过总线1002相连。可选的,所述中心节点1000还可以包括存储器1003。需要说明的是,实际应用中收发器1004为至少一个,该中心节点1000的结构并不构成对本申请实施例的限定。The central node in the embodiment shown in FIG. 8 may be implemented by the central node shown in FIG. 9 . As shown in FIG. 9 , an embodiment of the present application provides a schematic structural diagram of a central node. The central node 1000 shown in FIG. 9 includes a processor 1001 and a transceiver 1004 . The processor 1001 is connected to the transceiver 1004, for example, through a bus 1002. Optionally, the central node 1000 may further include a memory 1003 . It should be noted that, in practical applications, the number of transceivers 1004 is at least one, and the structure of the central node 1000 does not constitute a limitation to the embodiments of the present application.

其中,处理器1001应用于本申请实施例中,用于实现图8所示的计算模块12、比对模块13、确定模块14、生成模块15的功能。收发器1004包括接收机和发射机,可选的方案中,收发器1004应用于本申请实施例中,用于实现图8所示的获取模块11的功能。The processor 1001 is used in the embodiment of the present application to implement the functions of the calculation module 12 , the comparison module 13 , the determination module 14 , and the generation module 15 shown in FIG. 8 . The transceiver 1004 includes a receiver and a transmitter. In an optional solution, the transceiver 1004 is applied in this embodiment of the present application to implement the function of the acquisition module 11 shown in FIG. 8 .

处理器1001可以是中央处理器(Central Processing Unit,CPU),通用处理器,数字信号处理(Digital Signal Processing,DSP),集成电路(Application SpecificIntegrated Circuit,ASIC),现场可编程逻辑门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器1001也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。The processor 1001 may be a central processing unit (Central Processing Unit, CPU), a general-purpose processor, a digital signal processing (Digital Signal Processing, DSP), an integrated circuit (Application Specific Integrated Circuit, ASIC), a field programmable logic gate array (Field- Programmable Gate Array, FPGA) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. It may implement or execute the various exemplary logical blocks, modules and circuits described in connection with this disclosure. The processor 1001 may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and the like.

总线1002可包括一通路,在上述组件之间传送信息。总线1002可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(ExtendedIndustry Standard Architecture,EISA)总线等。总线1002可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 1002 may include a path to communicate information between the aforementioned components. The bus 1002 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus or the like. The bus 1002 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.

存储器1003可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(CompactDisc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。Memory 1003 may be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types of storage devices that can store information and instructions The dynamic storage device can also be an Electrically Erasable Programmable Read-Only Memory (EEPROM), a CompactDisc Read-Only Memory (CD-ROM) or other optical disk storage, optical disk storage ( including compact discs, laser discs, compact discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being stored by a computer any other medium taken, but not limited to this.

可选的,存储器1003用于存储执行本申请方案的应用程序代码,并由处理器1001来控制执行。处理器1001用于执行存储器1003中存储的应用程序代码,以实现图3所示任一实施例提供的中心节点的动作。Optionally, the memory 1003 is used to store the application code for executing the solution of the present application, and the execution is controlled by the processor 1001 . The processor 1001 is configured to execute the application program code stored in the memory 1003, so as to realize the action of the central node provided by any one of the embodiments shown in FIG. 3 .

在本申请实施例中还提供了一种计算机存储介质,用于储存为上述中心节点所用的计算机软件指令,其包含用于执行上述方面为中心节点所设计的程序。Embodiments of the present application also provide a computer storage medium for storing computer software instructions used by the central node, including a program designed for the central node to execute the above aspects.

图10为本申请实施例提供了一种网络节点的模块化示意图。本申请实施例中的网络节点可以是图3-图7所示任一方法实施例描述的网络节点。因此,图3-图7所示任一方法实施例中重复内容,本实施例可能不再赘述。FIG. 10 provides a modular schematic diagram of a network node according to an embodiment of the present application. The network node in this embodiment of the present application may be the network node described in any of the method embodiments shown in FIG. 3 to FIG. 7 . Therefore, content is repeated in any of the method embodiments shown in FIG. 3 to FIG. 7 , which may not be repeated in this embodiment.

如图10所示,本申请实施例的网络节点2可以包括:区块生成单元2001。可选的,所述网络节点2还可以包括第一信息接收模块2002、信息生成模块2003、第一信息发送模块2004、区块发送模块2005、第二信息接收模块2006、通知消息接收模块2007、删除消息接收模块2008、删除区块确定模块2009、删除消息发送模块2010、删除模块2011和记录模块2012中至少一个模块。As shown in FIG. 10 , the network node 2 in this embodiment of the present application may include: a block generating unit 2001 . Optionally, the network node 2 may further include a first information receiving module 2002, an information generating module 2003, a first information sending module 2004, a block sending module 2005, a second information receiving module 2006, a notification message receiving module 2007, At least one of the deletion message receiving module 2008 , the deletion block determination module 2009 , the deletion message sending module 2010 , the deletion module 2011 and the recording module 2012 is deleted.

区块生成模块2001,用于根据至少一个第一交易信息,生成区块链的区块。所述第一交易信息包括以下至少一项对应的信息:数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。The block generation module 2001 is configured to generate a block of the blockchain according to at least one first transaction information. The first transaction information includes information corresponding to at least one of the following items: data items, data index value items, data hash value items, time information items, data sender items, and data receiver items.

可选的,还包括:Optionally, also include:

第一信息接收模块2002,用于接收至少一个设备节点发送的数据信息;a first information receiving module 2002, configured to receive data information sent by at least one device node;

信息生成模块2003,用于根据所述第一信息接收模块2002接收到的所述数据信息生成至少一个第一交易信息。The information generating module 2003 is configured to generate at least one first transaction information according to the data information received by the first information receiving module 2002 .

可选的,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址。Optionally, the data information includes at least one of the following: first data, a first hash value of the first data, an index value of the first data, time information of the first data, the sending The identification of the device node of the data information, the address of the device node and the address of the network node.

可选的,还包括:计算模块,用于若所述数据信息包括所述第一数据且未包括所述第一散列值,则计算所述第一数据的第一散列值;所述信息生成模块2003具体用于根据所述数据信息和所述第一散列值生成至少一个第一交易信息。Optionally, it further includes: a calculation module, configured to calculate a first hash value of the first data if the data information includes the first data and does not include the first hash value; the The information generating module 2003 is specifically configured to generate at least one first transaction information according to the data information and the first hash value.

可选的,还包括:Optionally, also include:

第一信息发送模块2004,用于向其他网络节点或至少一个设备节点发送所述信息生成模块2003生成的至少一个第一交易信息。The first information sending module 2004 is configured to send at least one first transaction information generated by the information generating module 2003 to other network nodes or at least one device node.

可选的,还包括:第二信息接收模块2006,用于接收其他网络节点或者至少一个设备节点发送的至少一个第二交易信息;其中,所述第二交易信息包括以下至少一项对应的信息:数据项、数据的索引值项、数据的散列值项、时间信息项、所述数据的发送方项和所述数据的接收方项。Optionally, it also includes: a second information receiving module 2006, configured to receive at least one second transaction information sent by other network nodes or at least one device node; wherein the second transaction information includes information corresponding to at least one of the following items : a data item, an index value item of the data, a hash value item of the data, a time information item, a sender item of the data, and a receiver item of the data.

可选的,所述区块生成模块2001,还用于若所述信息生成模块2003生成的至少一个第一交易信息包含数据项,则根据所述至少一个第一交易信息,基于第一算法,生成第一区块链的区块。Optionally, the block generation module 2001 is further configured to, if the at least one first transaction information generated by the information generation module 2003 includes a data item, then according to the at least one first transaction information, based on the first algorithm, Generate the blocks of the first blockchain.

可选的,所述区块生成模块2001,还用于若所述信息生成模块2003生成的至少一个第一交易信息包含数据项,且所述第二信息接收模块2006接收到的所述至少一个第二交易信息包含数据项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第二算法,生成第一区块链的区块。Optionally, the block generation module 2001 is further configured to, if at least one first transaction information generated by the information generation module 2003 includes a data item, and the at least one transaction information received by the second information receiving module 2006 The second transaction information includes data items, and according to the at least one first transaction information and/or the at least one second transaction information, based on the second algorithm, a block of the first blockchain is generated.

可选的,还包括:Optionally, also include:

所述区块生成模块,还用于若所述信息生成模块2003生成的至少一个第一交易信息包含数据的散列值项,则根据所述至少一个第一交易信息,基于第三算法,生成第二区块链的区块。The block generation module is further configured to, if the at least one first transaction information generated by the information generation module 2003 includes a hash value item of the data, then according to the at least one first transaction information, and based on the third algorithm, generate: Blocks of the second blockchain.

可选的,还包括:Optionally, also include:

所述区块生成模块,还用于若所述信息生成模块2003生成的至少一个第一交易信息包含数据的散列值项,且所述第二信息接收模块2006接收到的至少一个第二交易信息包含数据的散列值项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第四算法,生成第二区块链的区块。The block generation module is further configured to, if at least one first transaction information generated by the information generation module 2003 includes a hash value item of data, and at least one second transaction received by the second information receiving module 2006 If the information includes a hash value item of the data, then according to the at least one first transaction information and/or the at least one second transaction information, based on the fourth algorithm, a block of the second blockchain is generated.

可选的,所述区块生成模块,还用于若所述信息生成模块2003生成的至少一个第一交易信息包含数据项,则根据所述至少一个第一交易信息,基于第五算法,生成第一区块链的区块;和,若所述信息生成模块2003生成的至少一个第一交易信息包含数据的散列值项,且所述第二信息接收模块2006接收到的至少一个第二交易信息包含数据的散列值项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第六算法,生成第二区块链的区块;Optionally, the block generation module is further configured to, if the at least one first transaction information generated by the information generation module 2003 includes a data item, then according to the at least one first transaction information, based on the fifth algorithm, generate A block of the first blockchain; and, if at least one first transaction information generated by the information generating module 2003 contains a hash value item of data, and at least one second information received by the second information receiving module 2006 If the transaction information includes a hash value item of the data, then according to the at least one first transaction information and/or the at least one second transaction information, and based on the sixth algorithm, a block of the second blockchain is generated;

或者,or,

所述区块生成模块,还用于若所述信息生成模块2003生成的至少一个第一交易信息包含数据项,且所述第二信息接收模块2006接收到的至少一个第二交易信息包含数据项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第七算法,生成第一区块链的区块;和,所述信息生成模块2003生成的至少一个第一交易信息包含数据的散列值项,则根据所述至少一个第一交易信息,基于第八算法,生成第二区块链的区块。The block generation module is further configured to, if at least one first transaction information generated by the information generation module 2003 includes a data item, and at least one second transaction information received by the second information receiving module 2006 includes a data item , then according to the at least one first transaction information and/or the at least one second transaction information, based on the seventh algorithm, the block of the first blockchain is generated; and, the at least one block generated by the information generation module 2003 If the first transaction information includes the hash value item of the data, then according to the at least one first transaction information and based on the eighth algorithm, a block of the second blockchain is generated.

