WO2018120129A1 - Procédé, dispositif et appareil de nœud d'interrogation de données - Google Patents
Procédé, dispositif et appareil de nœud d'interrogation de données Download PDFInfo
- Publication number
- WO2018120129A1 WO2018120129A1 PCT/CN2016/113758 CN2016113758W WO2018120129A1 WO 2018120129 A1 WO2018120129 A1 WO 2018120129A1 CN 2016113758 W CN2016113758 W CN 2016113758W WO 2018120129 A1 WO2018120129 A1 WO 2018120129A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- query
- node
- data
- blockchain
- result
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2471—Distributed queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Definitions
- the present disclosure relates to the field of blockchain technology, and in particular, to a data query method, device, and node device.
- a blockchain is a decentralized distributed database system in which all nodes in a blockchain network participate in maintenance. It is composed of a series of data blocks generated by cryptography, and each block is a blockchain. One block. According to the order of the generation time, the blocks are linked together in an orderly manner to form a data chain, which is aptly called a blockchain.
- the blockchain has its own unique block generation, transaction generation and verification protocols, and has security features such as non-tamperable, unforgeable and fully traceable.
- the blockchain network is based on a P2P network, and each P2P network node participating in transaction and block storage, verification, and forwarding is a node in a blockchain network.
- the blockchain data is completely public to each node, and the node can view the information of any transaction in any block at will.
- the querier when the querier needs to query the data in the blockchain, if the querier itself is a node in the blockchain network, it is only necessary to query from the blockchain copy stored by itself; Rather than a node in a blockchain network, a query request needs to be sent to a node in the blockchain network to implement data query.
- the present disclosure provides a data query method, apparatus, and node device.
- a data query method for a blockchain node of a blockchain network, the method comprising:
- the query result with the highest ratio is used as the query result corresponding to the data to be queried.
- a data query method is provided, which is applied to a blockchain node of a blockchain network, and the method includes:
- a query result is returned to the target blockchain node.
- a data query apparatus which is applied to a blockchain node of a blockchain network, the device comprising:
- a security level determining module configured to receive a query request, and determine a security level of the data to be queried corresponding to the query request;
- a first query node determining module configured to determine a query node according to the security level, where the query node is a node in a blockchain network;
- a first query request forwarding module configured to send the query request to the determined query node
- the first query result determining module is configured to receive the query result returned by the query node. If the query result with the highest ratio meets the preset condition, the query result with the highest ratio is used as the query result corresponding to the data to be queried.
- a data query apparatus which is applied to a blockchain node of a blockchain network, the device comprising:
- a security level determining module configured to determine, according to a query request sent by the target blockchain node, a security level of the data to be queried corresponding to the query request;
- a query probability determination module configured to determine a probability of responding to the query request according to the security level
- the first query result returning module is configured to, when determining to respond to the query request according to the probability, return a query result to the target blockchain node.
- a computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion of the method of performing the above first aspect.
- a non-transitory computer readable storage medium comprising one or more programs for performing The method of the above first aspect.
- a node device including:
- One or more processors for executing a program in the non-transitory computer readable storage medium.
- a computer program product characterized in that the computer program product comprises a computer program executable by a programmable device, the computer program having when The portion of code used to perform the method described in the second aspect above when the device is executed.
- a non-transitory computer readable storage medium comprising one or more programs for performing The method of the above second aspect.
- a node device including:
- One or more processors for executing a program in the non-transitory computer readable storage medium.
- the embodiments of the present disclosure include at least the following beneficial effects: determining different query strategies according to different security levels, avoiding query errors caused by single nodes being attacked, data being tampered with, etc.; improving credibility and correctness of query results, and preventing blocks Chain data is tampered with query errors and security risks.
- FIG. 1 is a schematic diagram of a blockchain network according to an embodiment of the present disclosure
- FIG. 2 is a schematic flowchart of a data query method according to an embodiment of the present disclosure
- FIG. 3 is a schematic flowchart of a data query method according to another embodiment of the present disclosure.
- FIG. 4 is a schematic diagram of a process flow when a candidate result does not satisfy a pre-condition in an embodiment of the present disclosure
- FIG. 5 is a schematic diagram of a target blockchain node releasing information when a query fails in an embodiment of the present disclosure
- FIG. 6 is a schematic flowchart diagram of a data query method according to an embodiment of the present disclosure.
- FIG. 7 is a schematic flowchart diagram of a data query method according to another embodiment of the present disclosure.
- FIG. 8 is a block diagram of a data query apparatus according to an embodiment of the present disclosure.
- FIG. 9 is a block diagram of a data query apparatus according to another embodiment of the present disclosure.
- FIG. 10 is a block diagram of an apparatus for a data query method, according to an exemplary embodiment.
- the data in the blockchain is set to different security levels according to the attributes, and the data of different security levels is correspondingly selected by different query nodes in the query, and then the data query is performed by the corresponding number of query nodes; And according to the query result returned by the query node, whether the query success judgment threshold of the security level data is reached, and if the query success judgment threshold is reached, the query result is considered to be trustworthy, and the query success judgment threshold is not required to be a higher ratio or directly
- the second query is performed in a hundred percent ratio. If the second query still fails to reach the query success judgment threshold corresponding to the corresponding security level data, the warning may be performed or the accuracy of the data may be determined manually or by other means. Therefore, the data query method, device and node device of the embodiments of the present disclosure can improve the credibility and correctness of the query result, and prevent query errors and security risks caused by the tampering of the blockchain data.
- the query method of the blockchain data may be applied to a scenario where the query end is not a node in the blockchain, or may be applied to a scenario where the query end is a node in the blockchain, and the query result may be improved. Reliability and accuracy, preventing query errors and security risks caused by tampering with blockchain data.
- Blockchain node A blockchain is a decentralized distributed database system in which all nodes in a blockchain network participate in maintenance. It is composed of a series of data blocks generated by cryptography. Each data block is A block in a blockchain. The blocks are ordered according to the order in which they are generated. The links are linked together to form a data chain, which is aptly called a blockchain.
- a node in a blockchain network may be referred to as a blockchain node, wherein the blockchain network is based on a P2P (Peer to Peer) network, and each P2P network node participating in the transaction and block storage, verification, and forwarding is Is a node in a blockchain network.
- P2P Peer to Peer
- the user identity in the blockchain can be represented by a public key or an account address generated based on the public key, and the public key and the private key appear in pairs, wherein the private key is mastered by the user and not issued to the above.
- the public key or the above account address can be freely posted in the blockchain network.
- the public key can be the above account address through a specific hash and encoding. It is worth mentioning that there is no one-to-one correspondence between user identity and blockchain nodes. Users can use their own private key on any blockchain node.
- Blockchain data write The blockchain node writes data to the blockchain by issuing a transaction to the blockchain network.
- the transaction includes: the blockchain node performs a digital signature on the generated transaction data packet according to a preset transaction data format, and uses the private key of the blockchain node to perform the digital signature on the transaction data packet, and the digital signature is used to prove the The identity of the user of the blockchain node; then, after the transaction is posted to the blockchain network, the "miner” in the blockchain network (ie, the block that performs the PoW (Proof Of Work) consensus competition mechanism
- the chain node records the new block generated in the blockchain and publishes the new block to the blockchain network.
- the new block in the blockchain is periodically generated by the above-mentioned “miners” by implementing a consensus competition mechanism such as PoW or PoS, so the time interval for generating new blocks is usually related to the above-mentioned preset technical requirements, and the settings are different.
- the default technical requirements can change the time interval at which the blockchain generates new blocks.
- FIG. 1 a schematic diagram of a blockchain network according to an embodiment of the present disclosure.
- the blockchain network 100 includes: one or more blockchain nodes 101, and these block links
- the point 101 can be implemented in various forms, for example, a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (Personal Digital Assistant), a PAD (Tablet), a PMP (Portable Multimedia Player), a server, a mine. Machine and so on.
- PDA Personal Digital Assistant
- PAD Tablet
- PMP Portable Multimedia Player
- each block in the blockchain includes a block header and a block body.
- the block body holds the transaction data.
- Transaction data is saved via the Merkel tree.
- the hash of the Merkel root is stored in the block header.
- the block header includes at least: a hash value of the previous block header, a hash value of the Merkel root, a time stamp, and a block number.
- Transaction data can be any type of data including, but not limited to, various types of statistical data (eg, demographic data, medical data, etc.), various types of currency transaction data (eg, transfer transaction data), and various types.
- Request data for example, query request, node join request, etc.
- the blockchain data in order to ensure the security of the information query, is set according to the data attribute security level, and different security levels correspond to different query strategies, thereby improving the security and accuracy of the data query.
- the ratio of the query node refers to the ratio of the number of query nodes to the total number of blockchain nodes, as shown in equation (1).
- the query node is a node that responds to the query request, or a node that receives the query request.
- n is the number of query nodes and N is the total number of blockchain nodes in the blockchain network.
- the query success determination threshold is the ratio of the number of query results with the highest proportion of query results returned by the query node to the total number of query nodes, as shown in equation (2).
- n is the number of query results with the highest ratio.
- n in formula (1) and formula (2) includes these should respond to the query request, and the query is returned. The result, but because of the exception, the query node that did not return the query result and the total number of query nodes that returned the query result.
- the security level may be determined according to the category to which the blockchain data belongs.
- the blockchain data of the first security level may be data related to personal information, currency transaction data, etc.; blockchain data of the second security level may be various types of statistical data; blockchain data of the third security level There may be various types of request data (eg, query requests, node join requests, etc.). It should be understood that the security level of the blockchain data may be set according to actual conditions, and is not limited to the examples given herein.
- the security level of the data to be written to the blockchain is determined when the block is newly created. Write the security level of the data along with the data into the blockchain. Thus, when performing a data query, the security level of the data can be queried from the blockchain.
- the correspondence between the security level of the blockchain data and the query strategy shown in Table 1 above is stored in a block of the blockchain.
- the blockchain node may determine the data to be queried according to the query request, and query the correspondence between the security level of the blockchain data and the query policy from the block of the blockchain to determine the data to be queried. Query strategy.
- FIG. 2 is a schematic flowchart of a data query method according to an embodiment of the present disclosure. The method includes the following steps:
- step 201 a query request is received to determine a security level of the data to be queried corresponding to the query request.
- step 202 the query node is determined based on the security level.
- step 203 a query request is sent to the determined query node.
- step 204 the query result returned by the query node is received. If the query result with the highest ratio satisfies the preset condition, the query result with the highest proportion is used as the query result corresponding to the data to be queried.
- step 301 the target blockchain node determines the security level of the data to be queried according to the query request.
- the query side when a data query is to be performed, the query side generates a query request and sends the query request to the target blockchain node.
- the query end here is an electronic device in a non-blockchain network.
- the query request is generated by the target blockchain node itself, that is, the target blockchain node is the query end.
- the query request includes at least one of the following information: a transaction hash, an account address, and a query keyword.
- the determined data to be queried may include: whether the transaction corresponding to the transaction hash is valid, currency transaction data, and the like.
- the security level of the data to be queried is determined to be the first security level.
- the determined data to be queried may include: information of the account corresponding to the account address, transaction record of the account corresponding to the account address, and the like.