若生成第一区块链且未生成第二区块链的,则所述网络节点2还包括:If the first blockchain is generated and the second blockchain is not generated, the network node 2 further includes:

第一获取模块,用于获取第一数据的第一散列值;a first obtaining module, for obtaining the first hash value of the first data;

所述第一获取模块,还用于从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;The first obtaining module is further configured to obtain the first data from the first blockchain, and calculate a second hash value of the first data;

第一比对模块,用于将所述第一散列值与所述第二散列值进行比对;a first comparison module, configured to compare the first hash value with the second hash value;

第一确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,a first determination module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or , determining that the first hash value of the first data is a trusted hash value; or,

所述第一确定模块,还用于若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。The first determining module is further configured to determine that the first data is untrusted data if the first hash value is different from the second hash value; or, determine that the first data has been tampered; or, it is determined that the first hash value of the first data is an untrusted hash value.

若未生成第一区块链且生成第二区块链的,则所述网络节点2还包括:If the first blockchain is not generated and the second blockchain is generated, the network node 2 further includes:

第二获取模块,用于从所述第二区块链获取所述第一数据的第一散列值;a second obtaining module, configured to obtain the first hash value of the first data from the second blockchain;

所述第二获取模块,还用于获取存储的所述第一数据,并计算所述第一数据的第二散列值;The second obtaining module is further configured to obtain the stored first data and calculate the second hash value of the first data;

第二比对模块,用于将所述第一散列值与所述第二散列值进行比对;a second comparison module, configured to compare the first hash value with the second hash value;

第二确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,A second determining module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or , determining that the first hash value of the first data is a trusted hash value; or,

所述第二确定模块,还用于若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。The second determining module is further configured to determine that the first data is untrusted data if the first hash value is different from the second hash value; or, determine that the first data has been tampered; or, it is determined that the first hash value of the first data is an untrusted hash value.

若既生成第一区块链且又生成第二区块链的,则所述网络节点2还包括:If both the first blockchain and the second blockchain are generated, the network node 2 further includes:

第三获取模块,用于从所述第二区块链获取所述第一数据的第一散列值;a third obtaining module, configured to obtain the first hash value of the first data from the second blockchain;

所述第三获取模块,还用于从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;The third obtaining module is further configured to obtain the first data from the first blockchain, and calculate a second hash value of the first data;

第三比对模块,用于将所述第一散列值与所述第二散列值进行比对;a third comparison module, configured to compare the first hash value with the second hash value;

第三确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,a third determining module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or , determining that the first hash value of the first data is a trusted hash value; or,

所述第三确定模块,还用于若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。The third determining module is further configured to determine that the first data is untrusted data if the first hash value is different from the second hash value; or, determine that the first data has been tampered; or, it is determined that the first hash value of the first data is an untrusted hash value.

可选的,还包括:区块发送模块2005,用于向中心节点发送所述数据信息或者区块链的区块。Optionally, it further includes: a block sending module 2005, configured to send the data information or the block of the block chain to the central node.

可选的,还包括:通知消息发送模块2007,用于向所述至少一个设备节点发送第一通知消息,所述第一通知消息用于通知设备节点已生成区块链的区块的消息。Optionally, the method further includes: a notification message sending module 2007, configured to send a first notification message to the at least one device node, where the first notification message is used to notify the device node that a message of a block of the blockchain has been generated.

可选的,还包括:删除消息发送模块2010,用于向设备节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。Optionally, it also includes: a deletion message sending module 2010, configured to send a first deletion message to the device node, where the first deletion message is an instruction message for instructing the device node to delete the data information or delete the block .

可选的,还包括:删除消息接收模块2008,还用于接收所述至少一个设备节点发送的第二删除消息,所述第二删除消息为所述至少一个设备节点用于请求删除所述数据信息或者删除区块。Optionally, it further includes: a deletion message receiving module 2008, further configured to receive a second deletion message sent by the at least one device node, where the second deletion message is used by the at least one device node to request deletion of the data information or delete blocks.

可选的,删除区块确定模块2009,用于从目标区块链中确定待删除区块,所述目标区块链为所述网络节点所存储的任意一个区块链。Optionally, the deletion block determination module 2009 is configured to determine the block to be deleted from the target blockchain, where the target blockchain is any blockchain stored by the network node.

可选的,第二信息发送模块2013,还用于将所述区块链的区块包含的多个交易信息发送至上一级网络节点。Optionally, the second information sending module 2013 is further configured to send a plurality of transaction information contained in the blocks of the blockchain to an upper-level network node.

可选的,还包括:删除模块2011,用于将所述目标区块链中的所述待删除区块进行删除。Optionally, the method further includes: a deletion module 2011, configured to delete the block to be deleted in the target blockchain.

可选的,所述删除模块2011,具体用于按照预设删除规则,从目标区块链中确定待删除区块;其中,所述预设删除规则为:所述网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。Optionally, the deletion module 2011 is specifically configured to determine the block to be deleted from the target blockchain according to a preset deletion rule; wherein, the preset deletion rule is: the network node stores the target area The number of blocks in the blockchain is greater than a preset threshold, or the block to be deleted is a block whose generation time duration exceeds the time threshold, or the block to be deleted is a block whose block serial number is less than the serial number threshold.

可选的,记录模块2012,用于记录所述待删除区块的区块头内容。Optionally, the recording module 2012 is configured to record the block header content of the block to be deleted.

图10所示实施例中的网络节点可以以图11所示的网络节点实现。如图11所示,为本申请实施例提供了一种网络节点的结构示意图,图11所示的网络节点4000包括:处理器4001和收发器4004。The network node in the embodiment shown in FIG. 10 may be implemented as the network node shown in FIG. 11 . As shown in FIG. 11 , an embodiment of the present application provides a schematic structural diagram of a network node. The network node 4000 shown in FIG. 11 includes a processor 4001 and a transceiver 4004 .

其中,处理器4001和收发器4004相连,如通过总线4002相连。可选的,所述网络节点4000还可以包括存储器4003。The processor 4001 is connected to the transceiver 4004, for example, through the bus 4002. Optionally, the network node 4000 may further include a memory 4003 .

需要说明的是,实际应用中收发器4004为至少一个,该网络节点4000的结构并不构成对本申请实施例的限定。It should be noted that, in practical applications, there is at least one transceiver 4004, and the structure of the network node 4000 does not constitute a limitation to the embodiments of the present application.

其中,处理器4001应用于本申请实施例中,用于实现图10所示的区块生成单元2001、信息生成模块2003、删除区块确定模块2009、删除模块2011和记录模块2012的功能。收发器4004包括接收机和发射机,收发器4004用于本申请实施例中,用于实现图10所示的第一信息接收模块2002、第一信息发送模块2004、区块发送模块2005、第二信息接收模块2006、通知消息接收模块2007、删除消息接收模块2008、删除消息发送模块2010的功能。The processor 4001 is used in the embodiment of the present application to realize the functions of the block generation unit 2001, the information generation module 2003, the deletion block determination module 2009, the deletion module 2011 and the recording module 2012 shown in FIG. 10 . The transceiver 4004 includes a receiver and a transmitter. The transceiver 4004 is used in this embodiment of the present application to implement the first information receiving module 2002, the first information sending module 2004, the block sending module 2005, the 2. The information receiving module 2006, the notification message receiving module 2007, the deletion message receiving module 2008, and the functions of the deletion message sending module 2010.

处理器4001可以是CPU,通用处理器,DSP,ASIC,FPGA或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器4001也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。The processor 4001 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component or any combination thereof. It may implement or execute the various exemplary logical blocks, modules and circuits described in connection with this disclosure. The processor 4001 may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and the like.

总线4002可包括一通路,在上述组件之间传送信息。总线4002可以是PCI总线或EISA总线等。总线4002可以分为地址总线、数据总线、控制总线等。为便于表示,图11中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 4002 may include a path to transfer information between the components described above. The bus 4002 may be a PCI bus, an EISA bus, or the like. The bus 4002 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 11, but it does not mean that there is only one bus or one type of bus.

存储器4003可以是ROM或可存储静态信息和指令的其他类型的静态存储设备,RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是电EEPROM、CD-ROM或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。The memory 4003 can be ROM or other types of static storage devices that can store static information and instructions, RAM or other types of dynamic storage devices that can store information and instructions, or electrical EEPROM, CD-ROM or other optical disk storage, optical disks. storage (including compact discs, laser discs, compact discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being accessed by Any other medium accessed by the computer, but not limited to this.

可选的,存储器4003用于存储执行本申请方案的应用程序代码,并由处理器4001来控制执行。处理器4001用于执行存储器4003中存储的应用程序代码,以实现图3至图7所示任一实施例中网络节点的动作。Optionally, the memory 4003 is used to store the application code for executing the solution of the present application, and the execution is controlled by the processor 4001 . The processor 4001 is configured to execute the application program code stored in the memory 4003, so as to realize the action of the network node in any of the embodiments shown in FIG. 3 to FIG. 7 .

在本申请实施例中还提供了一种计算机存储介质,用于储存为上述网络节点所用的计算机软件指令,其包含用于执行上述方面为网络节点所设计的程序。Embodiments of the present application also provide a computer storage medium for storing computer software instructions used by the network node, including a program designed for the network node to execute the above aspect.

图12为本申请实施例提供了一种设备节点的模块化示意图。本申请实施例中的设备节点可以是图3-图7所示任一方法实施例描述的设备节点。因此,图3-图7所示任一方法实施例中重复内容,本实施例可能不再赘述。FIG. 12 provides a modular schematic diagram of a device node according to an embodiment of the present application. The device node in this embodiment of the present application may be the device node described in any of the method embodiments shown in FIG. 3 to FIG. 7 . Therefore, content is repeated in any of the method embodiments shown in FIG. 3 to FIG. 7 , which may not be repeated in this embodiment.

如图12所示,本申请实施例的设备节点3可以包括:发送模块30。可选的,所述设备节点3还可以包括第一接收模块31、第二接收模块32、第三接收模块33和删除模块34。As shown in FIG. 12 , the device node 3 in this embodiment of the present application may include: a sending module 30 . Optionally, the device node 3 may further include a first receiving module 31 , a second receiving module 32 , a third receiving module 33 and a deleting module 34 .

发送模块30,用于向网络节点发送一个或者多个数据信息,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址;所述数据信息用于所述网络节点生成第一交易信息;The sending module 30 is configured to send one or more data information to the network node, where the data information includes at least one of the following: first data, a first hash value of the first data, and an index of the first data value, the time information of the first data, the identity of the device node sending the data information, the address of the device node and the address of the network node; the data information is used by the network node to generate the first transaction information;

可选的,还包括:第一接收模块31,用于接收网络节点发送的区块链第一通知消息,所述第一通知消息用于通知所述网络节点已经根据所述数据信息生成区块链的区块的消息。Optionally, it further includes: a first receiving module 31, configured to receive a first notification message of the blockchain sent by a network node, where the first notification message is used to notify the network node that a block has been generated according to the data information The message of the block of the chain.