- the security level of the data to be queried is determined as the first security level.
- the determined data to be queried may include: data corresponding to the keyword.
- the security level of the data to be queried may be determined according to the keyword, and when the keyword includes: an account, a transaction, and the like, the security level of the data to be queried is determined as the first security level; when the keyword is not included Security of data to be queried when accounts, transactions, etc.
- the rating is determined to be the second security level or other level.
- the security level of the data to be queried is determined according to the query request.
- the target blockchain node determines the query policy according to the security level of the data to be queried.
- the query policy corresponding to the security level may be queried from the block in which the correspondence relationship shown in Table 1 above is stored.
- step 303 the target blockchain node determines the query node according to the query policy corresponding to the security level.
- step 304 the target blockchain node forwards the query request to the query node.
- each blockchain node stores address information of all nodes in the blockchain network, and when a new node joins the blockchain network and has a node exits the blockchain network, Update the saved address information. Therefore, the target block chain node can randomly select and query the block number node corresponding to the policy as the query node according to the stored address information of the block chain node, for example, the IP address information, and according to the block chain node. IP address, forwarding of query requests. For example, when the query node determines that the proportion of the query node is w1%, w1% ⁇ N nodes are randomly selected as nodes in the blockchain network, and the query is sent to the w1% ⁇ N query nodes according to the IP address. request.
- the query node determined by the target blockchain node may include itself, and when it includes itself, there is no need to forward the query request.
- step 305 the target blockchain node receives the query node and returns the query result.
- the query node that receives the query request performs a query according to the query request, obtains the query result, and returns the query result to the target block chain node.
- the target block chain node forwards the address information together with the query request when forwarding the query request, thereby the query node may obtain the query result according to the address of the target block chain node. Information, will query results Return to the target blockchain node.
- the query node When the query node obtains the query result according to the query request: when the query request includes the transaction hash, the query node determines the block where the data to be queried is located according to the transaction hash, and obtains data from the corresponding block, and the acquired data. The data is returned to the target blockchain node as a result of the query.
- the query node verifies the transaction corresponding to the transaction hash according to the transaction hash, that is, according to the transaction hash, performs a query in the blockchain to determine whether the transaction is recorded in a certain block, and Based on the location of the block in the blockchain, determine how much confirmation the block received.
- the query result includes a transaction verification result, the transaction verification result including at least: whether the transaction has been recorded in the block, and the number of confirmed blocks obtained.
- the query node determines the block corresponding to the account address according to the account address, and obtains data from the corresponding block, and returns the acquired data as a query result to the target block chain node.
- the query node traverses the blockchain according to the query keyword, obtains data corresponding to the keyword, and returns the data corresponding to the keyword as the query result to the target block.
- Chain node When the query request includes the query keyword, the query node traverses the blockchain according to the query keyword, obtains data corresponding to the keyword, and returns the data corresponding to the keyword as the query result to the target block.
- step 306 the target blockchain node determines the candidate result according to the query result returned by the query node.
- the target block chain node receives the query result returned by the query node, and compares different query results, and uses the highest proportion of the query result as a candidate result. For example, if the number of returned query results is 100, and 85 of the query results are all A, then A is the highest proportion of the query results, which is used as a candidate result.
- step 307 when the candidate result satisfies the preset condition, the candidate result is used as the query result corresponding to the data to be queried.
- the preset condition is that the ratio of the number of query nodes of the returned query result to the candidate result to the total number of query nodes is greater than or equal to the query success judgment threshold corresponding to the data to be queried. Therefore, the target block chain node returns the query result as the candidate result. The number of query nodes is compared with the total number of query nodes. When the ratio is greater than or equal to the query success determination threshold in the query policy corresponding to the data to be queried, the candidate result is obtained. As the query result corresponding to the data to be queried.
- not all query nodes will return the query result.
- the query node may not return the query result due to an abnormality (for example, being illegally controlled, tampered with, shutting down, or malfunctioning, etc.), but the calculation of the ratio
- the number of query nodes that return the query result as the candidate result is compared with the total number of query nodes, so that the query node that does not return the query result has an impact on the query result, improves the referenceability of the query result, and reduces the query risk.
- the query when the candidate result does not satisfy the preset condition, the query is re-executed.
- the number of query nodes is adjusted to improve the credibility and correctness of the query result.
- step 401 the target blockchain node increases the number of query nodes according to the first preset ratio.
- the first preset ratio may be set to be 10% to 50%. In some embodiments, if the first query is unsuccessful (ie, the candidate result does not satisfy the preset condition), the proportion of the query node is increased to 100%.
- step 402 the target blockchain node forwards the query request to the query node.
- step 403 the target blockchain node receives the query node and returns the query result.
- step 404 the target blockchain node determines the candidate result according to the query result returned by the query node.
- step 405 when the candidate result satisfies the preset condition, the candidate result is used as the query result corresponding to the data to be queried.
- step 405 when it is determined whether the candidate result satisfies the preset condition, the query success determination threshold is the same as in step 307.
- the query success determination threshold may also be scaled up in step 405, which is not limited in this disclosure.
- the target block chain node issues the warning information to the blockchain network.
- the warning information includes: a transaction hash, an account address, or a query keyword in the query request.
- the warning information is used to prompt the nodes in the blockchain network, and the data corresponding to the query request presents a security risk.
- the target block chain node sends a prompt message to the query end, where the prompt information is used to prompt that the query result is unavailable or the query is invalid.
- the third and fourth times of the query may also be performed, and the number of queries may be set according to actual conditions until the number of queries reaches the maximum number of queries, and when the query fails, according to the figure 5 outputs warning information and prompt information.
- the index of the query node can be increased once for each additional query.