可选的,还包括:第二接收模块32,用于接收网络节点发送的区块。Optionally, the method further includes: a second receiving module 32, configured to receive the block sent by the network node.

可选的,还包括:第三接收模块33,用于接收到所述网络节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。Optionally, it also includes: a third receiving module 33, configured to receive a first deletion message sent by the network node, where the first deletion message is used to instruct the device node to delete the data information or delete a block instruction message.

可选的,所述发送模块30,还用于向所述网络节点发送的第二删除消息,所述第二删除消息用于请求删除所述数据信息或者删除区块。Optionally, the sending module 30 is further configured to send a second deletion message to the network node, where the second deletion message is used to request deletion of the data information or deletion of a block.

可选的,还包括:删除模块34,用于删除所述数据信息。Optionally, the method further includes: a deletion module 34, configured to delete the data information.

可选的,所述删除模块34具体用于将生成时长超过第一时间阈值的数据信息进行删除。Optionally, the deletion module 34 is specifically configured to delete the data information whose generation duration exceeds the first time threshold.

图13为本申请实施例提供了另一种设备节点的模块化示意图。本申请实施例中的设备节点可以是图3-图7所示任一方法实施例描述的设备节点。因此,图3-图7所示任一方法实施例中重复内容,本实施例可能不再赘述。FIG. 13 provides a modular schematic diagram of another device node according to an embodiment of the present application. The device node in this embodiment of the present application may be the device node described in any of the method embodiments shown in FIG. 3 to FIG. 7 . Therefore, content is repeated in any of the method embodiments shown in FIG. 3 to FIG. 7 , which may not be repeated in this embodiment.

如图13所示,本申请实施例的设备节点3可以包括:生成模块35。可选的,所述设备节点3还可以包括发送模块36、第二接收模块37、第三接收模块38和删除模块39。As shown in FIG. 13 , the device node 3 in this embodiment of the present application may include: a generating module 35 . Optionally, the device node 3 may further include a sending module 36 , a second receiving module 37 , a third receiving module 38 and a deleting module 39 .

生成模块35,用于根据一个或者多个数据信息,生成至少一个第二交易信息,并将所述至少一个第二交易信息发送至网络节点;所述第二交易信息包括以下至少一项对应的信息:数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项。The generating module 35 is configured to generate at least one second transaction information according to one or more data information, and send the at least one second transaction information to the network node; the second transaction information includes at least one corresponding to the following: Information: data item, data index value item, data hash value item, time information item, data sender item, and data receiver item.

可选的,还包括:第二接收模块37,用于接收网络节点发送的区块。Optionally, it further includes: a second receiving module 37, configured to receive the block sent by the network node.

可选的,还包括:第三接收模块38,用于接收到所述网络节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。Optionally, it also includes: a third receiving module 38, configured to receive a first deletion message sent by the network node, where the first deletion message is used to instruct the device node to delete the data information or delete a block instruction message.

可选的,还包括:发送模块36,还用于向所述网络节点发送的第二删除消息,所述第二删除消息用于请求删除所述数据信息或者删除区块。Optionally, the method further includes: a sending module 36, further configured to send a second deletion message to the network node, where the second deletion message is used to request deletion of the data information or deletion of blocks.

可选的,还包括:删除模块39,用于删除所述数据信息。Optionally, the method further includes: a deletion module 39, configured to delete the data information.

可选的,所述删除模块39具体用于将生成时长超过第一时间阈值的数据信息进行删除。Optionally, the deletion module 39 is specifically configured to delete the data information whose generation duration exceeds the first time threshold.

图12或图13所示实施例中的设备节点可以以图14所示的设备节点实现。如图14所示,为本申请实施例提供了一种设备节点的结构示意图,图14所示的设备节点3000包括:处理器3001和收发器3004。The device node in the embodiment shown in FIG. 12 or FIG. 13 may be implemented as the device node shown in FIG. 14 . As shown in FIG. 14 , an embodiment of the present application provides a schematic structural diagram of a device node. The device node 3000 shown in FIG. 14 includes a processor 3001 and a transceiver 3004 .

其中,处理器3001和收发器3004相连,如通过总线3002相连。可选的,所述设备节点3000还可以包括存储器3003。The processor 3001 is connected to the transceiver 3004, for example, through the bus 3002. Optionally, the device node 3000 may further include a memory 3003 .

需要说明的是,实际应用中收发器3004为至少一个,该设备节点3000的结构并不构成对本申请实施例的限定。收发器1004包括接收机和发射机。It should be noted that, in practical applications, there is at least one transceiver 3004, and the structure of the device node 3000 does not constitute a limitation on the embodiments of the present application. Transceiver 1004 includes a receiver and a transmitter.

一种方案中,处理器1001应用于本申请实施例中,用于实现图12所示的删除模块34的功能。收发器1004应用于本申请实施例中,用于实现图12所示的发送模块30、第一接收模块31、第二接收模块32、第三接收模块33的功能。In one solution, the processor 1001 is applied in this embodiment of the present application to implement the function of the deletion module 34 shown in FIG. 12 . The transceiver 1004 is applied in this embodiment of the present application, and is used to implement the functions of the sending module 30 , the first receiving module 31 , the second receiving module 32 , and the third receiving module 33 shown in FIG. 12 .

另一种方案中,处理器1001应用于本申请实施例中,用于实现图13所示的生成模块35、删除模块39的功能。收发器1004应用于本申请实施例中,用于实现图13所示的发送模块36、第二接收模块37、第三接收模块38的功能。In another solution, the processor 1001 is applied in the embodiment of the present application to implement the functions of the generation module 35 and the deletion module 39 shown in FIG. 13 . The transceiver 1004 is applied in this embodiment of the present application, and is used to implement the functions of the sending module 36 , the second receiving module 37 , and the third receiving module 38 shown in FIG. 13 .

处理器3001可以是CPU,通用处理器,DSP,ASIC,FPGA或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本申请公开内容所描述的各种示例性的逻辑方框,模块和电路。处理器3001也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。The processor 3001 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component or any combination thereof. It may implement or execute the various exemplary logical blocks, modules and circuits described in connection with this disclosure. The processor 3001 may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and the like.

总线3002可包括一通路,在上述组件之间传送信息。总线3002可以是PCI总线或EISA总线等。总线3002可以分为地址总线、数据总线、控制总线等。为便于表示,图14中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 3002 may include a path to transfer information between the components described above. The bus 3002 may be a PCI bus, an EISA bus, or the like. The bus 3002 can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is shown in FIG. 14, but it does not mean that there is only one bus or one type of bus.

存储器3003可以是ROM或可存储静态信息和指令的其他类型的静态存储设备,RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是电EEPROM、CD-ROM或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。The memory 3003 can be ROM or other types of static storage devices that can store static information and instructions, RAM or other types of dynamic storage devices that can store information and instructions, or electrical EEPROM, CD-ROM or other optical disk storage, optical disks. storage (including compact discs, laser discs, compact discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being accessed by Any other medium accessed by the computer, but not limited to this.

可选的,存储器3003用于存储执行本申请方案的应用程序代码,并由处理器3001来控制执行。处理器3001用于执行存储器3003中存储的应用程序代码,以实现图3至图7所示任一实施例中设备节点的动作。Optionally, the memory 3003 is used to store the application code for executing the solution of the present application, and the execution is controlled by the processor 3001 . The processor 3001 is configured to execute the application program code stored in the memory 3003, so as to realize the action of the device node in any of the embodiments shown in FIG. 3 to FIG. 7 .

在本申请实施例中还提供了一种计算机存储介质,用于储存为上述设备节点所用的计算机软件指令,其包含用于执行上述方面为设备节点所设计的程序。Embodiments of the present application also provide a computer storage medium for storing computer software instructions used for the above-mentioned device node, including a program designed for the device node to execute the above-mentioned aspects.

尽管在此结合各实施例对本申请进行了描述,然而,在实施所要求保护的本申请过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。Although the application is described herein in conjunction with the various embodiments, those skilled in the art will understand and understand from a review of the drawings, the disclosure, and the appended claims in practicing the claimed application. Other variations of the disclosed embodiments are implemented. In the claims, the word "comprising" does not exclude other components or steps, and "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that these measures cannot be combined to advantage.

本领域技术人员应明白,本申请的实施例可提供为方法、装置(设备)、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。计算机程序存储/分布在合适的介质中,与其它硬件一起提供或作为硬件的一部分,也可以采用其他分布形式,如通过Internet或其它有线或无线电信系统。It should be understood by those skilled in the art that the embodiments of the present application may be provided as a method, an apparatus (apparatus), or a computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. The computer program is stored/distributed in a suitable medium, provided with or as part of other hardware, or may take other forms of distribution, such as over the Internet or other wired or wireless telecommunication systems.

本申请是参照本申请实施例的方法、装置(设备)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to the flowcharts and/or block diagrams of the methods, apparatuses (devices) and computer program products of the embodiments of the present application. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.

尽管结合具体特征及其实施例对本申请进行了描述,显而易见的,在不脱离本申请的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本申请的示例性说明,且视为已覆盖本申请范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Although the application has been described in conjunction with specific features and embodiments thereof, it will be apparent that various modifications and combinations can be made therein without departing from the spirit and scope of the application. Accordingly, this specification and drawings are merely exemplary illustrations of the application as defined by the appended claims, and are deemed to cover any and all modifications, variations, combinations or equivalents within the scope of this application. Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the spirit and scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.