- the data query method of the embodiment of the present disclosure determines different query strategies according to different security levels, avoids query errors caused by single node being attacked, data being tampered with, etc.; improves credibility and correctness of query results, and prevents blockchain Query errors and security risks caused by tampering with data; avoiding the possibility of querying only a single node, and the single node being attacked or data being tampered with, so that the error message is queried; on the other hand, it is avoided All query requests use the same proportion of query nodes for resource waste caused by query, and each query passes the 100% blockchain node to query the burden on all blockchain nodes, which can ensure reliable query results. In the case of sex, reduce the negative impact on the concurrency of the blockchain.
- FIG. 6 is a schematic flowchart diagram of a data query method according to another embodiment of the present disclosure. The method includes the following steps:
- step 601 determining, according to the query request sent by the target blockchain node, the security level of the data to be queried corresponding to the query request;
- step 602 a probability of responding to the query request is determined according to the security level
- step 603 when the response query request is determined according to the probability, the query result is returned to the target.
- Standard blockchain node
- the target blockchain node ie, the blockchain node that receives the query request sent by the query end or the blockchain node that generates the query request itself
- the blockchain node that receives the query request may determine the probability of responding to the query request according to the query policy corresponding to the query request, thereby returning the query result according to the probability.
- step 701 the target blockchain node issues a query request to the blockchain network.
- the query request may be generated by the target blockchain node itself or by an electronic device in the non-blockchain network.
- the target blockchain node sends a query request to the blockchain node connected to itself, and these blockchain nodes send query requests to other blockchain nodes, so that in the blockchain network Each blockchain node can receive a query request.
- step 702 the blockchain node that receives the query request determines the security level of the data to be queried according to the query request.
- a query policy is determined according to the security level of the data to be queried.
- step 702 determines the security level of the data to be queried
- step 703 determines that the implementation principle of the query policy is the same as that of the embodiment shown in FIG. 3, and details are not described herein again.
- step 704 the blockchain node determines the probability of responding to the query request according to the query policy corresponding to the security level.
- the probability of responding to the query request is the same as the ratio of the query nodes in Table 1 above, whereby the blockchain node can query from the block storing the information shown in Table 1 to a different security level. The probability of responding to the query request.
- the blockchain node can obtain the probability that it needs to respond to the query request according to the security level.
- the blockchain After the node obtains the probability of responding to the query request, it determines whether it responds to the query request by generating a random number.
- the random number can be any integer between 1 and 10. It can be seen that the probability that the ten digits 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 appear in the random array is 10%. Since the probability of responding to the query request is 80%, it can be set to not respond to the query request if the generated random number is 1 or 2, and respond to the query request if the generated random number is any number between 3 and 10. According to this method, since each node has an 80% probability, the result will be returned. According to the probability theory, about 80% of the nodes working normally in the blockchain network will respond to the query request and return the query result.
- the total number of nodes in the 80% blockchain network should be used as the denominator to determine whether the query result satisfies the percentage of the query success decision threshold.
- the number of query results that are the highest among the query results returned by the blockchain node in response to the query request is a numerator that determines whether the percentage of the query success determination threshold is satisfied.
- the block chain node may further determine whether to respond to the query request according to other manners, for example, if the proportion of the query node corresponding to the security level is higher than a preset value, in response to the query request manner, the embodiment of the present disclosure is This is not limited.
- step 705 in response to the query node of the query request, the query result is returned to the target blockchain node.
- step 706 the target blockchain node determines the candidate result according to the query result returned by the query node.
- step 707 when the candidate result satisfies the preset condition, the candidate result is used as the query result corresponding to the data to be queried.
- the query is re-inquired.
- the target blockchain node when the query is re-inquired, the target blockchain node re-publishes the query request to the blockchain network, and if the blockchain node receives the same query request again, it will respond to the query request.
- the probability is increased according to the second preset ratio, and the second preset ratio can be set to be 10%-50%.
- the blockchain node that receives the same query request again increases the probability of responding to the query request to 100%, ie All nodes in the blockchain network that receive the query request respond to the query request
- the query node responding to the query request returns the query result to the target blockchain node.
- the target block chain node determines the candidate result according to the query result returned by the query node.
- the candidate result When the candidate result satisfies the preset condition, the candidate result is used as the query result corresponding to the data to be queried.
- the query success determination threshold may remain unchanged, or the ratio is increased.
- the disclosure is not limited to the embodiment shown in FIG. 4 above, when performing the second query. If the candidate result still fails to meet the preset condition, the second query fails, and the target block chain node issues the warning information to the blockchain network.
- the warning information includes: a transaction hash, an account address, or a query keyword in the query request.
- the warning information is used to prompt the nodes in the blockchain network, and the data corresponding to the query request presents a security risk.
- the target block chain node sends a prompt message to the query end, where the prompt information is used to prompt that the query result is unavailable or the query is invalid.
- the third and fourth times of the query may also be performed, and the number of queries may be set according to actual conditions until the number of queries reaches the maximum number of queries, and when the query fails, according to the figure 5 outputs warning information and prompt information.
- Each additional query increases the probability of responding to a query request by one.
- the data query method of the embodiment of the present disclosure determines different query strategies according to different security levels. It avoids query errors caused by single node being attacked, data being tampered with, etc.; improving the credibility and correct rate of query results, preventing query errors and security risks caused by blockchain data being tampered with; avoiding only by single node Querying, and the single node is attacked or the data is tampered with, making the possibility of querying the error message; on the other hand, it avoids the waste of resources caused by the query of all the query requests using the same proportion of query nodes, and Each query passes the 100% blockchain node to query the burden on all blockchain nodes, which can reduce the negative impact on the concurrency of the blockchain while ensuring the reliability of the query results.
- an embodiment of the present disclosure further provides a data query device, which is applied to a blockchain node of a blockchain network, and the device includes:
- the security level determining module 801 is configured to receive a query request, and determine a security level of the data to be queried corresponding to the query request;
- the first query node determining module 802 is configured to determine a query node according to the security level, where the query node is a node in a blockchain network;
- the first query request forwarding module 803 is configured to send the query request to the determined query node
- the first query result determining module 804 is configured to receive the query result returned by the query node. If the query result with the highest ratio meets the preset condition, the query result with the highest ratio is used as the query result corresponding to the data to be queried. .
- the security level determining module 801 is configured to query a security level corresponding to the to-be-queried data in a block in which the correspondence between the data to be queried and the security level is stored.
- the first query result determining module 804 includes:
- a first candidate result determining submodule configured to use the highest ranked query result as a first candidate result
- a first query result determining submodule configured to return the query result as the first candidate
- the query result with the highest ratio is used as the query result corresponding to the data to be queried.
- the apparatus 800 further includes:
- the query node adjustment module 805 is configured to adjust the number of query nodes when the highest proportion of the query result does not meet the preset condition
- the second query node determining module 806 is configured to determine the query node according to the adjusted number of query nodes
- a second query request forwarding module 807 configured to forward the query request to the determined query node
- the second query result determining module 808 is configured to determine a query result corresponding to the to-be-queried data according to the query result returned by the query node.
- the second query result determining module 808 includes:
- a second candidate result determining submodule configured to use the highest proportion of the query result as the second candidate result
- the early warning information issuance sub-module is configured to, when the returned query result is that the ratio of the number of query nodes of the second candidate result to the total number of query nodes is smaller than the query success judgment threshold corresponding to the to-be-queried data, to the blockchain network Post warning information.
- an embodiment of the present disclosure further provides a data query apparatus, which is applied to a blockchain node of a blockchain network, and the apparatus 900 includes:
- the security level determining module 901 is configured to determine, according to the query request sent by the target blockchain node, a security level of the data to be queried corresponding to the query request;
- the query probability determining module 902 is configured to determine a probability of responding to the query request according to the security level
- the first query result returning module 903 is configured to determine the response according to the probability When the request is queried, the query result is returned to the target blockchain node.
- the apparatus 900 further includes:
- the probability adjustment module 904 is configured to adjust the probability when the query request is repeatedly received
- the second query result returning module 905 is configured to, when determining to respond to the query request according to the adjusted probability, return a query result to the target blockchain node
- the first query result return module 903 includes:
- a first block determining submodule configured to determine, according to the transaction hash, a block in which the data to be queried is located when the transaction hash is included in the query request;
- the first query result determining submodule is configured to acquire data from the determined block and return the acquired data as a query result to the target blockchain node.
- the first query result return module 903 includes:
- a transaction verification submodule configured to verify a transaction corresponding to the transaction hash according to the transaction hash when the transaction hash is included in the query request
- a second query result determining submodule configured to return the verification result as the query result to the target blockchain node, the verification result including at least: whether the transaction has been recorded in the block, and the obtained confirmation The number of blocks.
- the first query result return module 903 includes:
- a second block determining submodule configured to determine, according to the account address, a block corresponding to the account address when the query request includes an account address
- the third query result determining submodule is configured to acquire data from the determined block and return the acquired data as the query result to the target blockchain node.
- the first query result return module 903 includes:
- a third block determining submodule configured to: when the query request includes a query keyword, traverse the blockchain according to the query keyword, and obtain data corresponding to the keyword;
- the fourth query result determining submodule is configured to return data corresponding to the keyword as the query result to the target blockchain node.
- FIG. 10 is a block diagram of an apparatus 1000 for a data query method, which may be a node device in a blockchain, according to an exemplary embodiment.
- the apparatus 1000 can include a processor 1001, a memory 1002, a multimedia component 1003, an input/output (I/O) interface 1004, and a communication component 1005.
- the processor 1001 is configured to control the overall operation of the apparatus 1000 to complete all or part of the steps of the data query method described above.
- the memory 1002 is for storing operating systems, various types of data to support operations at the device 1000, such as instructions that may include any application or method for operation on the device 1000, and application-related data.
- the memory 1002 can be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read only memory ( Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read Only Read-Only Memory (ROM), magnetic memory, flash memory, disk or optical disk.
- SRAM static random access memory
- EEPROM Electrically Erasable Programmable Read-Only Memory
- EPROM Erasable Programmable Read-Only Memory
- PROM Programmable Read-Only Memory
- ROM Read Only Read-Only Memory
- the multimedia component 1003 can include a screen and an audio component.
- the screen may be, for example, a touch screen, and the audio component is used to output and/or input an audio signal.
- the audio component can include a microphone for receiving an external audio signal.
- the received audio signal may be further stored in memory 1002 or transmitted via communication component 1005.
- the audio component also includes at least one speaker for outputting an audio signal.
- I/O interface 1004 provides for communication between processor 1001 and other interface modules Interface, the other interface modules mentioned above may be a keyboard, a mouse, a button, and the like. These buttons can be virtual buttons or physical buttons.
- Communication component 1005 is used for wired or wireless communication between the device 1000 and other devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so the corresponding communication component 1005 can include: Wi-Fi module, Bluetooth module, NFC module.
- the device 1000 may be configured by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), and digital signal processing devices (Digital Signal Processors).
- ASICs Application Specific Integrated Circuits
- DSPs Digital Signal Processors
- Digital Signal Processors Digital Signal Processors
- DSPD Processing Device
- PLD Programmable Logic Device
- FPGA Field Programmable Gate Array
- controller microcontroller, microprocessor or other electronic components Used to execute the above data query method.