Claims (82)

1.一种数据处理方法,其特征在于,包括:1. a data processing method, is characterized in that, comprises: 中心节点从第一网络节点获取第一数据的第一散列值;the central node obtains the first hash value of the first data from the first network node; 所述中心节点从第二网络节点获取所述第一数据,并计算所述第一数据的第二散列值;The central node obtains the first data from the second network node, and calculates a second hash value of the first data; 所述中心节点将所述第一散列值与所述第二散列值进行比对;the central node compares the first hash value with the second hash value; 若所述第一散列值与所述第二散列值相同,则所述中心节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;If the first hash value is the same as the second hash value, the central node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that all the first hash value of the first data is a trusted hash value; 其中,所述第一数据的第一散列值存储于所述第一网络节点的第二区块链中;所述第一数据存储于所述第二网络节点的第一区块链中;Wherein, the first hash value of the first data is stored in the second blockchain of the first network node; the first data is stored in the first blockchain of the second network node; 所述中心节点、所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备;或者,所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备,所述中心节点为所述第一网络节点或者所述第二网络节点中的任一个;或者,所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备,所述中心节点为第三方设备;或者,所述中心节点、所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备。The central node, the first network node, and the second network node are physically separated devices with communication or storage functions; or, the first network node and the second network node are physically separated A device with a communication or storage function, the central node is either the first network node or the second network node; or, the first network node and the second network node are the same A device with a communication or storage function, and the central node is a third-party device; or, the central node, the first network node, and the second network node are the same device with a communication or storage function. 2.根据权利要求1所述的方法,其特征在于,还包括:2. The method of claim 1, further comprising: 若所述第一散列值与所述第二散列值不相同,则所述中心节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。If the first hash value is different from the second hash value, the central node determines that the first data is untrusted data; or, determines that the first data has been tampered with; or, determines The first hash value of the first data is an untrusted hash value. 3.根据权利要求1或2所述的方法,其特征在于,所述中心节点从第一网络节点获取第一数据的第一散列值,包括:3. The method according to claim 1 or 2, wherein the central node obtains the first hash value of the first data from the first network node, comprising: 所述中心节点从第一网络节点的第二区块链中获取第一数据对应的第一散列值;其中,所述第二区块链为由包含数据的散列值项的交易信息生成的区块组成的。The central node obtains the first hash value corresponding to the first data from the second block chain of the first network node; wherein, the second block chain is generated from transaction information including the hash value item of the data of blocks. 4.根据权利要求1或2所述的方法,其特征在于,所述中心节点从第二网络节点获取所述第一数据,包括:4. The method according to claim 1 or 2, wherein the central node obtains the first data from a second network node, comprising: 所述中心节点从第二网络节点的第一区块链中获取所述第一数据,其中,所述第一区块链为由包含数据项的交易信息生成的区块组成的。The central node obtains the first data from a first block chain of the second network node, wherein the first block chain is composed of blocks generated from transaction information including data items. 5.根据权利要求1或2所述的方法,其特征在于,还包括:5. The method according to claim 1 or 2, characterized in that, further comprising: 所述中心节点从第一网络节点获取所述第一数据的第一散列值关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。The central node obtains the first hash value association information of the first data from the first network node, and the association information includes at least one of the following: the index value of the first data, the time of the first data information, the device node identifier that sends the first data, the address for sending the first data, and the address for receiving the first data. 6.根据权利要求1或2所述的方法,其特征在于,还包括:6. The method according to claim 1 or 2, further comprising: 所述中心节点从第二网络节点获取所述第一数据的关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。The central node acquires association information of the first data from the second network node, and the association information includes at least one of the following: an index value of the first data, time information of the first data, sending the The device node identification of the first data, the address for sending the first data, and the address for receiving the first data. 7.根据权利要求1或2所述的方法,其特征在于,所述中心节点从第一网络节点获取第一数据的第一散列值之前,还包括:7. The method according to claim 1 or 2, wherein before the central node acquires the first hash value of the first data from the first network node, the method further comprises: 所述中心节点选择一个第一网络节点确定为目标第一网络节点;The central node selects a first network node and determines it as the target first network node; 所述中心节点从第一网络节点获取第一数据的第一散列值,包括:The central node obtains the first hash value of the first data from the first network node, including: 所述中心节点从目标第一网络节点的第二区块链中获取第一数据的第一散列值。The central node obtains the first hash value of the first data from the second blockchain of the target first network node. 8.根据权利要求7所述的方法,其特征在于,所述中心节点选择一个第一网络节点确定为目标第一网络节点,包括:8. The method according to claim 7, wherein the central node selects a first network node and determines it as the target first network node, comprising: 所述中心节点从至少一个第一网络节点中选择一个满足第一合法条件的第一网络节点为目标第一网络节点;The central node selects a first network node that satisfies the first legal condition from the at least one first network node as the target first network node; 所述第一合法条件为:与所述目标第一网络节点的第二区块链的第一数据的第一散列值相同的节点数量超过第一阈值。The first legal condition is that the number of nodes that are the same as the first hash value of the first data of the second blockchain of the target first network node exceeds a first threshold. 9.根据权利要求1或2所述的方法,其特征在于,所述中心节点从第二网络节点获取所述第一数据之前,还包括:9. The method according to claim 1 or 2, wherein before the central node acquires the first data from the second network node, the method further comprises: 所述中心节点选择一个第二网络节点确定为目标第二网络节点;The central node selects a second network node and determines it as the target second network node; 所述中心节点从第二网络节点获取所述第一数据,包括:The central node obtains the first data from the second network node, including: 所述中心节点从所述目标第二网络节点的第一区块链中获取第一数据。The central node obtains the first data from the first blockchain of the target second network node. 10.根据权利要求9所述的方法,其特征在于,所述中心节点选择一个第二网络节点确定为目标第二网络节点,包括:10. The method according to claim 9, wherein the central node selects a second network node and determines it as the target second network node, comprising: 所述中心节点从至少一个第二网络节点中选择一个满足第二合法条件的网络节点为第二目标网络节点;The central node selects a network node that satisfies the second legal condition from the at least one second network node as the second target network node; 所述第二合法条件为:与所述目标第二网络节点的第一区块链的第一数据相同的网络节点的数量超过第二阈值。The second legal condition is that the number of network nodes that are identical to the first data of the first blockchain of the target second network node exceeds a second threshold. 11.根据权利要求1、2、8中任一项所述的方法,其特征在于,还包括:11. The method according to any one of claims 1, 2, and 8, further comprising: 若确定所述第一数据是可信数据,则所述中心节点确定第三区块链的第i个交易信息满足生成条件,生成第三区块链的第i个交易信息;或者If it is determined that the first data is trusted data, the central node determines that the i-th transaction information of the third blockchain meets the generation conditions, and generates the i-th transaction information of the third blockchain; or 若确定所述第一数据是不可信数据,则所述中心节点确定所述第三区块链的第i个交易信息不满足所述生成条件,不生成所述第三区块链的第i个交易信息;或者If it is determined that the first data is untrusted data, the central node determines that the i-th transaction information of the third blockchain does not meet the generation condition, and does not generate the i-th transaction information of the third blockchain. transaction information; or 若确定所述第一数据是不可信数据,则所述中心节点确定所述第三区块链的第j个交易信息满足生成条件,生成所述第三区块链的第j个交易信息。If it is determined that the first data is untrusted data, the central node determines that the jth transaction information of the third blockchain satisfies the generation condition, and generates the jth transaction information of the third blockchain. 12.一种数据处理方法,其特征在于,包括:12. A data processing method, comprising: 网络节点根据至少一个第一交易信息,生成区块链的区块;The network node generates a block of the blockchain according to the at least one first transaction information; 所述第一交易信息包括以下至少一项对应的信息:交易标识项、生成所述第一交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项;数据信息包括第一数据和所述第一数据的第一散列值;The first transaction information includes information corresponding to at least one of the following items: a transaction identification item, a node identification item that generates the first transaction information, a data item, an index value item of the data, a hash value item of the data, and a time information item , the sender item of the data and the receiver item of the data; the data information includes the first data and the first hash value of the first data; 其中,所述第一数据的第一散列值存储于第一网络节点的第二区块链中;所述第一数据存储于第二网络节点的第一区块链中;中心节点、所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备;或者,所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备,所述中心节点为所述第一网络节点或者所述第二网络节点中的任一个;或者,所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备,所述中心节点为第三方设备;或者,所述中心节点、所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备。Wherein, the first hash value of the first data is stored in the second blockchain of the first network node; the first data is stored in the first blockchain of the second network node; the central node, the The first network node and the second network node are physically separated devices with a communication or storage function; or, the first network node and the second network node are physically separated devices with a communication or storage function equipment, the central node is either the first network node or the second network node; or, the first network node and the second network node are the same with a communication or storage function device, the central node is a third-party device; or, the central node, the first network node, and the second network node are the same device with a communication or storage function. 13.根据权利要求12所述的方法,其特征在于,所述网络节点根据至少一个第一交易信息,生成区块链的区块之前,还包括:13. The method according to claim 12, wherein before the network node generates a block of the blockchain according to at least one first transaction information, the method further comprises: 所述网络节点接收至少一个设备节点发送的数据信息;The network node receives data information sent by at least one device node; 所述网络节点根据所述数据信息生成至少一个第一交易信息。The network node generates at least one first transaction information according to the data information. 14.根据权利要求13所述的方法,其特征在于,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址。14. The method according to claim 13, wherein the data information comprises at least one of the following: first data, a first hash value of the first data, an index value of the first data, The time information of the first data, the identifier of the device node sending the data information, the address of the device node, and the address of the network node. 15.根据权利要求14所述的方法,其特征在于,还包括:15. The method of claim 14, further comprising: 若所述数据信息包括所述第一数据且未包括所述第一散列值,则所述网络节点计算所述第一数据的第一散列值;If the data information includes the first data and does not include the first hash value, the network node calculates a first hash value of the first data; 所述网络节点根据所述数据信息生成至少一个第一交易信息,包括:The network node generates at least one first transaction information according to the data information, including: 所述网络节点根据所述数据信息和所述第一散列值生成至少一个第一交易信息。The network node generates at least one first transaction information according to the data information and the first hash value. 16.根据权利要求13-15任一项所述的方法,其特征在于,还包括:16. The method of any one of claims 13-15, further comprising: 所述网络节点向其他网络节点或至少一个设备节点发送所述至少一个第一交易信息。The network node sends the at least one first transaction information to other network nodes or at least one device node. 17.根据权利要求12-15任一项所述的方法,其特征在于,还包括:17. The method of any one of claims 12-15, further comprising: 所述网络节点接收其他网络节点或者至少一个设备节点发送的至少一个第二交易信息;The network node receives at least one second transaction information sent by other network nodes or at least one device node; 其中,所述第二交易信息包括以下至少一项对应的信息:交易标识项、生成所述第二交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、所述数据的发送方项和所述数据的接收方项。The second transaction information includes information corresponding to at least one of the following items: transaction identification item, node identification item that generates the second transaction information, data item, data index value item, data hash value item, time An item of information, a sender item of the data, and a receiver item of the data. 18.根据权利要求12-15任一项所述的方法,其特征在于,还包括:18. The method according to any one of claims 12-15, further comprising: 若所述至少一个第一交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息,基于第一算法,生成第一区块链的区块。If the at least one first transaction information includes a data item, the network node generates a block of the first blockchain based on the at least one first transaction information and a first algorithm. 19.根据权利要求17所述的方法,其特征在于,还包括:19. The method of claim 17, further comprising: 若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第二算法,生成第一区块链的区块。If the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, the network node according to the at least one first transaction information and/or the at least one second transaction information, based on the second algorithm, to generate blocks of the first blockchain. 20.根据权利要求12-15任一项所述的方法,其特征在于,还包括:20. The method of any one of claims 12-15, further comprising: 若所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,基于第三算法,生成第二区块链的区块。If the at least one first transaction information includes a hash value item of the data, the network node generates a block of the second blockchain based on the at least one first transaction information and a third algorithm. 21.根据权利要求17所述的方法,其特征在于,还包括:21. The method of claim 17, further comprising: 若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第四算法,生成第二区块链的区块。