- a computer program product comprising a computer program executable by a programmable device, the computer program having when executed by the programmable device The code portion used to perform the data query method described above.
- non-transitory computer readable storage medium comprising instructions, such as a memory 1002 comprising instructions executable by processor 1001 of apparatus 1000 to perform the data query method described above .
- the non-transitory computer readable storage medium can be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Fuzzy Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
L'invention concerne un procédé, un dispositif et un appareil de nœud d'interrogation de données, le procédé consistant à : recevoir une demande d'interrogation, déterminer un niveau de sécurité de données à interroger correspondant à la demande d'interrogation (201) ; déterminer un nœud d'interrogation selon le niveau de sécurité, le nœud d'interrogation étant un nœud dans un réseau à chaîne de blocs (202) ; envoyer la demande d'interrogation au nœud d'interrogation déterminé (203) ; recevoir un résultat d'interrogation renvoyé par le nœud d'interrogation, et si un résultat d'interrogation ayant la proportion la plus élevée respecte une condition prédéfinie, considérer le résultat d'interrogation ayant la proportion la plus élevée comme étant le résultat d'interrogation correspondant aux données à interroger (204). Le procédé détermine différentes politiques d'interrogation selon différents niveaux de sécurité, ce qui évide des erreurs d'interrogation provoquées par l'attaque d'un seul nœud et la falsification de données, ce qui améliore la crédibilité et l'exactitude du résultat d'interrogation et évite les erreurs d'interrogation et les risques de sécurité résultant de la falsification des données de chaîne de blocs.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201680002915.3A CN106716421B (zh) | 2016-12-30 | 2016-12-30 | 数据查询方法、装置及节点设备 |
PCT/CN2016/113758 WO2018120129A1 (fr) | 2016-12-30 | 2016-12-30 | Procédé, dispositif et appareil de nœud d'interrogation de données |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/113758 WO2018120129A1 (fr) | 2016-12-30 | 2016-12-30 | Procédé, dispositif et appareil de nœud d'interrogation de données |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018120129A1 true WO2018120129A1 (fr) | 2018-07-05 |
Family
ID=58906742
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/113758 WO2018120129A1 (fr) | 2016-12-30 | 2016-12-30 | Procédé, dispositif et appareil de nœud d'interrogation de données |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106716421B (fr) |
WO (1) | WO2018120129A1 (fr) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109118220A (zh) * | 2018-08-03 | 2019-01-01 | 上海点融信息科技有限责任公司 | 在分布式网络中用于处理事务的方法、装置及存储介质 |
CN110209675A (zh) * | 2019-06-18 | 2019-09-06 | 北京艾摩瑞策科技有限公司 | 在区块链上的信用数据查询方法及其装置 |
CN111506930A (zh) * | 2020-04-21 | 2020-08-07 | 广州上云区块链科技有限公司 | 一种基于区块链的电商交易信息管理系统及方法 |
EP3734535A4 (fr) * | 2018-08-21 | 2021-01-06 | Alibaba Group Holding Limited | Procédé et appareil pour identifier l'authenticité d'une preuve de deux parties sur la base de la conservation de preuve de chaîne de blocs |
EP3779692A4 (fr) * | 2018-08-01 | 2021-09-08 | Advanced New Technologies Co., Ltd. | Procédé et dispositif de traitement de données, client et serveur |
CN113779020A (zh) * | 2021-01-25 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | 数据存储方法、数据读取方法、装置、介质及电子设备 |
CN115062347A (zh) * | 2022-08-17 | 2022-09-16 | 四川新网银行股份有限公司 | 一种保障数据价值准确性的数据隐私安全共享方法及系统 |
US11551319B2 (en) | 2018-08-21 | 2023-01-10 | Advanced New Technologies Co., Ltd. | Method and apparatus for determining evidence authenticity based on blockchain ledger |
US11757884B2 (en) | 2018-05-29 | 2023-09-12 | Siemens Aktiengesellschaft | Method and system for controlling the release of a resource |
US20240062214A1 (en) * | 2018-05-04 | 2024-02-22 | Nahmii As | Controlling Transactions on a Network |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107203343B (zh) * | 2017-05-26 | 2019-10-08 | 国信优易数据有限公司 | 一种数据存储方法、系统及设备 |