If the at least one first transaction information includes a hash value item of the data, and the at least one second transaction information includes a hash value item of the data, the network node according to the at least one first transaction information and/or Or the at least one second transaction information, based on the fourth algorithm, generates a block of the second blockchain. 22.根据权利要求17所述的方法,其特征在于,22. The method of claim 17, wherein: 若所述至少一个第一交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息,基于第五算法,生成第一区块链的区块;和,若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第六算法,生成第二区块链的区块;If the at least one first transaction information includes a data item, the network node generates a block of the first blockchain based on the fifth algorithm according to the at least one first transaction information; and, if the at least one first transaction information The first transaction information includes the hash value item of the data, and the at least one second transaction information includes the hash value item of the data, then the network node according to the at least one first transaction information and/or the at least one The second transaction information, based on the sixth algorithm, generates blocks of the second blockchain; 或者,or, 若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则所述网络节点根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第七算法,生成第一区块链的区块;和,所述至少一个第一交易信息包含数据的散列值项,则所述网络节点根据所述至少一个第一交易信息,基于第八算法,生成第二区块链的区块。If the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, the network node according to the at least one first transaction information and/or the at least one second transaction information, based on the seventh algorithm, generate a block of the first blockchain; and, if the at least one first transaction information contains a hash value item of data, then the network node, according to the at least one first transaction information, Based on the eighth algorithm, a block of the second blockchain is generated. 23.根据权利要求19或22所述的方法,其特征在于,还包括:23. The method of claim 19 or 22, further comprising: 所述网络节点获取第一数据的第一散列值;obtaining, by the network node, a first hash value of the first data; 所述网络节点从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;the network node obtains the first data from the first blockchain, and calculates a second hash value of the first data; 所述网络节点将所述第一散列值与所述第二散列值进行比对;the network node compares the first hash value with the second hash value; 若所述第一散列值与所述第二散列值相同,则所述网络节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,If the first hash value is the same as the second hash value, the network node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that all the first hash value of the first data is a trusted hash value; or, 若所述第一散列值与所述第二散列值不相同,则所述网络节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。If the first hash value is different from the second hash value, the network node determines that the first data is untrusted data; or, determines that the first data has been tampered with; or, determines The first hash value of the first data is an untrusted hash value. 24.根据权利要求21或22所述的方法,其特征在于,还包括:24. The method of claim 21 or 22, further comprising: 所述网络节点从所述第二区块链获取所述第一数据的第一散列值;the network node obtains the first hash value of the first data from the second blockchain; 所述网络节点获取存储的所述第一数据,并计算所述第一数据的第二散列值;obtaining, by the network node, the stored first data, and calculating a second hash value of the first data; 所述网络节点将所述第一散列值与所述第二散列值进行比对;the network node compares the first hash value with the second hash value; 若所述第一散列值与所述第二散列值相同,则所述网络节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,If the first hash value is the same as the second hash value, the network node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that all the first hash value of the first data is a trusted hash value; or, 若所述第一散列值与所述第二散列值不相同,则所述网络节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。If the first hash value is different from the second hash value, the network node determines that the first data is untrusted data; or, determines that the first data has been tampered with; or, determines The first hash value of the first data is an untrusted hash value. 25.根据权利要求22所述的方法,其特征在于,还包括:25. The method of claim 22, further comprising: 所述网络节点从所述第二区块链获取所述第一数据的第一散列值;the network node obtains the first hash value of the first data from the second blockchain; 所述网络节点从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;the network node obtains the first data from the first blockchain, and calculates a second hash value of the first data; 所述网络节点将所述第一散列值与所述第二散列值进行比对;the network node compares the first hash value with the second hash value; 若所述第一散列值与所述第二散列值相同,则所述网络节点确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,If the first hash value is the same as the second hash value, the network node determines that the first data is trusted data; or determines that the first data has not been tampered with; or determines that all the first hash value of the first data is a trusted hash value; or, 若所述第一散列值与所述第二散列值不相同,则所述网络节点确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。If the first hash value is different from the second hash value, the network node determines that the first data is untrusted data; or, determines that the first data has been tampered with; or, determines The first hash value of the first data is an untrusted hash value. 26.根据权利要求13、14、15、19、21、22、25中任一项所述的方法,其特征在于,还包括:26. The method according to any one of claims 13, 14, 15, 19, 21, 22, and 25, further comprising: 所述网络节点向中心节点发送所述数据信息或者区块链的区块。The network node sends the data information or the block of the blockchain to the central node. 27.根据权利要求12、13、14、15、19、21、22、25中任一项所述的方法,其特征在于,所述网络节点根据至少一个第一交易信息,生成区块链的区块之后,还包括:27. The method according to any one of claims 12, 13, 14, 15, 19, 21, 22, and 25, wherein the network node generates a block chain according to at least one first transaction information. After the block, it also includes: 所述网络节点向所述至少一个设备节点发送第一通知消息,所述第一通知消息用于通知设备节点已生成区块链的区块的消息。The network node sends a first notification message to the at least one device node, where the first notification message is used to notify the device node that a block of the blockchain has been generated. 28.根据权利要求13、14、15、19、21、22、25中任一项所述的方法,其特征在于,还包括:28. The method according to any one of claims 13, 14, 15, 19, 21, 22, and 25, further comprising: 所述网络节点向设备节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。The network node sends a first delete message to the device node, where the first delete message is an instruction message for instructing the device node to delete the data information or delete the block. 29.根据权利要求13、14、15、19、21、22、25中任一项所述的方法,其特征在于,还包括:29. The method according to any one of claims 13, 14, 15, 19, 21, 22, and 25, further comprising: 所述网络节点接收所述至少一个设备节点发送的第二删除消息,所述第二删除消息为所述至少一个设备节点用于请求删除所述数据信息或者删除区块。The network node receives a second deletion message sent by the at least one device node, where the second deletion message is used by the at least one device node to request deletion of the data information or deletion of a block. 30.根据权利要求12、13、14、15、19、21、22、25中任一项所述的方法,其特征在于,还包括:30. The method according to any one of claims 12, 13, 14, 15, 19, 21, 22, and 25, further comprising: 所述网络节点从目标区块链中确定待删除区块,所述目标区块链为所述网络节点所存储的任意一个区块链。The network node determines the block to be deleted from the target blockchain, and the target blockchain is any blockchain stored by the network node. 31.根据权利要求27所述的方法,其特征在于,还包括:31. The method of claim 27, further comprising: 所述网络节点将所述区块链的区块包含的多个交易信息发送至上一级网络节点。The network node sends a plurality of transaction information contained in the block of the blockchain to the upper-level network node. 32.根据权利要求30所述的方法,其特征在于,还包括:32. The method of claim 30, further comprising: 所述网络节点将所述目标区块链中的所述待删除区块进行删除。The network node deletes the block to be deleted in the target blockchain. 33.根据权利要求30所述的方法,其特征在于,还包括:33. The method of claim 30, further comprising: 所述网络节点记录所述待删除区块的区块头内容。The network node records the block header content of the block to be deleted. 34.根据权利要求30所述的方法,其特征在于,所述网络节点从目标区块链中确定待删除区块,包括:34. The method according to claim 30, wherein the network node determines the block to be deleted from the target blockchain, comprising: 按照预设删除规则,从目标区块链中确定待删除区块;Determine the block to be deleted from the target blockchain according to the preset deletion rules; 其中,所述预设删除规则为:所述网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。The preset deletion rule is: the number of blocks stored in the target blockchain by the network node is greater than a preset threshold, or the block to be deleted is a block whose generation time exceeds the time threshold, or , the block to be deleted is a block whose block serial number is less than the serial number threshold. 35.一种数据处理方法,其特征在于,包括:35. A data processing method, comprising: 设备节点向网络节点发送一个或者多个数据信息,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址;所述第一数据的第一散列值存储于第一网络节点的第二区块链中;所述第一数据存储于第二网络节点的第一区块链中;所述第一网络节点将所述第一数据的散列值发送给中心节点,所述第二网络节点将所述第一数据发送至所述中心节点,以使所述中心节点计算所述第一数据的第二散列值,并将第二散列值和第一散列值进行比对,以检验所述第一数据是否被篡改,或者,检验所述第一数据是否为可信数据,或者检验所述第一数据的第一散列值是否为可信散列值;The device node sends one or more pieces of data information to the network node, where the data information includes at least one of the following: first data, a first hash value of the first data, an index value of the first data, the The time information of the first data, the identifier of the device node sending the data information, the address of the device node and the address of the network node; the first hash value of the first data is stored in the first network node's in the second blockchain; the first data is stored in the first blockchain of the second network node; the first network node sends the hash value of the first data to the central node, and the first network node sends the hash value of the first data to the central node. Two network nodes send the first data to the central node, so that the central node calculates a second hash value of the first data, and compares the second hash value with the first hash value Yes, to check whether the first data has been tampered with, or to check whether the first data is trusted data, or check whether the first hash value of the first data is a trusted hash value; 所述数据信息用于所述网络节点生成第一交易信息;The data information is used by the network node to generate the first transaction information; 或者,or, 设备节点根据一个或者多个数据信息,生成至少一个第二交易信息,并将所述至少一个第二交易信息发送至网络节点;The device node generates at least one second transaction information according to the one or more data information, and sends the at least one second transaction information to the network node; 所述第二交易信息包括以下至少一项对应的信息:数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项;The second transaction information includes information corresponding to at least one of the following items: a data item, an index value item of the data, a hash value item of the data, a time information item, a sender item of the data, and a receiver item of the data; 所述中心节点、所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备;或者,所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备,所述中心节点为所述第一网络节点或者所述第二网络节点中的任一个;或者,所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备,所述中心节点为第三方设备;或者,所述中心节点、所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备。The central node, the first network node, and the second network node are physically separated devices with communication or storage functions; or, the first network node and the second network node are physically separated A device with a communication or storage function, the central node is either the first network node or the second network node; or, the first network node and the second network node are the same A device with a communication or storage function, and the central node is a third-party device; or, the central node, the first network node, and the second network node are the same device with a communication or storage function. 36.根据权利要求35所述的方法,其特征在于,还包括:36. The method of claim 35, further comprising: 所述设备节点接收网络节点发送的区块链第一通知消息,所述第一通知消息用于通知所述网络节点已经根据所述数据信息生成区块链的区块的消息。The device node receives a first notification message of the blockchain sent by the network node, where the first notification message is used to notify the network node that a block of the blockchain has been generated according to the data information. 37.根据权利要求35或36所述的方法,其特征在于,还包括:37. The method of claim 35 or 36, further comprising: 所述设备节点接收网络节点发送的区块。The device node receives the block sent by the network node. 38.根据权利要求35或36所述的方法,其特征在于,还包括:38. The method of claim 35 or 36, further comprising: 所述设备节点接收到所述网络节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。The device node receives a first deletion message sent by the network node, where the first deletion message is an instruction message for instructing the device node to delete the data information or delete the block. 39.根据权利要求35或36所述的方法,其特征在于,还包括:39. The method of claim 35 or 36, further comprising: 所述设备节点向所述网络节点发送的第二删除消息,所述第二删除消息用于请求删除所述数据信息或者删除区块。A second deletion message sent by the device node to the network node, where the second deletion message is used to request deletion of the data information or deletion of a block. 40.根据权利要求35或36所述的方法,其特征在于,还包括:40. The method of claim 35 or 36, further comprising: 所述设备节点删除所述数据信息。The device node deletes the data information. 41.根据权利要求40所述的方法,其特征在于,所述设备节点删除数据信息,包括:41. The method according to claim 40, wherein the device node deletes data information, comprising: 所述设备节点将生成时长超过第一时间阈值的数据信息进行删除。The device node deletes the data information whose generation duration exceeds the first time threshold. 42.一种中心节点,其特征在于,包括:42. A central node, characterized in that, comprising: 获取模块,用于从第一网络节点获取第一数据的第一散列值;an acquisition module for acquiring the first hash value of the first data from the first network node; 计算模块,用于从第二网络节点获取所述第一数据,并计算所述第一数据的第二散列值;所述第一数据的第一散列值存储于所述第一网络节点的第二区块链中;所述第一数据存储于所述第二网络节点的第一区块链中;a calculation module, configured to obtain the first data from a second network node, and calculate a second hash value of the first data; the first hash value of the first data is stored in the first network node in the second blockchain of the second network node; the first data is stored in the first blockchain of the second network node; 比对模块,用于将所述第一散列值与所述第二散列值进行比对;a comparison module, configured to compare the first hash value with the second hash value; 确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;a determining module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or, determine The first hash value of the first data is a trusted hash value; 所述中心节点、所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备;或者,所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备,所述中心节点为所述第一网络节点或者所述第二网络节点中的任一个;或者,所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备,所述中心节点为第三方设备;或者,所述中心节点、所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备。The central node, the first network node, and the second network node are physically separated devices with communication or storage functions; or, the first network node and the second network node are physically separated A device with a communication or storage function, the central node is either the first network node or the second network node; or, the first network node and the second network node are the same A device with a communication or storage function, and the central node is a third-party device; or, the central node, the first network node, and the second network node are the same device with a communication or storage function. 43.根据权利要求42所述的中心节点,其特征在于,43. The central node of claim 42, wherein 所述确定模块,还用于若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。The determining module is further configured to determine that the first data is untrusted data if the first hash value is different from the second hash value; or determine that the first data has been tampered with or, determining that the first hash value of the first data is an untrusted hash value. 44.根据权利要求42或43所述的中心节点,其特征在于,所述获取模块具体用于:44. The central node according to claim 42 or 43, wherein the acquisition module is specifically used for: 从第一网络节点的第二区块链中获取第一数据对应的第一散列值;其中,所述第二区块链为由包含数据的散列值项的交易信息生成的区块组成的。Obtain the first hash value corresponding to the first data from the second blockchain of the first network node; wherein the second blockchain is composed of blocks generated from transaction information including the hash value item of the data of. 45.根据权利要求43所述的中心节点,其特征在于,所述计算模块具体用于:45. The central node according to claim 43, wherein the computing module is specifically used for: 从第二网络节点的第一区块链中的所述第一数据,其中,所述第一区块链为由包含数据项的交易信息生成的区块组成的。The first data from the first blockchain of the second network node, wherein the first blockchain is composed of blocks generated from transaction information containing data items. 46.根据权利要求42或43所述的中心节点,其特征在于,46. The central node according to claim 42 or 43, characterized in that, 所述获取模块,还用于从第一网络节点获取所述第一数据的第一散列值关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。The obtaining module is further configured to obtain first hash value associated information of the first data from the first network node, where the associated information includes at least one of the following: an index value of the first data, the first hash value of the first data Time information of a piece of data, an identifier of a device node that sends the first data, an address for sending the first data, and an address for receiving the first data. 47.根据权利要求42或43所述的中心节点,其特征在于,47. The central node according to claim 42 or 43, characterized in that, 所述获取模块,还用于从第二网络节点获取所述第一数据的关联信息,所述关联信息包括以下至少一项:所述第一数据的索引值、所述第一数据的时间信息、发送所述第一数据的设备节点标识、发送所述第一数据的地址和接收所述第一数据的地址。The obtaining module is further configured to obtain association information of the first data from the second network node, where the association information includes at least one of the following: an index value of the first data, time information of the first data , the device node identifier for sending the first data, the address for sending the first data, and the address for receiving the first data. 48.根据权利要求42或43所述的中心节点,其特征在于,48. The central node according to claim 42 or 43, characterized in that, 所述确定模块,还用于选择一个第一网络节点确定为目标第一网络节点;The determining module is further configured to select a first network node and determine it as the target first network node; 所述获取模块具体用于从目标第一网络节点的第二区块链中获取第一数据的第一散列值。The obtaining module is specifically configured to obtain the first hash value of the first data from the second blockchain of the target first network node. 49.根据权利要求48所述的中心节点,其特征在于,在选择一个第一网络节点确定为目标第一网络节点方面,所述确定模块具体用于从至少一个第一网络节点中选择一个满足第一合法条件的第一网络节点为目标第一网络节点;49. The central node according to claim 48, wherein, in terms of selecting a first network node and determining it as a target first network node, the determining module is specifically configured to select a first network node from at least one first network node that satisfies the The first network node of the first legal condition is the target first network node; 所述第一合法条件为:与所述目标第一网络节点的第二区块链的第一数据的第一散列值相同的节点数量超过第一阈值。The first legal condition is that the number of nodes that are the same as the first hash value of the first data of the second blockchain of the target first network node exceeds a first threshold. 50.根据权利要求42或43所述的中心节点,其特征在于,50. The central node according to claim 42 or 43, characterized in that, 所述确定模块,还用于选择一个第二网络节点确定为目标第二网络节点;The determining module is further configured to select a second network node and determine it as the target second network node; 所述获取模块具体用于从所述目标第二网络节点的第一区块链中获取第一数据。The obtaining module is specifically configured to obtain the first data from the first blockchain of the target second network node. 51.根据权利要求50所述的中心节点,其特征在于,在选择一个第二网络节点确定为目标第二网络节点方面,所述确定模块具体用于从至少一个第二网络节点中选择一个满足第二合法条件的网络节点为第二目标网络节点;51. The central node according to claim 50, wherein, in selecting a second network node and determining it as a target second network node, the determining module is specifically configured to select a second network node from at least one second network node that satisfies the The network node of the second legal condition is the second target network node; 所述第二合法条件为:与所述目标第二网络节点的第一区块链的第一数据相同的网络节点的数量超过第二阈值。The second legal condition is that the number of network nodes that are identical to the first data of the first blockchain of the target second network node exceeds a second threshold. 52.根据权利要求42、43、45、49、51中任一项所述的中心节点,其特征在于,还包括:52. The central node according to any one of claims 42, 43, 45, 49, and 51, characterized in that, further comprising: 生成模块,用于若确定所述第一数据是可信数据,则确定第三区块链的第i个交易信息满足生成条件,生成第三区块链的第i个交易信息;或者A generating module, configured to determine that the i-th transaction information of the third blockchain meets the generation condition if it is determined that the first data is trusted data, and generate the i-th transaction information of the third blockchain; or 所述生成模块,还用于若确定所述第一数据是不可信数据,则确定所述第三区块链的第i个交易信息不满足所述生成条件,不生成所述第三区块链的第i个交易信息;或者The generation module is further configured to determine that the i-th transaction information of the third blockchain does not meet the generation condition if it is determined that the first data is untrusted data, and not to generate the third block The i-th transaction information of the chain; or 所述生成模块,还用于若确定所述第一数据是不可信数据,则确定所述第三区块链的第j个交易信息满足生成条件,生成所述第三区块链的第j个交易信息。The generation module is further configured to, if it is determined that the first data is untrusted data, determine that the jth transaction information of the third blockchain satisfies the generation condition, and generate the jth transaction information of the third blockchain. transaction information. 53.一种网络节点,其特征在于,包括:53. A network node, characterized in that, comprising: 区块生成模块,用于根据至少一个第一交易信息,生成区块链的区块;a block generation module, configured to generate a block of the blockchain according to at least one first transaction information; 所述第一交易信息包括以下至少一项对应的信息:交易标识项、生成所述第一交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项;数据信息包括第一数据和所述第一数据的第一散列值;The first transaction information includes information corresponding to at least one of the following items: a transaction identification item, a node identification item that generates the first transaction information, a data item, an index value item of the data, a hash value item of the data, and a time information item , the sender item of the data and the receiver item of the data; the data information includes the first data and the first hash value of the first data; 其中,所述第一数据的第一散列值存储于第一网络节点的第二区块链中;所述第一数据存储于第二网络节点的第一区块链中;中心节点、所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备;或者,所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备,所述中心节点为所述第一网络节点或者所述第二网络节点中的任一个;或者,所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备,所述中心节点为第三方设备;或者,所述中心节点、所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备。Wherein, the first hash value of the first data is stored in the second blockchain of the first network node; the first data is stored in the first blockchain of the second network node; the central node, the The first network node and the second network node are physically separated devices with a communication or storage function; or, the first network node and the second network node are physically separated devices with a communication or storage function equipment, the central node is either the first network node or the second network node; or, the first network node and the second network node are the same with a communication or storage function device, the central node is a third-party device; or, the central node, the first network node, and the second network node are the same device with a communication or storage function. 54.根据权利要求53所述的网络节点,其特征在于,还包括:54. The network node of claim 53, further comprising: 第一信息接收模块,用于接收至少一个设备节点发送的数据信息;a first information receiving module, configured to receive data information sent by at least one device node; 信息生成模块,用于根据所述数据信息生成至少一个第一交易信息。an information generating module, configured to generate at least one first transaction information according to the data information. 55.根据权利要求54所述的网络节点,其特征在于,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址。55. The network node according to claim 54, wherein the data information comprises at least one of the following: first data, a first hash value of the first data, and an index value of the first data , the time information of the first data, the identifier of the device node sending the data information, the address of the device node and the address of the network node. 56.根据权利要求55所述的网络节点,其特征在于,还包括:56. The network node of claim 55, further comprising: 计算模块,用于若所述数据信息包括所述第一数据且未包括所述第一散列值,则计算所述第一数据的第一散列值;a calculation module, configured to calculate a first hash value of the first data if the data information includes the first data and does not include the first hash value; 所述信息生成模块具体用于根据所述数据信息和所述第一散列值生成至少一个第一交易信息。The information generating module is specifically configured to generate at least one first transaction information according to the data information and the first hash value. 57.根据权利要求54-56任一项所述的网络节点,其特征在于,还包括:57. The network node of any one of claims 54-56, further comprising: 第一信息发送模块,用于向其他网络节点或至少一个设备节点发送所述至少一个第一交易信息。A first information sending module, configured to send the at least one first transaction information to other network nodes or at least one device node. 58.根据权利要求53-56任一项所述的网络节点,其特征在于,还包括:58. The network node of any one of claims 53-56, further comprising: 第二信息接收模块,用于接收其他网络节点或者至少一个设备节点发送的至少一个第二交易信息;A second information receiving module, configured to receive at least one second transaction information sent by other network nodes or at least one device node; 其中,所述第二交易信息包括以下至少一项对应的信息:交易标识项、生成所述第二交易信息的节点标识项、数据项、数据的索引值项、数据的散列值项、时间信息项、所述数据的发送方项和所述数据的接收方项。The second transaction information includes information corresponding to at least one of the following items: transaction identification item, node identification item that generates the second transaction information, data item, data index value item, data hash value item, time An item of information, a sender item of the data, and a receiver item of the data. 59.根据权利要求53-56任一项所述的网络节点,其特征在于,59. The network node according to any one of claims 53-56, characterized in that, 所述区块生成模块,还用于若所述至少一个第一交易信息包含数据项,则根据所述至少一个第一交易信息,基于第一算法,生成第一区块链的区块。The block generation module is further configured to, if the at least one first transaction information includes a data item, generate a block of the first blockchain based on the at least one first transaction information and a first algorithm. 60.根据权利要求58所述的网络节点,其特征在于,60. The network node of claim 58, wherein 所述区块生成模块,还用于若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第二算法,生成第一区块链的区块。The block generation module is further configured to, if the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, according to the at least one first transaction information and/or the data item. The at least one second transaction information is generated, and based on the second algorithm, a block of the first blockchain is generated. 61.根据权利要求53-56任一项所述的网络节点,其特征在于61. A network node according to any of claims 53-56, characterized in that 所述区块生成模块,还用于若所述至少一个第一交易信息包含数据的散列值项,则根据所述至少一个第一交易信息,基于第三算法,生成第二区块链的区块。The block generation module is further configured to, if the at least one first transaction information includes a hash value item of the data, generate a second block chain according to the at least one first transaction information and based on the third algorithm. block. 62.根据权利要求58所述的网络节点,其特征在于,62. The network node of claim 58, wherein 所述区块生成模块,还用于若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第四算法,生成第二区块链的区块。The block generation module is further configured to, if the at least one first transaction information includes a hash value item of data, and the at least one second transaction information includes a hash value item of data, then according to the at least one The first transaction information and/or the at least one second transaction information, based on the fourth algorithm, generate blocks of the second blockchain. 63.