WO2018214165A1 (fr) * | 2017-05-26 | 2018-11-29 | 深圳前海达闼云端智能科技有限公司 | Procédé, appareil et système de communication, dispositif électronique et support de stockage lisible par ordinateur |
CN109218348B (zh) * | 2017-06-29 | 2020-12-01 | 华为技术有限公司 | 一种区块链中区块的确定方法及节点设备 |
CN107634849A (zh) * | 2017-08-08 | 2018-01-26 | 广东网金控股股份有限公司 | 一种全局区块链环境构建方法 |
CN109697204B (zh) * | 2017-10-23 | 2021-03-30 | 创新先进技术有限公司 | 一种数据审计的方法及装置 |
CN108197498A (zh) * | 2017-12-22 | 2018-06-22 | 中国联合网络通信集团有限公司 | 获取数据的方法及装置 |
CN108170783A (zh) * | 2017-12-26 | 2018-06-15 | 北京比特大陆科技有限公司 | 数据获取方法、装置及电子设备 |
CN108304491B (zh) * | 2018-01-09 | 2021-05-11 | 比特大陆科技有限公司 | 数据查询方法、装置及电子设备 |
CN108717443B (zh) * | 2018-05-17 | 2020-06-05 | 京东数字科技控股有限公司 | 数据共享方法、区块链系统和计算机可读存储介质 |
CN108712506B (zh) * | 2018-05-31 | 2021-02-02 | 中国联合网络通信集团有限公司 | 区块链节点通信方法、装置及区块链节点 |
CN108768672B (zh) * | 2018-05-31 | 2021-10-08 | 中国联合网络通信集团有限公司 | 数据处理方法、装置及存储介质 |
CN108777712B (zh) * | 2018-05-31 | 2020-04-07 | 中国联合网络通信集团有限公司 | 区块链节点通信方法、装置及区块链节点 |
CN108810186B (zh) * | 2018-05-31 | 2021-05-18 | 中国联合网络通信集团有限公司 | 区块链节点通信方法、装置及区块链节点 |
CN108768733B (zh) * | 2018-05-31 | 2021-06-29 | 中国联合网络通信集团有限公司 | 区块链账本处理方法、装置及区块链节点 |
CN109034832A (zh) * | 2018-06-13 | 2018-12-18 | 湖南搜云网络科技股份有限公司 | 区块链的信息处理方法及装置、信息处理节点及存储介质 |
CN108959457B (zh) * | 2018-06-15 | 2020-11-13 | 北京文创园投资管理有限公司 | 一种证书的查询、验证方法和系统 |
CN109101577A (zh) * | 2018-07-19 | 2018-12-28 | 清华大学 | 一种数据流通方法、装置及系统 |
CN109033403B (zh) * | 2018-08-03 | 2020-05-12 | 上海点融信息科技有限责任公司 | 用于搜索区块链数据的方法、装置及存储介质 |
CN109274837B (zh) * | 2018-08-22 | 2020-04-03 | 北京航空航天大学 | 基于区块链技术的电话来源可追溯方法及装置 |
CN109376172B (zh) * | 2018-09-27 | 2020-09-29 | 精硕科技(北京)股份有限公司 | 基于区块链的数据获取方法和系统 |
CN109522462B (zh) * | 2018-10-18 | 2021-06-04 | 上海达家迎信息科技有限公司 | 一种基于区块链的云查询方法、装置、设备及存储介质 |
CN109450996A (zh) * | 2018-10-25 | 2019-03-08 | 国信优易数据有限公司 | 一种数据上链管理方法、装置、设备和区块链系统 |
CN109559136B (zh) * | 2018-11-28 | 2021-03-09 | 中国医学科学院药用植物研究所 | 信息管理系统及方法 |
CN109819443B (zh) * | 2018-12-29 | 2021-09-21 | 东莞见达信息技术有限公司 | 基于区块链的注册认证方法、装置及系统 |
CN110008181A (zh) * | 2019-04-08 | 2019-07-12 | 深圳市网心科技有限公司 | 文件查询方法及装置、计算机装置及存储介质 |
CN110348937A (zh) * | 2019-05-24 | 2019-10-18 | 深圳壹账通智能科技有限公司 | 基于区块链的数据管理方法、装置、介质及电子设备 |
CN110210209A (zh) * | 2019-06-06 | 2019-09-06 | 中星技术股份有限公司 | 管理摄像设备的方法和装置 |
CN111024708B (zh) * | 2019-09-06 | 2022-02-22 | 腾讯科技(深圳)有限公司 | 产品缺陷检测数据处理方法、装置、系统和设备 |
CN110597826A (zh) * | 2019-09-24 | 2019-12-20 | 腾讯科技(深圳)有限公司 | 一种基于区块链网络的数据隔离方法及装置 |
CN110752969B (zh) * | 2019-10-21 | 2021-03-16 | 腾讯科技(深圳)有限公司 | 一种性能检测方法、装置、设备及介质 |
CN111400752A (zh) * | 2020-03-12 | 2020-07-10 | 杭州城市大数据运营有限公司 | 一种基于区块链的数据查询方法、系统及电子设备 |
CN111586068B (zh) * | 2020-05-14 | 2021-05-04 | 上海简苏网络科技有限公司 | 一种解决dpos共识节点权益安全隐患的方法及系统 |
CN111666554B (zh) * | 2020-06-03 | 2023-09-12 | 泰康保险集团股份有限公司 | 一种证书认证方法、装置、设备及存储介质 |
KR102603880B1 (ko) * | 2021-01-08 | 2023-11-20 | 한국전자통신연구원 | 블록 합의 방법 및 트랜잭션 상태 관리 방법 |
CN116578586B (zh) * | 2023-05-06 | 2023-11-17 | 重庆翰海睿智大数据科技股份有限公司 | 一种基于大数据的动态数据查询系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103853986A (zh) * | 2014-01-03 | 2014-06-11 | 李凤华 | 一种访问控制方法和装置 |
CN105976232A (zh) * | 2016-06-24 | 2016-09-28 | 深圳前海微众银行股份有限公司 | 资产交易方法和装置 |
CN106055597A (zh) * | 2016-05-24 | 2016-10-26 | 布比(北京)网络技术有限公司 | 数字交易系统、及用于其的账户信息查询方法 |
US20160321654A1 (en) * | 2011-04-29 | 2016-11-03 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
CN106100981A (zh) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | 社交网络数据交互方法及装置 |
CN106227833A (zh) * | 2016-07-26 | 2016-12-14 | 宁圣金融信息服务(上海)有限公司 | 区块链搜索引擎方法、系统和装置 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102487397B (zh) * | 2010-12-02 | 2016-08-10 | 山东智慧生活数据系统有限公司 | 基于节点底层安全等级的数据存储和路由方法、及节点 |
US20160342977A1 (en) * | 2015-05-20 | 2016-11-24 | Vennd.io Pty Ltd | Device, method and system for virtual asset transactions |
-
2016
- 2016-12-30 WO PCT/CN2016/113758 patent/WO2018120129A1/fr active Application Filing
- 2016-12-30 CN CN201680002915.3A patent/CN106716421B/zh active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160321654A1 (en) * | 2011-04-29 | 2016-11-03 | Stephen Lesavich | Method and system for storage and retrieval of blockchain blocks using galois fields |
CN103853986A (zh) * | 2014-01-03 | 2014-06-11 | 李凤华 | 一种访问控制方法和装置 |
CN106055597A (zh) * | 2016-05-24 | 2016-10-26 | 布比(北京)网络技术有限公司 | 数字交易系统、及用于其的账户信息查询方法 |
CN105976232A (zh) * | 2016-06-24 | 2016-09-28 | 深圳前海微众银行股份有限公司 | 资产交易方法和装置 |
CN106227833A (zh) * | 2016-07-26 | 2016-12-14 | 宁圣金融信息服务(上海)有限公司 | 区块链搜索引擎方法、系统和装置 |
CN106100981A (zh) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | 社交网络数据交互方法及装置 |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20240062214A1 (en) * | 2018-05-04 | 2024-02-22 | Nahmii As | Controlling Transactions on a Network |
US11757884B2 (en) | 2018-05-29 | 2023-09-12 | Siemens Aktiengesellschaft | Method and system for controlling the release of a resource |
US11563805B2 (en) | 2018-08-01 | 2023-01-24 | Advanced New Technologies Co., Ltd. | Method, apparatus, client terminal, and server for data processing |
EP3779692A4 (fr) * | 2018-08-01 | 2021-09-08 | Advanced New Technologies Co., Ltd. | Procédé et dispositif de traitement de données, client et serveur |
CN109118220A (zh) * | 2018-08-03 | 2019-01-01 | 上海点融信息科技有限责任公司 | 在分布式网络中用于处理事务的方法、装置及存储介质 |
EP3734535A4 (fr) * | 2018-08-21 | 2021-01-06 | Alibaba Group Holding Limited | Procédé et appareil pour identifier l'authenticité d'une preuve de deux parties sur la base de la conservation de preuve de chaîne de blocs |
US11551319B2 (en) | 2018-08-21 | 2023-01-10 | Advanced New Technologies Co., Ltd. | Method and apparatus for determining evidence authenticity based on blockchain ledger |
CN110209675A (zh) * | 2019-06-18 | 2019-09-06 | 北京艾摩瑞策科技有限公司 | 在区块链上的信用数据查询方法及其装置 |
CN111506930B (zh) * | 2020-04-21 | 2023-07-18 | 广州上云区块链科技有限公司 | 一种基于区块链的电商交易信息管理系统及方法 |
CN111506930A (zh) * | 2020-04-21 | 2020-08-07 | 广州上云区块链科技有限公司 | 一种基于区块链的电商交易信息管理系统及方法 |
CN113779020A (zh) * | 2021-01-25 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | 数据存储方法、数据读取方法、装置、介质及电子设备 |
CN115062347A (zh) * | 2022-08-17 | 2022-09-16 | 四川新网银行股份有限公司 | 一种保障数据价值准确性的数据隐私安全共享方法及系统 |
CN115062347B (zh) * | 2022-08-17 | 2022-11-04 | 四川新网银行股份有限公司 | 一种保障数据价值准确性的数据隐私安全共享方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN106716421B (zh) | 2020-03-31 |
CN106716421A (zh) | 2017-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018120129A1 (fr) | Procédé, dispositif et appareil de nœud d'interrogation de données | |
CN111414373B (zh) | 一种共识方法和共识系统 | |
US12118556B2 (en) | Database configuration for asset transfers | |
JP6859506B2 (ja) | デジタル証明書管理方法、装置、およびシステム | |
US12341872B2 (en) | Hardware security module management | |
US11469891B2 (en) | Expendable cryptographic key access | |
WO2018090331A1 (fr) | Réseau de chaîne de blocs, procédé et appareil de transaction d'article, et noeud | |
TW201822033A (zh) | 資源處理方法及裝置 | |
WO2020119271A1 (fr) | Procédé d'obtention de preuve d'enregistrement d'écran à base de chaîne de blocs, système et dispositif électronique | |
US11669532B2 (en) | Blockchain implementing reliability database | |
US11489662B2 (en) | Special relationships in a blockchain | |
TWI706362B (zh) | 基於區塊鏈的資料處理方法、裝置和伺服器 | |
WO2021008118A1 (fr) | Procédé et dispositif d'accès à un système de service | |
US20230259930A1 (en) | Cross-chain transaction processing method and apparatus, electronic device, and storage medium | |
CN108573741A (zh) | 业务数据记录方法、装置、设备和存储介质 | |
TWI700606B (zh) | 基於區塊鏈存證的識別證據真實性的方法、裝置及電腦設備 | |
CN111476652B (zh) | 基于区块链的数据处理方法、装置、终端及存储介质 | |
US11734069B2 (en) | Systems and methods for maintaining pooled time-dependent resources in a multilateral distributed register | |
WO2020155811A1 (fr) | Procédé, dispositif et appareil électronique d'exécution de contrat intelligent de chaîne de blocs | |
TW202009856A (zh) | 基於區塊鏈存證的識別雙方證據真實性的方法及裝置 | |
US10158650B1 (en) | Token verification from incremental inputs | |
CN110738502B (zh) | 一种票据处理方法、装置及存储介质装置 | |
CN112635061B (zh) | 基于区块链的数据处理方法、装置、设备及存储介质 | |
JP2022525551A (ja) | データレコードのコピーの分散型台帳システムへの誤伝送の防止 | |
US12166896B2 (en) | Preventing an incorrect transmission of a copy of a record of data to a distributed ledger system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16925780 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30/10/2019) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16925780 Country of ref document: EP Kind code of ref document: A1 |