根据权利要求58所述的网络节点,其特征在于,63. The network node of claim 58, wherein 所述区块生成模块,还用于若所述至少一个第一交易信息包含数据项,则根据所述至少一个第一交易信息,基于第五算法,生成第一区块链的区块;和,若所述至少一个第一交易信息包含数据的散列值项,且所述至少一个第二交易信息包含数据的散列值项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第六算法,生成第二区块链的区块;The block generation module is further configured to, if the at least one first transaction information includes a data item, generate a block of the first blockchain according to the at least one first transaction information and based on a fifth algorithm; and , if the at least one first transaction information includes a hash value item of data, and the at least one second transaction information includes a hash value item of data, then according to the at least one first transaction information and/or the at least one second transaction information, based on the sixth algorithm, to generate a block of the second blockchain; 或者,or, 所述区块生成模块,还用于若所述至少一个第一交易信息包含数据项,且所述至少一个第二交易信息包含数据项,则根据所述至少一个第一交易信息和/或所述至少一个第二交易信息,基于第七算法,生成第一区块链的区块;和,所述至少一个第一交易信息包含数据的散列值项,则根据所述至少一个第一交易信息,基于第八算法,生成第二区块链的区块。The block generation module is further configured to, if the at least one first transaction information includes a data item, and the at least one second transaction information includes a data item, according to the at least one first transaction information and/or the data item. the at least one second transaction information, based on the seventh algorithm, to generate a block of the first blockchain; and, the at least one first transaction information contains the hash value item of the data, then according to the at least one first transaction information, based on the eighth algorithm, to generate blocks of the second blockchain. 64.根据权利要求59所述的网络节点,其特征在于,还包括:64. The network node of claim 59, further comprising: 第一获取模块,用于获取第一数据的第一散列值;a first obtaining module, for obtaining the first hash value of the first data; 所述第一获取模块,还用于从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;The first obtaining module is further configured to obtain the first data from the first blockchain, and calculate a second hash value of the first data; 第一比对模块,用于将所述第一散列值与所述第二散列值进行比对;a first comparison module, configured to compare the first hash value with the second hash value; 第一确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,a first determination module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or , determining that the first hash value of the first data is a trusted hash value; or, 所述第一确定模块,还用于若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。The first determining module is further configured to determine that the first data is untrusted data if the first hash value is different from the second hash value; or, determine that the first data has been tampered; or, it is determined that the first hash value of the first data is an untrusted hash value. 65.根据权利要求61所述的网络节点,其特征在于,还包括:65. The network node of claim 61, further comprising: 第二获取模块,用于从所述第二区块链获取所述第一数据的第一散列值;a second obtaining module, configured to obtain the first hash value of the first data from the second blockchain; 所述第二获取模块,还用于获取存储的所述第一数据,并计算所述第一数据的第二散列值;The second obtaining module is further configured to obtain the stored first data and calculate the second hash value of the first data; 第二比对模块,用于将所述第一散列值与所述第二散列值进行比对;a second comparison module, configured to compare the first hash value with the second hash value; 第二确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,A second determining module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or , determining that the first hash value of the first data is a trusted hash value; or, 所述第二确定模块,还用于若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。The second determining module is further configured to determine that the first data is untrusted data if the first hash value is different from the second hash value; or, determine that the first data has been tampered; or, it is determined that the first hash value of the first data is an untrusted hash value. 66.根据权利要求63所述的网络节点,其特征在于,还包括:66. The network node of claim 63, further comprising: 第三获取模块,用于从所述第二区块链获取所述第一数据的第一散列值;a third obtaining module, configured to obtain the first hash value of the first data from the second blockchain; 所述第三获取模块,还用于从所述第一区块链获取所述第一数据,并计算所述第一数据的第二散列值;The third obtaining module is further configured to obtain the first data from the first blockchain, and calculate a second hash value of the first data; 第三比对模块,用于将所述第一散列值与所述第二散列值进行比对;a third comparison module, configured to compare the first hash value with the second hash value; 第三确定模块,用于若所述第一散列值与所述第二散列值相同,则确定所述第一数据是可信数据;或者,确定所述第一数据未被篡改;或者,确定所述第一数据的第一散列值是可信散列值;或,a third determining module, configured to determine that the first data is trusted data if the first hash value is the same as the second hash value; or, determine that the first data has not been tampered with; or , determining that the first hash value of the first data is a trusted hash value; or, 所述第三确定模块,还用于若所述第一散列值与所述第二散列值不相同,则确定所述第一数据是不可信数据;或者,确定所述第一数据已被篡改;或者,确定所述第一数据的第一散列值是不可信散列值。The third determining module is further configured to determine that the first data is untrusted data if the first hash value is different from the second hash value; or, determine that the first data has been tampered; or, it is determined that the first hash value of the first data is an untrusted hash value. 67.根据权利要求54、55、56、60、62、63、64、65、66中任一项所述的网络节点,其特征在于,还包括:67. The network node according to any one of claims 54, 55, 56, 60, 62, 63, 64, 65, 66, further comprising: 区块发送模块,用于向中心节点发送所述数据信息或者区块链的区块。The block sending module is used to send the data information or the block of the block chain to the central node. 68.根据权利要求53、54、55、56、60、62、63、64、65、66中任一项所述的网络节点,其特征在于,还包括:68. The network node according to any one of claims 53, 54, 55, 56, 60, 62, 63, 64, 65, 66, characterized in that, further comprising: 通知消息发送模块,用于向所述至少一个设备节点发送第一通知消息,所述第一通知消息用于通知设备节点已生成区块链的区块的消息。A notification message sending module, configured to send a first notification message to the at least one device node, where the first notification message is used to notify the device node that a block of the blockchain has been generated. 69.根据权利要求54、55、56、60、62、63、64、65、66中任一项所述的网络节点,其特征在于,还包括:69. The network node according to any one of claims 54, 55, 56, 60, 62, 63, 64, 65, 66, further comprising: 删除消息发送模块,用于向设备节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。The deletion message sending module is configured to send a first deletion message to the device node, where the first deletion message is an instruction message for instructing the device node to delete the data information or delete the block. 70.根据权利要求54、55、56、60、62、63、64、65、66中任一项所述的网络节点,其特征在于,还包括:70. The network node according to any one of claims 54, 55, 56, 60, 62, 63, 64, 65, 66, further comprising: 删除消息接收模块,还用于接收所述至少一个设备节点发送的第二删除消息,所述第二删除消息为所述至少一个设备节点用于请求删除所述数据信息或者删除区块。The deletion message receiving module is further configured to receive a second deletion message sent by the at least one device node, where the second deletion message is used by the at least one device node to request deletion of the data information or deletion of a block. 71.根据权利要求53、54、55、56、60、62、63、64、65、66中任一项所述的网络节点,其特征在于,还包括:71. The network node according to any one of claims 53, 54, 55, 56, 60, 62, 63, 64, 65, 66, further comprising: 删除区块确定模块,用于从目标区块链中确定待删除区块,所述目标区块链为所述网络节点所存储的任意一个区块链。The deletion block determination module is used to determine the block to be deleted from the target blockchain, where the target blockchain is any blockchain stored by the network node. 72.根据权利要求53、54、55、56、60、62、63、64、65、66中任一项所述的网络节点,其特征在于,72. The network node of any one of claims 53, 54, 55, 56, 60, 62, 63, 64, 65, 66, wherein, 第二信息发送模块,还用于将所述区块链的区块包含的多个交易信息发送至上一级网络节点。The second information sending module is further configured to send a plurality of transaction information contained in the blocks of the blockchain to the upper-level network node. 73.根据权利要求71所述的网络节点,其特征在于,还包括73. The network node of claim 71, further comprising 删除模块,用于将所述目标区块链中的所述待删除区块进行删除。A deletion module, configured to delete the block to be deleted in the target blockchain. 74.根据权利要求71所述的网络节点,其特征在于,还包括:74. The network node of claim 71, further comprising: 记录模块,用于记录所述待删除区块的区块头内容。The recording module is used to record the block header content of the block to be deleted. 75.根据权利要求71所述的网络节点,其特征在于,所述删除区块确定模块,具体用于按照预设删除规则,从目标区块链中确定待删除区块;75. The network node according to claim 71, wherein the deletion block determination module is specifically configured to determine the block to be deleted from the target blockchain according to a preset deletion rule; 其中,所述预设删除规则为:所述网络节点存储所述目标区块链的区块个数大于预设阈值,或者所述待删除区块为生成时间时长超过时间阈值的区块,或者,所述待删除区块为区块序号小于序号阈值的区块。The preset deletion rule is: the number of blocks stored in the target blockchain by the network node is greater than a preset threshold, or the block to be deleted is a block whose generation time exceeds the time threshold, or , the block to be deleted is a block whose block serial number is less than the serial number threshold. 76.一种设备节点,其特征在于,包括:76. A device node, characterized in that it comprises: 发送模块,用于向网络节点发送一个或者多个数据信息,所述数据信息包括以下至少一项:第一数据、所述第一数据的第一散列值、所述第一数据的索引值、所述第一数据的时间信息、发送所述数据信息的设备节点的标识、所述设备节点的地址和所述网络节点的地址;A sending module, configured to send one or more data information to a network node, the data information including at least one of the following: first data, a first hash value of the first data, and an index value of the first data , the time information of the first data, the identifier of the device node sending the data information, the address of the device node and the address of the network node; 所述数据信息用于所述网络节点生成第一交易信息;所述第一数据的第一散列值存储于第一网络节点的第二区块链中;所述第一数据存储于第二网络节点的第一区块链中;所述第一网络节点将所述第一数据的散列值发送给中心节点,所述第二网络节点将所述第一数据发送至所述中心节点,以使所述中心节点计算所述第一数据的第二散列值,并将第二散列值和第一散列值进行比对,以检验所述第一数据是否被篡改,或者,检验所述第一数据是否为可信数据,或者检验所述第一数据的第一散列值是否为可信散列值;The data information is used by the network node to generate the first transaction information; the first hash value of the first data is stored in the second blockchain of the first network node; the first data is stored in the second In the first blockchain of the network node; the first network node sends the hash value of the first data to the central node, and the second network node sends the first data to the central node, so that the central node calculates the second hash value of the first data, and compares the second hash value with the first hash value to check whether the first data has been tampered with, or, check Whether the first data is trusted data, or check whether the first hash value of the first data is a trusted hash value; 或者,or, 生成模块,用于根据一个或者多个数据信息,生成至少一个第二交易信息,并将所述至少一个第二交易信息发送至网络节点;a generating module, configured to generate at least one second transaction information according to one or more data information, and send the at least one second transaction information to the network node; 所述第二交易信息包括以下至少一项对应的信息:数据项、数据的索引值项、数据的散列值项、时间信息项、数据的发送方项和数据的接收方项;The second transaction information includes information corresponding to at least one of the following items: a data item, an index value item of the data, a hash value item of the data, a time information item, a sender item of the data, and a receiver item of the data; 所述中心节点、所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备;或者,所述第一网络节点和所述第二网络节点为物理上分离的具备通信或存储功能的设备,所述中心节点为所述第一网络节点或者所述第二网络节点中的任一个;或者,所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备,所述中心节点为第三方设备;或者,所述中心节点、所述第一网络节点和所述第二网络节点为同一个具备通信或存储功能的设备。The central node, the first network node, and the second network node are physically separated devices with communication or storage functions; or, the first network node and the second network node are physically separated A device with a communication or storage function, the central node is either the first network node or the second network node; or, the first network node and the second network node are the same A device with a communication or storage function, and the central node is a third-party device; or, the central node, the first network node, and the second network node are the same device with a communication or storage function. 77.根据权利要求76所述的设备节点,其特征在于,还包括:77. The device node of claim 76, further comprising: 第一接收模块,用于接收网络节点发送的区块链第一通知消息,所述第一通知消息用于通知所述网络节点已经根据所述数据信息生成区块链的区块的消息。The first receiving module is configured to receive a first notification message of the blockchain sent by the network node, where the first notification message is used to notify the network node that a block of the blockchain has been generated according to the data information. 78.根据权利要求76或77所述的设备节点,其特征在于,还包括:78. The device node of claim 76 or 77, further comprising: 第二接收模块,用于接收网络节点发送的区块。The second receiving module is used for receiving the block sent by the network node. 79.根据权利要求76或77所述的设备节点,其特征在于,还包括:79. The device node of claim 76 or 77, further comprising: 第三接收模块,用于接收到所述网络节点发送第一删除消息,所述第一删除消息为用于指示所述设备节点删除所述数据信息或者删除区块的指示消息。The third receiving module is configured to receive a first deletion message sent by the network node, where the first deletion message is an instruction message for instructing the device node to delete the data information or delete the block. 80.根据权利要求76或77所述的设备节点,其特征在于,80. The device node of claim 76 or 77, wherein 所述发送模块,还用于向所述网络节点发送的第二删除消息,所述第二删除消息用于请求删除所述数据信息或者删除区块。The sending module is further configured to send a second deletion message to the network node, where the second deletion message is used to request deletion of the data information or deletion of blocks. 81.根据权利要求76或77所述的设备节点,其特征在于,还包括:81. The device node of claim 76 or 77, further comprising: 删除模块,用于删除所述数据信息。A deletion module is used to delete the data information. 82.根据权利要求81所述的设备节点,其特征在于,所述删除模块具体用于将生成时长超过第一时间阈值的数据信息进行删除。82. The device node according to claim 81, wherein the deletion module is specifically configured to delete data information whose generation duration exceeds the first time threshold.
CN201780074039.XA 2017-01-03 2017-01-03 Communication method, terminal equipment and core network equipment Active CN110023944B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/000082 WO2018126344A1 (en) 2017-01-03 2017-01-03 Data processing method and related device

Publications (2)

Publication Number Publication Date
CN110023944A CN110023944A (en) 2019-07-16
CN110023944B true CN110023944B (en) 2021-12-28

Family

ID=62788947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780074039.XA Active CN110023944B (en) 2017-01-03 2017-01-03 Communication method, terminal equipment and core network equipment

Country Status (2)

Country Link
CN (1) CN110023944B (en)
WO (1) WO2018126344A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019098895A1 (en) * 2017-11-17 2019-05-23 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement for detecting digital content tampering
US11038950B2 (en) 2018-08-14 2021-06-15 Microsoft Technology Licensing, Llc Blockchain digital twin for transactions on behalf of limited capability devices
GB2577751A (en) * 2018-10-05 2020-04-08 Dragon Infosec Ltd A consensus method and framework for a blockchain system
GB2587541A (en) * 2018-10-05 2021-03-31 Dragon Infosec Ltd A consensus method and framework for a blockchain system
CN110046036A (en) * 2018-12-25 2019-07-23 阿里巴巴集团控股有限公司 A kind of operation requests distribution method, device and equipment
WO2021064852A1 (en) * 2019-10-01 2021-04-08 富士通株式会社 Transaction management device, transaction management program, and transaction management method
CN111212126B (en) * 2019-12-27 2023-05-26 百度在线网络技术(北京)有限公司 Data transmission method, device, equipment and medium of block chain network
CN113225191B (en) * 2021-03-24 2024-02-13 湖南宸瀚信息科技有限责任公司 Generation method and device of consensus node, storage medium and processor
US12170738B2 (en) * 2021-06-08 2024-12-17 Artema Labs, Inc Composite cryptographic systems with variable configuration parameters and memory bound functions
CN119939676B (en) * 2025-04-08 2025-08-29 北京安宁创新网络科技股份有限公司 Method, device, equipment and storage medium for generating consistent data sets

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4176533B2 (en) * 2003-03-31 2008-11-05 株式会社エヌ・ティ・ティ・ドコモ Terminal device and program
US7796990B2 (en) * 2006-09-14 2010-09-14 Nokia Corporation Method for the routing of multimedia communication related signaling in a communication system
CN101599994B (en) * 2009-06-01 2012-07-18 中兴通讯股份有限公司 Distributed file system (DFS), access node (AN) and method of transmitting file data among nodes
CN101853190B (en) * 2010-06-04 2012-07-04 华中科技大学 Data integrity verification method suitable for embedded processor
CN102355663B (en) * 2011-06-30 2014-08-20 北京交通大学 Credible inter-domain rapid authentication method on basis of separation mechanism network
GB201112360D0 (en) * 2011-07-18 2011-08-31 Skype Ltd Distributing information
CN102955808A (en) * 2011-08-26 2013-03-06 腾讯科技(深圳)有限公司 Data acquisition method and distributed file system
CN103902617B (en) * 2012-12-28 2017-06-09 华为技术有限公司 Distributed data base synchronous method and system
CN104168563B (en) * 2014-08-15 2017-06-27 西安电子科技大学 A K‑anonymous incentive method based on local reputation storage
CN104468548B (en) * 2014-11-28 2018-03-16 华为技术有限公司 A kind of method of data verification, calamity are for memory and production inventory device
KR101600717B1 (en) * 2014-12-04 2016-03-07 한양대학교 산학협력단 Method and apparatus for download virtual machine operating system image
CN105610578B (en) * 2016-01-25 2019-05-03 杭州复杂美科技有限公司 Block chain information deposits card and method for secret protection
CN105761143B (en) * 2016-02-01 2019-04-05 上海凭安网络科技有限公司 A method of the credit record of building together in many ways based on block chain
CN105912618B (en) * 2016-04-07 2019-04-23 浙江万马新能源有限公司 The charging pile charging transaction means of communication and device based on block chain
CN105812391A (en) * 2016-05-16 2016-07-27 广州鼎鼎信息科技有限公司 Safe cloud storage system
CN106060036B (en) * 2016-05-26 2019-07-16 布比(北京)网络技术有限公司 Decentralization common recognition method and device
CN106201338B (en) * 2016-06-28 2019-10-22 华为技术有限公司 Data storage method and device
CN106230851B (en) * 2016-08-29 2019-12-13 中金云金融(北京)大数据科技股份有限公司 Data security method and system based on block chain
CN106650494B (en) * 2016-12-16 2019-07-16 杭州嘉楠耘智信息科技有限公司 Data processing method and device

Also Published As

Publication number Publication date
CN110023944A (en) 2019-07-16
WO2018126344A1 (en) 2018-07-12

Similar Documents

Publication Publication Date Title
CN110023944B (en) Communication method, terminal equipment and core network equipment
TWI722586B (en) Data sharing method, device and system, electronic equipment
EP3751815B1 (en) Multi-source deterministic oracle management
TWI727467B (en) Trustworthiness verification method, system, device and equipment of alliance chain
WO2016029794A1 (en) Method and device for identifying feature account
TW201947446A (en) Blockchain-based information supervision method and device
US11509664B2 (en) Secure sent message identifier
WO2020134627A1 (en) Credibility verification method of alliance chain, system, device and apparatus
TWI706663B (en) Data storage method and system based on multiple blockchain networks
CN110022345B (en) Method, system, device and equipment for processing request in alliance chain
CN104346365A (en) Device and method for determining specific service associated logs
TW201733306A (en) Message anti-forgery implementation method and device capable of providing users with a mechanism to verify the authenticity of received messages, and identifying false messages sent by a fake legitimate party for increasing user network security
CN112910936B (en) Data processing method, device, system, electronic device and readable storage medium
TW202321938A (en) Data sharing method and device, equipment and storage medium
CN104468862A (en) IP address binding method, device and system
CN111444549A (en) Communication content evidence storing method and system based on block chain and electronic equipment
CN115934832A (en) Trusted sharing method of measurement test data based on block chain
CN114282987A (en) Electronic report content verification method, system and storage medium based on block chain
CN110019025B (en) Stream data processing method and device
TW202020687A (en) Data reading method and system based on plurality of block chain networks
CN113781229B (en) Transaction data storage method, device, equipment and readable storage medium
WO2017028553A1 (en) Message security control method, device and system
US20250029080A1 (en) Decentralized metadata registry
CN118568115A (en) Query method, system, device, electronic equipment, storage medium and program product
CN120031563A (en) Blockchain-based data processing method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant