![]() method and apparatus for data storage, data verification and data binding
专利摘要:
The present application provides a method of data storage, data authentication and data tracking, comprising: determining a first check value of a first data version of a target object (101), searching for a second target value of a second data version of the target object that is adjacent to the first data version (102); create a data block based on the first check value and the second check value (103) and store the data block in a block chain (104). by storing the first check value of the first data version of the target object in the block string in the form of a data block, since the block string has the characteristic of being immutable when a data requester obtains the content of data corresponding to a first data version of a target object, it can verify, based on the first check value stored in the block chain, whether the data content corresponding to the first data version has been modified, thereby determining the authenticity of the data content corresponding to the first version of data, effectively addressing the inability to determine the authenticity of data content due to the ease of modifying data content, and increasing the data analysis efficiency of the data requester. 公开号:BR112019003345A2 申请号:R112019003345 申请日:2017-08-08 公开日:2019-06-11 发明作者:Li Yi;Zhao Zunkui 申请人:Alibaba Group Holding Ltd; IPC主号:
专利说明:
IT DETERMINES A FIRST VALUE: OF VEPJF1CION OF A FIRST VERSION OF GDE. A TARGET OBJECT BU3CA IS A SECOND VALUE OF VERIFICATION OF A SECOND VERSION OF DATA OF THE TARGET OBJECT THAT IS: ADJACENT TO THE FIRST VERSION OF DATA CREATE A DATA BLOCK BASED ON THE FIRST SPECIAL VALUE AND THE SECOND CHECK VALUE: STORING THE DATA BLOCK IN A CHAIN OF BLOCKS 1/34 “DATA STORAGE METHOD AND APPARATUS, DATA VERIFICATION AND DATA LINK” [001] The present application claims priority of the Chinese patent application for application number 201610694496.6 and the title of invention “Data Storage, Data Check, and Data Linkage Method and Apparatus ”, filed on August 19, 2016, all of which is hereby incorporated by reference in this application. Technical Field [002] This application relates to the technical field of Internet information processing, particularly a method and apparatus for storing data, authenticating data and tracking data. Background of the Invention [003] In the era of digitized information, data are no longer records of cold texts, but information resources containing production values. In order to accurately analyze the information resources contained in the data, the authenticity of the data storage needs to be guaranteed, that is, ensuring that the data stored in the database is original data. [004] The so-called “data tracking” can be understood as the recording of evolution information and the evolution processing content of the original data throughout its entire life cycle (from creation to dissemination and extinction). The study of the original data can follow the evolution of the original data over its entire life cycle and determine the source of data from the original data. It is a matter of significance for data providers and data seekers. [005] Currently, a data provider stores data in a database, and stores, in the database, the data content to be stored, as well as other information related to the data to be stored (for example, Petition 870190016696, of 02/19/2019, p. 11/58 2/34 example, creator of the data, if the data had version changes, and time of data creation). When a data requester needs to obtain data from the database, the data provider will provide the data requester with a digital signature to access the data to be obtained. The data requester obtains the data to be obtained from the database based on this digital signature, and verifies the authenticity of the data to be obtained. [006] However, data providers store data in a database, and a large number of databases that are currently used have a modification function. Suppose a data provider promises that it will provide a data requester with version A data (the digital signature corresponding to the data in version A is A1), but for other reasons, the data provider provides the requester of data, data in version B (but the data requester does not know whether the data obtained is data in version A or data in version B), and the digital signature obtained based on version B is B1. To make the data requester believe that the data obtained is data in version A, the data provider can modify the digital signature corresponding to the data in version A stored in the database, that is, modify the data signature of the data in version A to B1. In this way, when the data requester checks for the use of B1, the result of the check is OK. It makes the data requester believe that the data obtained in version B is the data in version A that he wishes to obtain, but in reality, the data obtained by the data requester is not the data in version A that he wishes to obtain. As a consequence, the result of the data analysis that the data requester obtains based on the version B data obtained has a large deviation from the expected result, causing loss to the data requester. [007] In short, there is an urgent need for a data storage method to solve the problem of inability to determine Petition 870190016696, of 02/19/2019, p. 12/58 3/34 the authenticity of data due to the ease of data tampering in current technologies. Summary [008] In light of the above, the modalities of this application provide a method and apparatus for data storage, data authentication and data tracking to address the problem of the inability to determine the authenticity of the data due to the ease of tampering with data. data in current technologies. [009] The modalities of the present application provide a method of data storage, comprising: [010] determine a first verification value of a first version of data for a target object; [011] search for a second verification value of a second version of data of the target object that is adjacent to the first version of data; [012] create a data block based on the first check value and the second check value, and store the data block in a block chain, where the data block stored in the block chain is immutable. [013] The modalities of the present application provide a data storage device, comprising: [014] a determination module determining a first verification value of a first data version of a target object; [015] a search unit searching for a second verification value of a second version of data of the target object that is adjacent to the first version of data; [016] a storage module creating a data block based on the first verification value and the second verification value, and storing the data block in a block chain, where the data block stored in Petition 870190016696, of 02/19/2019, p. 13/58 4/34 block chain is immutable. [017] At least one of the previous technical solutions adopted by the modalities of this application can achieve the following beneficial effect: [018] by determining a first verification value of a first version of data on a target object; searching for a second check value of a second version of the target object's data that is adjacent to the first version of data; create a data block based on the first check value and the second check value and store the data block in a block chain. A first check value of a first data version of a target object is stored in a block chain in the form of a data block. Since the block chain has the characteristic of being immutable, when a data requester obtains the data content corresponding to a first version of data from a target object, he can verify, based on the first verification value stored in the block chain. , if the data content corresponding to the first data version has been modified, thereby determining the authenticity of the data content corresponding to the first data version, effectively solving the problem of the inability to determine the authenticity of the data content due to the ease of modification data content, and increasing the efficiency of data requester data analysis. [019] The modalities of the present application additionally provide a method of data authentication, comprising: [020] receiving a data authentication request, a data authentication request comprising a version identifier of a data version of the data to be authenticated and a verification value obtained based on the data content of the data to be authenticated; [021] based on the version identifier of the data version contained in the Petition 870190016696, of 02/19/2019, p. 14/58 5/34 data authentication request, search, in a block chain, for a pre-stored verification value corresponding to the version identifier of the data version; [022] based on the verification value received contained in the data authentication request and the verification value obtained through the search, authenticate the data content of the data to be authenticated. [023] The modalities of the present application additionally provide a data authentication device, comprising: [024] a receiving module receiving a data authentication request, a data authentication request comprising a version identifier of a data version of the data to be authenticated and a verification value obtained based on the data content of the data to be authenticated; [025] a search module searching, in a block chain, based on the version identifier of the data version contained in the data authentication request, for a pre-stored verification value corresponding to the version identifier of the data version ; [026] an authentication module authenticating the data content of the data to be authenticated based on the verification value received contained in the data authentication request and the verification value obtained through the search. [027] At least one of the previous technical solutions adopted by the modalities of this application can achieve the following beneficial effect: [028] by receiving a data authentication request, which contains a version identifier of a data version of the data to be authenticated and a verification value obtained based on the data content of the data to be authenticated; based on the version identifier of the data version contained in the data authentication request, fetch, in a chain of Petition 870190016696, of 02/19/2019, p. 15/58 6/34 blocks, by a pre-stored verification value corresponding to the version identifier of the data version; based on the verification value received contained in the data authentication request and the verification value obtained through the search, authenticate the data content of the data to be authenticated. As the block chain has the characteristic of being immutable, the pre-stored check value obtained from the block chain that corresponds to the version identifier of the data version is authentic. The authentic verification value is used to verify that the data to be authenticated in a data authentication request has been tampered with, thereby ensuring the authenticity of the data to be authenticated. [029] The modalities of this application additionally provide a method of tracking data, comprising: [030] receive a data backtracking request, the data backward request comprising a version identifier of a first data version of the data to be analyzed by backtracking; [031] based on the version identifier of the first data version, search, in a block chain, for a data block containing the version identifier of the first data version, and obtain, from the data block, a version identifier of a second data version adjacent to the first data version; [032] based on the version identifier obtained from the second version of data, perform the regression sequentially and obtain a data block containing the version identifier of the initial version of the data to be analyzed by retrocession; [033] based on the data block, determine the data content corresponding to the initial version of the data to be analyzed by regression. [034] The modalities of this application additionally provide a Petition 870190016696, of 02/19/2019, p. 16/58 7/34 data tracking device, comprising: [035] a receiving module receiving a data rollback request, the data rollback request comprising a version identifier of a first data version of the data to be analyzed by rollback; [036] a backward module searching, in a chain of blocks, based on the version identifier of the first data version, for a data block containing the version identifier of the first data version, and obtaining, from the block data, a version identifier of a second data version adjacent to the first data version; based on the version identifier obtained from the second data version, perform the backward sequentially to obtain a data block containing the version identifier of the initial version of the data to be analyzed by backward; [037] a determination module determining the data content corresponding to the initial version of the data to be analyzed by regression based on the data block. [038] At least one of the previous technical solutions adopted by the modalities of this application can achieve the following beneficial effect: [039] through the receipt of a backspace request, the backspace request comprising a version identifier of a first version of the data to be analyzed by backspace; based on the version identifier of the first data version, search, in a block chain, for a data block containing the version identifier of the first data version, and obtain, from the data block, a version identifier a second data version adjacent to the first data version; based on the version identifier obtained from the second data version, perform the backward sequentially to obtain a data block containing the version identifier Petition 870190016696, of 02/19/2019, p. 17/58 8/34 of the initial version of the data to be analyzed by regression; based on the data block, determine the data content corresponding to the initial version of the data to be analyzed by backsliding. Since both a version identifier of a first data version of a target object and a version identifier of a second data version adjacent to the first data version are stored in the form of a data block in the block chain, and since the chain of blocks has the characteristic of being immutable and adopts a structure of linked data, it is possible to perform the regression and find evolved versions of the data to be analyzed by regression, as well as the data content corresponding to each evolved version, and ensure the authenticity of data evolution. BRIEF DESCRIPTION OF THE DRAWINGS [040] The drawings described here are designed to provide an additional understanding of this application and form part of this application, and the illustrative modalities of this application and its descriptions are intended to explain this application and not to limit this application. In the drawings: [041] FIG. 1 is a flow chart of a data storage method in accordance with some embodiments of the present application. [042] FIG. 2 is a structural diagram of the data blocks created in the various blocks in a block chain. [043] FIG. 3 is a flow chart of a data authentication method according to some embodiments of the present application. [044] FIG. 4 is a schematic diagram of a scenario for a data authentication method according to some embodiments of the present application. [045] FIG. 5 is a flow chart of a data tracking method in accordance with some embodiments of the present application. [046] FIG. 6 is a schematic diagram of a scenario of a method of Petition 870190016696, of 02/19/2019, p. 18/58 9/34 data tracking according to some modalities of this application. [047] FIG. 7 is a structural diagram of a data storage device according to some embodiments of the present application. [048] FIG. 8 is a structural diagram of a data authentication apparatus in accordance with some embodiments of the present application. [049] FIG. 9 is a structural diagram of a data tracking apparatus in accordance with some embodiments of the present application. Detailed Description [050] In order to achieve the objectives of this application, the modalities of this application provide a method and apparatus for data storage, data authentication and data tracking, storing a first verification value of a first version of data of a target object in a block chain in the form of a data block. Since the block chain has the characteristic of being immutable, when a data requester obtains the data content corresponding to the first data version of a target object, he can verify, based on the first verification value stored in the block chain, if the data content corresponding to the first data version has been modified, thereby determining the authenticity of the data content corresponding to the first data version, effectively solving the problem of the inability to determine the authenticity of the data content due to the ease of modifying the data. data content, and increasing the efficiency of data requester data analysis. [051] It should be noted that the block chain recorded in the modalities of this application can be understood as a reliable database, and the trusted database is a database similar to a non-relational database. Compared to a conventional database, the reliable database has the following difference: the reliable database is characterized by being Petition 870190016696, of 02/19/2019, p. 19/58 10/34 decentralized and independent of trust. The term “decentralized” means that, in a system based on a chain of blocks, there is no centralized hardware or management body, the rights and obligations between any nodes in the systems are equal, and the damage or loss of any node will not affect the operation of the entire system. [052] The term “trustless” means that participation in the exchange of data between any nodes in the entire system does not require mutual trust, the rules of operation for the entire system are open and transparent, and the content system-wide data is also open, so within a range of rules and times defined by the system, no node can or can circumvent other nodes. [053] The technical solutions registered in the modalities of this application propose a data structure (subsequently, it can be called a “data block”). This data structure contains a data header and a data body. The data header stores a check value from a current data version of a target object and a check value from a previous data version adjacent to the current data version to facilitate subsequent data tracking of the target object. The data body can store data content of the target object corresponding to the current data version or it can store other content. No limitations are defined here. In this way, through this data structure and a chain of blocks, the integrity and authenticity of the target object and its evolution are ensured. [054] The technical solutions of this application will now be described in a clear and complete manner by reference to the modalities and accompanying drawings of this application. Obviously, the modalities described are just a few and not all of the modalities of this application. Based on the modalities in this application, all other modalities obtained by those skilled in the art Petition 870190016696, of 02/19/2019, p. 20/58 11/34 without creative effort should fall within the scope of this application. [055] The technical solutions according to the modalities of this application are described in detail below by reference to the accompanying drawings. Mode 1 [056] FIG. 1 is a flow chart of a data storage method in accordance with some embodiments of the present application. The method can be as shown below. [057] Step 101: determine a first verification value of a first version of data for a target object. [058] In the modalities of this application, the target object, here can be given in any form. They can be in commercial form, a manuscript for a book, or a software source code; or they can be a set of images, a song, or a video. No limitations are defined here. [059] The data versions of the target object, here, can refer to different data contents evolved and generated throughout the life cycle of the target object. An identifier can be defined for each data content unit. This identifier can be called the version identifier of a data version. [060] For example: For a video, each part of the video (or each period) can be called a data version. Assuming that the first part of video A corresponds to data version 1.0, then, in the process of evolution, the second part of video A corresponds to data version 2.0, the third part of video A corresponds to data version 3.0, .. ., and the nth part of video A corresponds to data version n. 0. [061] As another example: For application software, a plurality of versions of the application software may appear according to the needs of Petition 870190016696, of 02/19/2019, p. 21/58 12/34 development. Let's assume that the versions of the application software in the application software evolution process include version 1.0, version 1.0.1, version 1.0.1.1, aversion 2.0, aversion 2.0.1, ... [062] The first data version of the target object in the modalities of this application may refer to a current data version of the target object. Taking the previous application software as an example, the version number corresponding to the first data version is 2.0.1. [063] For example, in the modalities of this application, methods for determining a first verification value of a first version of data for a target object include, without limitation, the following method: [064] First, determine a summary of the data content of the target object in the first version of data; second, to calculate a first verification value of a first version of data of the target object according to a predefined algorithm and the summary of data content. [065] For example: A description is made using the example of a software source code as the target object. The data content summary for the current version of the software source code is determined. A hash algorithm is then used to process the summary of data content to obtain a hash-encoded value for the current version of the software source code (here, this can also be called the first check value). [066] It should be noted that the predefined algorithm can be a hash algorithm, or it can be any other algorithm (for example, SHA-1). No limitations are defined here. [067] Step 102: search for a second verification value of a second version of data of the target object that is adjacent to the first version of data. [068] A second version of the data of the target object in the modalities of Petition 870190016696, of 02/19/2019, p. 22/58 13/34 The present application may refer to a previous data version adjacent to the current data version of the target object. Taking the previous application software as an example, the version number corresponding to a second version of data is 2.0. [069] For example, a version identifier of a second data version adjacent to the first data version of the target object is determined; [070] a data block writing a version identifier of the second data version is fetched in the block chain, and a second check value of a second data version of the target object is read from the data block. [071] It should be noted that if the current data version of a target object is the original data version (example: version 1.0 of the application software), since there is no previous data version adjacent to the first version of data, there is no need to search for the second verification value recorded in Step 102. [072] Additionally, after determining a version identifier of a second data version adjacent to the first data version of the target object, the method for determining a first verification value as recorded in Step S101 can be referenced to obtain a second value of verification. Here, it should be noted that if a second check value is obtained according to the method for determining a first check value as recorded in Step S101, it is necessary to ensure that the data content of the second version of data adjacent to the first version data of the target object has not been tampered with. [073] Or a data block written a version identifier of the second data version is fetched in the block chain, then the data content summary of the second data version of the target object is read from the data block, and then a second check value is obtained by reference to the method for determining a first check value as recorded in Step S101. Petition 870190016696, of 02/19/2019, p. 23/58 14/34 [074] Step 103: create a data block based on the first check value and the second check value. [075] In Step 103, after obtaining a first verification value and a second verification value of the target object, a data block is created based on the first verification value and the second verification value. [076] For example, the data block created contains a data header and a data body. [077] The first check value and the second check value are written in the data header of the data block according to a predefined format. [078] Table 1 is a schematic table of the verification values written in a data header of a data block. Table 1_________________________________________________________ _________________ Data Header________________ _____First check value: 1234567890ZXCV_____ ____________ Second check value: null____________ Time label: XXXX year YYYY month ZZZZ day 10:00:00 [079] From Table 1, you can see that the time label of data block generation is: XXXX year YYYY month ZZZZ day 10:00:00, the first check value written in the data block is 1234567890ZXCV, and the second check value is null. Thus, it can be seen that the data block is the initial data of a target object (for example, data), that is, it is the data source of a target object. [080] Optionally, since a first verification value / second verification value of a target object is obtained through an irreversible algorithm, different versions of data from a target object obtain different verification values through calculation, that is, the first verification value / second verification value of a target object is unique. [081] Table 2 is a schematic table of the verification values Petition 870190016696, of 02/19/2019, p. 24/58 15/34 written in a data header of a data block. Table 2_____________________________________________________ ______________Data header part______________ First verification value:! @ # ¥% ...... & * () ASDF ______ Second verification value: 1234567890ZXCV______ Time label: MM MM year NNNN month ZZZZ day 14:00:00 [082] From Table 2, you can see the data block generation time label is: MMMM year NNNN month ZZZZ day 14:00:00, the first check value written in the data block is! @ # ¥% ...... & * () ASDF, and the second check value is 1234567890ZXCV. Thus, it can be seen that, since the second verification value in Table 2 is equal to the first verification value in Table 2, the data version corresponding to the data block illustrated in Table 1 is an adjacent adjacent data version. the data version corresponding to the data block as shown in Table 2. [083] It should be noted that the data header of a data block can also store the version identifiers of two adjacent data versions, that is, a version identifier of a first data version and a version identifier of a second version of data. [084] Optionally, in addition to a data header, the data block created also comprises a body of data. The data content summary of the target object in the first data version, or the second check value, or the data content of the first data version of the target object can be written into the data body of the data block. [085] FIG. 2 is a structural diagram of the data blocks created in the various blocks in a block chain. [086] From FIG. 2, it can be seen that data block 1, data block 2 and data block 3 correspond to the same target object. In the data body of data block 1, a summary of data content from a current data version / or from an adjacent adjacent data version is stored. At the Petition 870190016696, of 02/19/2019, p. 25/58 16/34 data body of data block 2, a check value from a current data version / from an adjacent adjacent data version is stored. In the data body of data block 3, the data content of a current data version / or a previous adjacent data version is stored. [087] In another embodiment of the present application, the data content of a target object can be stored in a data block, and can also be stored in a cloud data gateway or database. [088] It should be noted that when the data volume of the data content is small, the data block 3 approach can be selected with priority as a way to store the data content. [089] For example, the data content of the first data version of the target object is stored in a cloud data gateway or in a database. [090] It should also be noted that the data body of a data block can not only store the content described above, but can also register a digital signature of a target object that is provided by the data provider in order to facilitate a data requester when authenticating the data provider's identity. The data body can also record the data block creation time and other relevant information, a version identifier of a data version, etc. No limitations are imposed here. [091] Step 104: store the data block in a block chain. [092] Here, the data block stored in the block chain is immutable. [093] In Step 104, the data block is added to the block chain according to a linked data structure. [094] For example, a newly created data block is added to the end of a data block that has been connected to the block chain. [095] In another modality of the present order, after storing the block of Petition 870190016696, of 02/19/2019, p. 26/58 17/34 data in the block chain, the method additionally comprises: [096] to store a mapping relationship between a version identifier of a first version of data of the target object and a block identifier of the data block. [097] alternatively, store a mapping relationship between a version identifier of a first data version of the target object and a block identifier of the data block. [098] It should also be noted that, in the modalities of this application, the storage of a data block in the block chain can also be designated as the execution of the operation of adding a data block to the block chain in order to store it in the block chain. [099] Through the technical solutions registered in the modalities of the present application, a first verification value of a first version of data of a target object is determined, and a second verification value of a second version of data of the target object that is adjacent the first check value is fetched; based on the first check value and the second check value, a data block is created, and the data block is stored in a block chain. A first check value of a first data version of a target object is stored in a block chain in the form of a data block. Since the block chain has the characteristic of being immutable, when a data requester obtains the data content corresponding to a first version of data from a target object, he can verify, based on the first verification value stored in the block chain. , if the data content corresponding to the first data version has been modified, thereby determining the authenticity of the data content corresponding to the first data version, effectively solving the problem of the inability to determine the authenticity of the data content due to the ease of modification Petition 870190016696, of 02/19/2019, p. 27/58 18/34 of the data content, and increasing the efficiency of data analysis of the data requester. Mode 2 [0100] Based on the same inventive concept, FIG. 3 is a flow chart of a data authentication method according to some embodiments of the present application. The method can be as shown below. [0101] Step 301: receive a data authentication request. [0102] The data authentication request contains a version identifier of a data version of the data to be authenticated and a verification value obtained based on the data content of the data to be authenticated. [0103] In Step 301, the executive agent of the modalities of the present application can be a chain of blocks, or it can be another device. No limitations are imposed here. [0104] For example, when a data requester receives data provided by a data provider, he can consider the data provided as data to be authenticated, determine a version identifier of the data version of the data to be authenticated, and obtain, through calculation, a verification value of the data to be authenticated based on the data content obtained from the data to be authenticated. [0105] In this case, in order to ensure that the data received to be authenticated is authentic, the data requester sends a data authentication request to the block chain to verify that the data provided by the data provider has been tampered with. [0106] Step 302: Based on a version identifier of a data version contained in the data authentication request, search, in a block chain, for a pre-stored verification value corresponding to the version identifier of the version of Dice. Petition 870190016696, of 02/19/2019, p. 28/58 19/34 [0107] In Step 302, since a data block is generated during the storage of a target object, and the data block is stored in a chain of blocks, a mapping relationship between a version identifier of a first data version of the target object and a block identifier of the data block is stored when the data block is stored in the block chain. [0108] When a data authentication request is received, the block identifier of the data block corresponding to the version identifier of the data version contained in the data authentication request is determined based on the pre-stored mapping relationships between the version identifiers for data versions, unit identifiers for data blocks, and block identifiers for blocks. [0109] Q check value corresponding to the version identifier of the data version is read from the data block corresponding to the block identifier. [0110] It should be noted that the verification value corresponding to the version identifier of the data version obtained in Step 302 is generated during the storage of the target object and is stored in a block chain, so that the verification value obtained through the search be authentic. [0111] Step 303: Based on the verification value received contained in the data authentication request and the verification value obtained through the search, authenticate the data content of the data to be authenticated. [0112] In Step 303, the verification value received contained in the data authentication request is compared with the verification value obtained through the search. [0113] When the verification value received contained in the data authentication request is the same as the verification value obtained through the search, it is determined that the data content of the data to be authenticated is Petition 870190016696, of 02/19/2019, p. 29/58 20/34 authentic. [0114] When the verification value received contained in the data authentication request is different from the verification value obtained through the search, it is determined that the data content of the data to be authenticated has been modified. [0115] Through the technical solutions offered by the modalities of this application, a data authentication request is received, which contains a version identifier of a data version of the data to be authenticated and a verification value obtained based on the content data of the data to be authenticated; based on the version identifier of the data version contained in the data authentication request, a pre-stored check value corresponding to the version identifier of the data version is fetched from the block chain; based on the verification value received contained in the data authentication request and the verification value obtained through the search, the data content of the data to be authenticated is authenticated. As the block chain has the characteristic of being immutable, the pre-stored check value in the block chain that is obtained by searching and corresponding to the version identifier of the data version is authentic. The authentic verification value is used to verify that the data to be authenticated in a data authentication request has been tampered with, thereby ensuring the authenticity of the data to be authenticated. [0116] FIG. 4 is a schematic diagram of a scenario for a data authentication method according to some embodiments of the present application. [0117] From FIG. 4, it can be seen that the block chain contains a plurality of data nodes. These data nodes can receive data authentication requests sent by different users. Corresponding data information is fetched from the block chain based on information from Petition 870190016696, of 02/19/2019, p. 30/58 21/34 data transmitted in the data authentication request (here, they can refer to a verification value). Based on the data information received and the data information obtained through the search, the data to be authenticated in the data authentication request is authenticated to ensure that the data requester can obtain authentic and valid data. Mode 3 [0118] FIG. 5 is a flow chart of a data tracking method in accordance with some embodiments of the present application. The method can be as shown below. [0119] Step 501: receive a data back request. [0120] The data rollback request contains a version identifier of a first data version of the data to be analyzed by rollback. [0121] In Step 501, when the evolution process or the evolution history of a target object needs to be sought, the operations of the modalities of the present order can be initiated, that is, by sending a data retraction request. The data rollback request contains a version identifier for a first data version of the data to be analyzed by rollback. [0122] Here, the version identifier of a first data version can be the version identifier of a current data version, or it can be the version identifier of any data version. No limitations are imposed here. [0123] Here, the version identifier of a first version of data is used to determine a starting point to perform the rollback in the data to be analyzed by rollback. For example: application software, with a current data version of 3.0. Once a rollback request is initiated, the Petition 870190016696, of 02/19/2019, p. 31/58 22/34 version identifier of the data version transmitted in the rollback request can be 3.0, or it can be 3.0, etc. No limitations are imposed here. [0124] Step 502: Based on an identifier of a first version of data, search, in a chain of blocks, for a data block containing the version identifier of the first version of data, and obtain, from the block of data, a version identifier of a second data version adjacent to the first data version. [0125] In Step 502, since the data block not only stores a version identifier of a first version of data, it also stores a version identifier of a previous second version of data adjacent to the version identifier of the first version of data, a data block containing the version identifier of the first data version can be obtained based on the version identifier of the first data version, and the version identifier of a previous second data version adjacent to the version identifier of the first version of data is obtained from the data block. [0126] Step 503: Based on the version identifier obtained from the second version of data, perform the backward sequentially to obtain a data block containing the version identifier of the initial version of the data to be analyzed by backtracking. [0127] In Step 503, the version identifier obtained from the second data version is chosen as a starting point and analyzed in reverse by the method described in Step 502 to find a data block containing the version identifier of the initial version of the data to be analyzed by regression. [0128] For example, based on the version identifier obtained from a data version, the following operations are performed until a block of Petition 870190016696, of 02/19/2019, p. 32/58 23/34 data containing the version identifier of the initial version of the data to be analyzed by regression is obtained: [0129] search, in the block chain, for a data block containing a version identifier of the data version obtained, and obtain, from the data block, a version identifier of a previous data version adjacent to the version of obtained data; [0130] trigger the cyclic execution of the previous operation until a data block containing the version identifier of the initial version of the data to be analyzed by regression is obtained. [0131] It should be noted that, here, the version identifier obtained from a data version can be a version identifier of any version of data, except the first version of data. [0132] Step 504: Based on the data block, determine the data content corresponding to the initial version of the data to be analyzed by backspace. [0133] It should be noted that, in the modalities of this application, whenever a version identifier of a data version is obtained, the data content corresponding to the data version can be determined. In this way, the process of evolution of the data to be analyzed by regression can be analyzed based on the data content obtained, to analyze in an authentic and effective way the production value contained in the data to be analyzed by regression. [0134] Through the technical solutions of the modalities of this request, a request for data retraction is received, which contains a version identifier of a first version of data of the data to be analyzed by retrocession; based on the version identifier of the first data version, a data block containing the version identifier of the first data version is fetched in the block chain, and a version identifier of a second version Petition 870190016696, of 02/19/2019, p. 33/58 24/34 of data adjacent to the first version of data is obtained from the data block; based on the version identifier obtained from the second data version, the sequential rollback is performed and a data block containing the version identifier of the initial version of the data to be analyzed by rollback is obtained; based on the data block, the data content corresponding to the initial version of the data to be analyzed by regression is determined. Since both a version identifier of a first data version of a target object and a version identifier of a second data version adjacent to the first data version are stored in the form of a data block in the block chain, and since the chain of blocks has the characteristic of being immutable and adopts a structure of linked data, it is possible to analyze by regression and find evolved versions of the data to be analyzed by regression, as well as the data content corresponding to each evolved version, and ensure the authenticity of data evolution. [0135] FIG. 6 is a schematic diagram of a scenario for a data tracking method in accordance with some embodiments of the present application. [0136] From FIG. 6, it can be seen that the block chain adopts a linked data structure. When one of the data blocks is determined, other data blocks associated with the data block can be obtained according to the aspects of the linked data structure, thus achieving the objective of tracing the source of the data, while ensuring that information obtained is authentic. [0137] Let's assume that there are five blocks of data corresponding to the target object. They are data block 1, data block 2, data block 3, data block 4 and data block 5. Here, the data blocks storing version identifiers of the data versions are taken as a example. [0138] The version identifiers of the data versions stored in the Petition 870190016696, of 02/19/2019, p. 34/58 25/34 data block 5 is 5.0 and 4.0. The version identifiers of the data versions stored in data block 4 are 4.0 and 3.0. The version identifiers of the data versions stored in data block 3 are 3.0 and 2.0. The version identifiers of the data versions stored in data block 2 are 2.0 and 1.0. The version identifier of the data version stored in data blocks 1 is 1.0. During data tracking, data block 51 is first followed by data block 4, data block 3 and data block 2, and lastly, data block 1. In this way, the purpose of data tracking data can be reached completely. Mode 4 [0139] Based on the same inventive concept, FIG. 7 is a structural diagram of a data storage device according to some embodiments of the present application. The data storage device comprises: a determination module 71, a search module 72 and a storage module 73. Here: [0140] the determination module 71 determines a first verification value of a first data version of a target object; [0141] the search module 72 searches for a second check value of a second version of data of the target object that is adjacent to the first version of data; [0142] the storage module 73 creates, based on the first check value and the second check value, a data block and stores the data block in a block chain, where the data block stored in the chain blocks is immutable. [0143] In another embodiment of the present application, the determination module 71 determining a first verification value of a first version of data of a target object comprises: Petition 870190016696, of 02/19/2019, p. 35/58 26/34 [0144] determine a summary of data content of the target object in the first data version; [0145] according to a predefined algorithm and the summary of data content, calculate to obtain the first verification value of the first data version of the target object. [0146] In another embodiment of the present application, the storage module 72 creating a data block based on the first verification value and the second verification value comprises: [0147] create a data block, and write the first check value and the second check value in the data header of the data block according to a predefined format. [0148] In another embodiment of the present application, the data storage device additionally comprises: a writing module 74. Here: [0149] Writing module 74 writes the summary of data content of the target object in the first data version, or the second check value, or the data content of the first data version of the target object in a data body. block of data. [0150] In another embodiment of the present application, storage module 72 stores the data content of the first data version of the target object in a cloud data gateway or in a database. [0151] In another embodiment of the present application, storage module 72 stores a mapping relationship between the version identifier of the first data version of the target object and a block identifier of the data block after storing the data block in a block of the block chain. [0152] In another embodiment of the present application, storage module 72 storing the data block in the block chain Petition 870190016696, of 02/19/2019, p. 36/58 27/34 comprises: [0153] according to a linked data structure, add the data block to the block chain. [0154] It should be noted that the data storage device according to the modalities of this application can be reached by hardware or software. No limitations are imposed here. The data storage device stores a first verification value of a first data version of a target object in the form of a data block in a block chain. As the block chain has the characteristic of being immutable, when a data requester obtains the data content corresponding to the first data version of the target object, he can check, based on the first verification value stored in the block chain, if the data content corresponding to the first data version has been modified, thereby determining the authenticity of the data content corresponding to the first data version, effectively solving the problem of the inability to determine the authenticity of the data content due to the ease of modifying the content data, and increasing the efficiency of data analysis for a data requester. Mode 5 [0155] FIG. 8 is a structural diagram of a data authentication apparatus in accordance with some embodiments of the present application. The data authentication device comprises: a receiving module 81, a search module 82 and an authentication module 83. Here: [0156] the receiving module 81 a data authentication request, which contains a version identifier of a data version of the data to be authenticated and a verification value obtained based on the data content of the data to be authenticated; [0157] search module 82 searches, in a chain of blocks, based on the Petition 870190016696, of 02/19/2019, p. 37/58 28/34 version identifier of the data version contained in the data authentication request, by a pre-stored verification value corresponding to the version identifier of the data version; [0158] an authentication module 83 authenticates the data content of the data to be authenticated based on the verification value received contained in the data authentication request and the verification value obtained through the search. [0159] In another embodiment of this request, authentication module 83 authenticating the data content of the data to be authenticated based on the verification value received contained in the data authentication request and the verification value obtained through the search comprises : [0160] when the verification value received contained in the data authentication request is the same as the verification value obtained through the search, determine that the data content of the data to be authenticated is authentic; [0161] when the verification value received contained in the data authentication request is different from the verification value obtained through the search, determine that the data content of the data to be authenticated has been modified. [0162] In another embodiment of the present request, the search unit 82 searching, in the block chain, based on the version identifier of the data version contained in the data authentication request, for a pre-stored verification value corresponding to the version identifier of the data version comprises: [0163] based on the pre-stored mapping relationship between the version identifiers of the data versions and the block identifiers of the data blocks, determine the block identifier of the data block Petition 870190016696, of 02/19/2019, p. 38/58 29/34 corresponding to the version identifier of the data version in the data authentication request; [0164] read a check value corresponding to the version identifier of the data version from the determined data block corresponding to the block identifier. [0165] It should be noted that the data authentication device according to the modalities of this application can be reached by hardware or software. No limitations are imposed here. As the block chain has the characteristic of being immutable, the pre-stored check value sought in the block chain that corresponds to the version identifier of the data version is authentic. The authentic verification value is used to verify that the data to be authenticated in a data authentication request has been tampered with, thereby ensuring the authenticity of the data to be authenticated. Mode 6 [0166] FIG. 9 is a structural diagram of a data tracking apparatus in accordance with some embodiments of the present application. The data tracking device comprises: a receiving module 91, a backward module 92 and a determination module 93. Here: [0167] the receiving module 91 receives a data back request, the data back request comprising a version identifier of a first data version of the data to be analyzed by backwards; [0168] the retraction module 92 searching, in the block chain, based on the version identifier of the first data version, for a data block containing the version identifier of the first data version, and obtains, from the block database, a version identifier of a second data version Petition 870190016696, of 02/19/2019, p. 39/58 30/34 adjacent to the first data version; based on the version identifier obtained from the second data version, it performs the sequential backspace and obtains a data block containing the version identifier of the initial version of the data to be analyzed by backspace; [0169] a determination module 93 determines the data content corresponding to the initial version of the data to be analyzed by regression based on the data block. [0170] In another modality of the present application, the retraction module 92, based on the version identifier obtained from the second data version, performing the sequential retraction to obtain a data block containing the version identifier of the initial version of the data to be analyzed by regression comprises: [0171] Based on the version identifier obtained from a data version, perform the following operation until a block of data containing the version identifier of the initial version of the data to be analyzed by regression is obtained: [0172] search, in the block chain, for a data block containing a version identifier of the data version obtained, and obtain, from the data block, a version identifier of a previous data version adjacent to the version of obtained data; [0173] trigger the cyclic execution of the previous operation until a block of data containing the version identifier of the initial version of the data to be analyzed by regression is obtained. [0174] It should be noted that the data tracking device according to the modalities of this application can be reached by hardware or software. No limitations are imposed here. Since both a version identifier of a first data version of a target object and a version identifier of a second data version adjacent to the first data version are stored in the form of a data block in the block chain, and once Petition 870190016696, of 02/19/2019, p. 40/58 31/34 that the chain of blocks has the characteristic of being immutable and adopts a structure of linked data, it is possible to analyze by regression and find evolved versions of the data to be analyzed by regression, as well as the data content corresponding to each evolved version , and ensure the authenticity of the data evolution. [0175] Those skilled in the art should understand that the modalities of the present application may be provided in the form of methods, systems or computer program products, therefore, the present application may adopt modalities in the form of pure software, pure hardware, or a combination of software and hardware. In addition, the present application may take the form of a computer program product implemented on one or a plurality of storage media usable per computer (including, but not limited to disk memory, CD-ROM and optical memory) , which contains computer-usable program codes. [0176] The present application is described by reference to the flowcharts and / or block diagrams of the methods, devices (systems) and computer program products according to the modalities of the present invention. It should be understood that each flow and / or block in flowcharts and / or block diagrams and combinations of flows and / or blocks in flowcharts and / or block diagrams can be obtained through computer program instructions. These computer program instructions can be provided to the processor of a general-purpose computer, to a special-purpose computer, embedded processor, or other programmable data processing equipment to generate a machine so that, through instructions executed by the processor of the computer or other programmable data processing equipment, an apparatus for achieving designated functions in one or a plurality of flows in flowcharts and / or a plurality of blocks in Petition 870190016696, of 02/19/2019, p. 41/58 32/34 flow diagrams are generated. [0177] These computer program instructions can also be generated in computer-readable memory that can guide a computer or other programmable data processing equipment to function in a specific way so that instructions stored in computer-readable memory generate a product comprising the instruction apparatus. The instructional apparatus achieves the functions assigned in one or a plurality of flows in the flowcharts and / or one or a plurality of blocks in the block diagrams. [0178] These computer program instructions can also be loaded onto a computer or other programmable data processing equipment so that a series of operational steps are performed on the computer or other programmable data processing equipment to generate the processing achieved by computer. Thus, instructions executed on the computer or other computer programmable data processing equipment offer steps to achieve the functions designated in one or a plurality of flows in the flowcharts and / or in one or a plurality of blocks in the block diagrams. [0179] In a typical configuration, the computing equipment comprises one or a plurality of processors (CPU), I / O interfaces, network interfaces and internal memories. [0180] The internal memory can be in the form of volatile memory, random access memory (RAM) and / or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM) in computer-readable media . Internal memory is an example of a computer-readable medium. [0181] Computer-readable media includes non-volatile, volatile, mobile and non-mobile media, and can achieve information storage by any method or technology. Information can be readable instructions Petition 870190016696, of 02/19/2019, p. 42/58 33/34 by computer, data structures, program modules or other data. Examples of computer storage media include, without limitation, phase shifted random access memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM) and other types of random access memory ( RAM), read-only memory (ROM), erasable electrically programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only memory - compact disc (CD-ROM), digital video disc (DVD) or other optical memory, tape-type magnetic tape, tape disk memory or other magnetic storage devices, or any other means other than transfer. They can be used to store information that is accessible to computer devices. According to the definition in this document, computer-readable media does not include temporary media, such as modulated data signals and carriers. [0182] It should also be noted that the terms "includes", "contains", "comprises", or their variants, are intended to cover a non-exclusive inclusion, so that a process, method, good or equipment including a series of elements not only include these elements, but also include other elements not clearly listed, or also include the elements intrinsic to such a process, method, good or equipment. Unless otherwise indicated, the elements defined by the expression “including a ...” do not exclude the presence of other similar elements in the process, method, good or equipment including the elements. [0183] Those skilled in the art should understand that the modalities of this application can be provided in the form of methods, systems or computer program products, therefore, this application can adopt modalities in the form of pure software, pure hardware, or a combination of Petition 870190016696, of 02/19/2019, p. 43/58 34/34 software and hardware. In addition, the present application may take the form of a computer program product implemented on one or a plurality of storage media usable by computer (including, but not limited to, disk memory, CD-ROM and optical memory) , which contains computer-usable program codes. [0184] The above descriptions are modalities of this application and are not intended to limit this application. For those skilled in the art, the present application may undergo several changes and modifications. All modifications, equivalent replacements and enhancements made without departing from the spirit and principles of this order must fall within the scope of the claims in this order.
权利要求:
Claims (24) [1] 1. Data storage method, CHARACTERIZED by the fact that the method comprises: determining a first verification value of a first data version of a target object; searching for a second check value of a second version of the target object's data that is adjacent to the first version of data; create a data block based on the first check value and the second check value, and store the data block in a block chain, where the data block stored in the block chain is immutable. [2] 2. Data storage method, according to claim 1, CHARACTERIZED by the fact that determining a first verification value of a first data version of a target object comprises: determine a summary of data content of the target object in the first data version; calculate to obtain the first verification value of the first data version of the target object according to a predefined algorithm and the summary of data content. [3] 3. Data storage method, according to claim 1, CHARACTERIZED by the fact that creating a data block based on the first verification value and the second verification value comprises: create the data block, and write the first check value and the second check value in a data header of the data block according to a predefined format. [4] 4. Data storage method, according to claim 3, CHARACTERIZED by the fact that the method additionally comprises: write a summary of data content of the target object in the first Petition 870190016696, of 02/19/2019, p. 45/58 2/9 data version, or the second check value, or the data content of the first data version of the target object in a data block data body. [5] 5. Data storage method, according to claim 3, CHARACTERIZED by the fact that the method additionally comprises: store the data content of the first data version of the target object in a cloud data gateway or in a database. [6] 6. Data storage method, according to claim 1, CHARACTERIZED by the fact that, after storing the data block in the block chain, the method additionally comprises: store a mapping relationship between a version identifier of the first data version of the target object and a block identifier of the data block. [7] 7. Data storage method, according to any one of claims 1 to 6, CHARACTERIZED by the fact that the act of storing data blocks in a block chain comprises: according to a linked data structure, add the data block to the block chain. [8] 8. Data authentication method, CHARACTERIZED by the fact that the method comprises: receiving a data authentication request, a data authentication request comprising a version identifier of a data version of the data to be authenticated and a verification value obtained based on the data content of the data to be authenticated; based on the version identifier of the data version contained in the data authentication request, search, in a block chain, for a pre-stored verification value corresponding to the version identifier of the data version; Petition 870190016696, of 02/19/2019, p. 46/58 3/9 Based on the verification value received contained in the data authentication request and the verification value obtained through the search, authenticate the data content of the data to be authenticated. [9] 9. Data authentication method, according to claim 8, CHARACTERIZED by the fact that, based on the verification value received contained in the data authentication request and the verification value obtained through the search, the act of authenticating the data content of the data to be authenticated comprises: when the verification value received contained in the data authentication request is the same as the verification value obtained through the search, determine that the data content of the data to be authenticated is authentic; when the verification value received contained in the data authentication request is different from the verification value obtained through the search, determine that the data content of the data to be authenticated has been modified. [10] 10. Data authentication method, according to claim 8 or 9, CHARACTERIZED by the fact that, based on the version identifier of the data version contained in the data authentication request, search the block chain for a pre-stored verification value corresponding to the version identifier of the data version comprises: based on the pre-stored mapping relationships between the version identifiers of the data versions and the block identifiers of the data blocks, determine a block identifier of a data block corresponding to the version identifier of the data version in the request for data authentication; read the check value corresponding to the version identifier of the Petition 870190016696, of 02/19/2019, p. 47/58 4/9 data version from the determined data block corresponding to the block identifier. [11] 11. Data tracking method, FEATURED by the fact that the method comprises: receive a backtracking request, the backtracking request comprising a version identifier of a first data version of the data to be analyzed by backtracking; based on the version identifier of the first data version, search, in a block chain, for a data block containing the version identifier of the first data version, and obtain, from the data block, a version identifier a second data version adjacent to the first data version; based on the version identifier obtained from the second data version, perform the backward sequentially to obtain a data block containing the version identifier of the initial version of the data to be analyzed by backward; based on the data block, determine the data content corresponding to the initial version of the data to be analyzed by backsliding. [12] 12. Data tracking method, according to claim 11, CHARACTERIZED by the fact that, based on the version identifier obtained from the second data version, perform the backward sequentially to obtain a data block containing the data identifier version of the initial version of the data to be analyzed by regression comprises: based on a version identifier obtained from a data version, perform the following operation until a data block containing the version identifier of the initial version of the data to be analyzed by backspace is obtained: search, in the block chain, for a data block containing the version identifier obtained from the data version, and obtain, from the data block, a Petition 870190016696, of 02/19/2019, p. 48/58 5/9 version identifier of a previous data version adjacent to the obtained data version; trigger the cyclic execution of the previous operations until a block of data containing the version identifier of the initial version of the data to be analyzed by regression is obtained. [13] 13. Data storage device, CHARACTERIZED by the fact that the device comprises: a determination module determining a first verification value of a first data version of a target object; a search unit looking for a second check value for a second version of the target object's data that is adjacent to the first data version; a storage module creating a data block based on the first check value and the second check value, and storing the data block in a block chain, where the data block stored in the block chain is immutable. [14] 14. Data storage device according to claim 13, CHARACTERIZED by the fact that the determination module determining a first verification value of a first data version of a target object comprises: determine a summary of data content of the target object in the first data version; calculate to obtain the first verification value of the first data version of the target object according to a predefined algorithm and the summary of data content. [15] 15. Data storage device, according to claim 13, CHARACTERIZED by the fact that the storage module creates a block Petition 870190016696, of 02/19/2019, p. 49/58 6/9 data based on the first verification value and the second verification value comprises: create the data block, and write the first check value and the second check value in a data header of the data block according to a predefined format. [16] 16. Data storage device according to claim 15, CHARACTERIZED by the fact that the data storage device additionally comprises: a writing module, in which: the writing module writes a summary of the data content of the target object in the first data version, or the second check value, or the data content of the first data version of the target object in a data body of the data block. [17] 17. Data storage device, according to claim 15, CHARACTERIZED by the fact that the storage module stores the data content of the first data version of the target object in a cloud data gateway or in a database . [18] 18. Data storage device according to claim 13, CHARACTERIZED by the fact that the storage module, after storing the data block in the block chain, stores a mapping relationship between a version identifier of the first version of target object data and a block identifier of the data block. [19] 19. Data storage apparatus according to claims 13 to 18, CHARACTERIZED by the fact that the storage module storing the data blocks in a block chain comprises: according to a linked data structure, add the block of Petition 870190016696, of 02/19/2019, p. 50/58 7/9 data to the block chain. [20] 20. Data authentication device, CHARACTERIZED by the fact that the device comprises: a receiving module receiving a data authentication request, the data authentication request comprising a version identifier of a data version of the data to be authenticated and a verification value obtained based on the data content of the data to be authenticated ; a search module searching, in the block chain, based on the version identifier of the data version contained in the data authentication request, for a pre-stored verification value corresponding to the version identifier of the data version; an authentication module authenticating the data content of the data to be authenticated based on the verification value received contained in the data authentication request and the verification value obtained through the search. [21] 21. Data authentication apparatus, according to claim 20, CHARACTERIZED by the fact that the authentication module authenticating the data content of the data to be authenticated based on the received verification value contained in the data authentication request and in the verification value obtained through the search comprises: when the verification value received contained in the data authentication request is the same as the verification value obtained through the search, determine that the data content of the data to be authenticated is authentic; when the verification value received contained in the data authentication request is different from the verification value obtained through the search, determine that the data content of the data to be authenticated has been modified. Petition 870190016696, of 02/19/2019, p. 51/58 8/9 [22] 22. Data authentication device, according to claim 20 or 21, CHARACTERIZED by the fact that the search module searching, in the block chain based on the version identifier of the data version contained in the data authentication request, by a pre-stored verification value corresponding to the version identifier of the data version comprises: based on the pre-stored mapping relationships between the version identifiers of the data versions and the block identifiers of the data blocks, determine a block identifier of a data block corresponding to the version identifier of the data version in the request for data authentication, read the check value corresponding to the version identifier of the data version from the determined data block corresponding to the block identifier. [23] 23. Data tracking device, CHARACTERIZED by the fact that the device comprises: a receiving module receiving a data rollback request, the data rollback request comprising a version identifier of a first data version of the data to be analyzed by rollback; a backward module searching, in a chain of blocks, based on the version identifier of the first data version, for a data block containing the version identifier of the first data version, and obtaining, from the data block, a version identifier of a second data version adjacent to the first data version; based on the version identifier obtained from the second data version, perform the backward sequentially to obtain a data block containing the version identifier of the initial version of the data to be analyzed by backward; Petition 870190016696, of 02/19/2019, p. 52/58 9/9 a determination module determining the data content corresponding to the initial version of the data to be analyzed by regression based on the data block. [24] 24. Data tracking device, according to claim 23, CHARACTERIZED by the fact that the retraction module, based on the version identifier obtained from the second data version, sequentially performing the retraction to obtain a data block containing the version identifier of the initial version of the data to be analyzed by regression comprises: based on a version identifier obtained from a data version, perform the following operation until a data block containing the version identifier of the initial version of the data to be analyzed by backspace is obtained: search, in the block chain, for a data block containing the version identifier obtained from the data version, and obtain, from the data block, a version identifier of a previous data version adjacent to the obtained data version; trigger the cyclic execution of the previous operations until a block of data containing the version identifier of the initial version of the data to be analyzed by regression is obtained.
类似技术:
公开号 | 公开日 | 专利标题 BR112019003345A2|2019-06-11|method and apparatus for data storage, data verification and data binding CN107577427B|2019-12-13|data migration method, device and storage medium for blockchain system US10896418B2|2021-01-19|Secure management of data files using a blockchain US20190327094A1|2019-10-24|Information authentication method and system US20200412526A1|2020-12-31|Method and apparatus for verifying smart contracts in blockchain, and storage medium KR20190061075A|2019-06-04|Method and apparatus for preventing software repackaging WO2020093807A1|2020-05-14|Method and device for concealing transaction written to blockchain WO2015070674A1|2015-05-21|Method and system for manipulating data CN107391292B|2020-09-15|Block chain verification method and system for realizing error correction aiming at data of block body US20220050887A1|2022-02-17|Blockchain-based infringement detection method, apparatus, and electronic device US20210256012A1|2021-08-19|Methods and apparatuses for reading and updating data structures, and electronic devices TW202125296A|2021-07-01|Infringement evidence obtaining method and device based on block chain, electronic equipment and storage medium CN110119947B|2021-08-10|Method and apparatus for shared workload proof computing power generation of symbiotic blockchains WO2020093809A1|2020-05-14|Method and device for reading blockchain data WO2019214071A1|2019-11-14|Communication method for users on blockchain, device, terminal device, and storage medium WO2021093461A1|2021-05-20|Method and apparatus for aggregation calculation in blockchain-type ledger, and device US10860659B1|2020-12-08|Distributed verification of digital work product OA19331A|2020-06-29|Data storage, data check, and data linkage method and apparatus US20210382865A1|2021-12-09|Secure model item tracking system KR20210149427A|2021-12-09|Device, method, system and computer readable storage medium for managing blockchain Yu123 et al.2017|EthDrive: A Peer-to-Peer Data Storage with Provenance WO2017028721A1|2017-02-23|Data update method and device in distributed file system BR112014023106B1|2021-10-05|METHOD IMPLEMENTED BY MACHINE, TANGIBLE MEDIA READIBLE BY MACHINE AND CUSTOMER DEVICE
同族专利:
公开号 | 公开日 RU2019107593A3|2020-09-21| TWI679546B|2019-12-11| US10880078B2|2020-12-29| KR20190039787A|2019-04-15| CA3034034A1|2018-02-22| TW201807601A|2018-03-01| KR102188744B1|2020-12-09| AU2019101570A4|2020-01-23| CA3034034C|2021-06-15| KR20200139845A|2020-12-14| PH12019500334A1|2019-11-11| JP2019532550A|2019-11-07| US20210359841A1|2021-11-18| SG11201901181PA|2019-03-28| JP6963006B2|2021-11-05| KR102289995B1|2021-08-17| RU2019107593A|2020-09-21| US10931441B2|2021-02-23| CN106897348A|2017-06-27| EP3502926A4|2020-05-06| ZA201901031B|2021-07-28| WO2018032995A1|2018-02-22| US20190182033A1|2019-06-13| MX2019002021A|2019-07-08| RU2744054C2|2021-03-02| US20210099285A1|2021-04-01| AU2017312177B2|2020-12-10| US20200136811A1|2020-04-30| EP3502926A1|2019-06-26| CN106897348B|2020-10-27| US11082208B2|2021-08-03| AU2017312177A1|2019-03-14|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US1024221A|1911-01-03|1912-04-23|Daniel A Osgood|Grouting-machine.| US1007529A|1911-03-14|1911-10-31|Luther L Carr|Folding hay-knife.| US1012101A|1911-03-22|1911-12-19|Richard A Roach|Spring-belt.| US6343295B1|1998-12-16|2002-01-29|Microsoft Corporation|Data lineage| AT522039T|2000-01-21|2011-09-15|Sony Computer Entertainment Inc|DEVICE AND METHOD FOR PROCESSING ENCRYPTED DATA| US6938039B1|2000-06-30|2005-08-30|Emc Corporation|Concurrent file across at a target file server during migration of file systems between file servers using a network file system access protocol| US7054891B2|2002-03-18|2006-05-30|Bmc Software, Inc.|System and method for comparing database data| US7266842B2|2002-04-18|2007-09-04|International Business Machines Corporation|Control function implementing selective transparent data authentication within an integrated system| US8627086B2|2004-10-11|2014-01-07|Telefonaktiebolaget Lm Ericsson |Secure loading and storing of data in a data processing device| KR100654446B1|2004-12-09|2006-12-06|삼성전자주식회사|Apparatus and method for Secure booting| US9626667B2|2005-10-18|2017-04-18|Intertrust Technologies Corporation|Digital rights management engine systems and methods| US7587564B2|2006-09-26|2009-09-08|International Business Machines Corporation|System, method and computer program product for managing data versions| US8499044B2|2006-12-07|2013-07-30|Microsoft Corporation|Formatted message processing utilizing a message map| CN101236525A|2008-01-24|2008-08-06|创新科存储技术(深圳)有限公司|File memory, reading, deleting and copying method and its relevant system| US7676501B2|2008-03-22|2010-03-09|Wilson Kelce S|Document integrity verification| US7904450B2|2008-04-25|2011-03-08|Wilson Kelce S|Public electronic document dating list| US9098495B2|2008-06-24|2015-08-04|Commvault Systems, Inc.|Application-aware and remote single instance data management| US9098632B2|2010-12-03|2015-08-04|Dcs Consultancy Services Limited|Computer program testing| US9569771B2|2011-04-29|2017-02-14|Stephen Lesavich|Method and system for storage and retrieval of blockchain blocks using galois fields| US20120310875A1|2011-06-03|2012-12-06|Prashanth Prahlad|Method and system of generating a data lineage repository with lineage visibility, snapshot comparison and version control in a cloud-computing platform| US8751736B2|2011-08-02|2014-06-10|Oracle International Corporation|Instructions to set and read memory version information| CN103678337B|2012-09-06|2017-12-12|华为技术有限公司|Data clearing method, apparatus and system| KR101518488B1|2013-05-20|2015-05-07|주식회사 애드오피|Value enhancing method and system of online contents| US9135285B1|2013-05-30|2015-09-15|Ca, Inc.|Loading XML records into a database| JP6432127B2|2013-11-12|2018-12-05|株式会社リコー|COMMUNICATION DEVICE, COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM| WO2015175722A1|2014-05-13|2015-11-19|Nant Holdings Ip, Llc|Healthcare transaction validation via blockchain proof-of-work, systems and methods| US9836908B2|2014-07-25|2017-12-05|Blockchain Technologies Corporation|System and method for securely receiving and counting votes in an election| US20160098723A1|2014-10-01|2016-04-07|The Filing Cabinet, LLC|System and method for block-chain verification of goods| US10409827B2|2014-10-31|2019-09-10|21, Inc.|Digital currency mining circuitry having shared processing logic| US10230526B2|2014-12-31|2019-03-12|William Manning|Out-of-band validation of domain name system records| EP3278287A4|2015-03-31|2018-08-22|Nasdaq, Inc.|Systems and methods of blockchain transaction recordation| US9870562B2|2015-05-21|2018-01-16|Mastercard International Incorporated|Method and system for integration of market exchange and issuer processing for blockchain-based transactions| US10026082B2|2015-05-21|2018-07-17|Mastercard International Incorporated|Method and system for linkage of blockchain-based assets to fiat currency accounts| US20160342989A1|2015-05-21|2016-11-24|Mastercard International Incorporated|Method and system for processing blockchain-based transactions on existing payment networks| US10963881B2|2015-05-21|2021-03-30|Mastercard International Incorporated|Method and system for fraud control of blockchain-based transactions| US10121019B2|2015-06-02|2018-11-06|ALTR Solutions, Inc.|Storing differentials of files in a distributed blockchain| US9881176B2|2015-06-02|2018-01-30|ALTR Solutions, Inc.|Fragmenting data for the purposes of persistent storage across multiple immutable data structures| US10075298B2|2015-06-02|2018-09-11|ALTR Solutions, Inc.|Generation of hash values within a blockchain| CN104935657A|2015-06-15|2015-09-23|清华大学深圳研究生院|Method for actively pushing information and embedded node operating system| CN105045536B|2015-07-29|2019-09-20|百度在线网络技术(北京)有限公司|A kind of method, apparatus and system of data storage| US10402792B2|2015-08-13|2019-09-03|The Toronto-Dominion Bank|Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers| US10425428B2|2015-08-20|2019-09-24|Guardtime Sa|Verification lineage tracking and transfer control of data sets| CN105117489B|2015-09-21|2018-10-19|北京金山安全软件有限公司|A kind of data base management method, device and electronic equipment| CN105608588A|2016-01-04|2016-05-25|布比(北京)网络技术有限公司|Tracing record processing method and apparatus| CN105610578B|2016-01-25|2019-05-03|杭州复杂美科技有限公司|Block chain information deposits card and method for secret protection| US9774578B1|2016-05-23|2017-09-26|Accenture Global Solutions Limited|Distributed key secret for rewritable blockchain| US10705221B2|2016-06-08|2020-07-07|The Boeing Company|On-board backup and anti-spoofing GPS system| CN106897348B|2016-08-19|2020-10-27|创新先进技术有限公司|Data storage method, data verification method, data source tracing method and equipment|CN106897348B|2016-08-19|2020-10-27|创新先进技术有限公司|Data storage method, data verification method, data source tracing method and equipment| CN107316239A|2017-07-14|2017-11-03|众安信息技术服务有限公司|A kind of authentification of message and source tracing method and system based on block chain| CN109428892B|2017-09-01|2021-12-28|埃森哲环球解决方案有限公司|Multi-stage rewritable block chain| CN107945312A|2017-10-31|2018-04-20|深圳市轱辘车联数据技术有限公司|A kind of vehicle checking method and its equipment| WO2019098895A1|2017-11-17|2019-05-23|Telefonaktiebolaget Lm Ericsson |Method and arrangement for detecting digital content tampering| CN108458724B|2017-12-29|2021-06-04|歌尔科技有限公司|Step counting method and device| CN108123960B|2018-01-02|2020-10-16|武汉斗鱼网络科技有限公司|Live broadcast room popularity verification method and device and electronic equipment| CN108734028B|2018-05-24|2020-10-09|中国联合网络通信集团有限公司|Data management method based on block chain, block chain link point and storage medium| CN108847926A|2018-06-22|2018-11-20|武汉斗鱼网络科技有限公司|A kind of client secure detection method, device and client device| CN109257334B|2018-08-21|2021-04-09|广州杰赛科技股份有限公司|Block chain-based data uplink system, method and storage medium| CN109308188B|2018-09-25|2021-06-22|四川长虹电器股份有限公司|Version control method and system based on block chain| CN109522683A|2018-09-26|2019-03-26|百度在线网络技术(北京)有限公司|Software source tracing method, system, computer equipment and storage medium| US10268817B1|2018-10-05|2019-04-23|Capital One Services, Llc|Methods, mediums, and systems for establishing and using security questions| CN109617964B|2018-12-12|2021-11-09|成都四方伟业软件股份有限公司|Big data storage method and device based on block chain| CN109800248A|2018-12-17|2019-05-24|上海点融信息科技有限责任公司|Digital content for block chain network is traced to the source and recording method, storage medium, calculating equipment| CN110046901B|2018-12-28|2020-06-30|阿里巴巴集团控股有限公司|Credibility verification method, system, device and equipment of alliance chain| US10880619B2|2019-02-21|2020-12-29|Raytheon Bbn Technologies Corp.|Verifying provenance of digital content| CN110096505B|2019-03-31|2021-05-11|杭州复杂美科技有限公司|Data storage method, system, equipment and storage medium| CN109992999B|2019-04-01|2021-05-28|北京柏链基石科技有限公司|Method and device for modifying private data based on block chain and electronic equipment| US10908924B2|2019-05-01|2021-02-02|Intuit Inc.|System and methods for loading objects from hash chains| CN110427774B|2019-07-18|2021-01-12|创新先进技术有限公司|Block chain-based data storage method, data verification method and related device| US11088828B2|2019-07-18|2021-08-10|Advanced New Technologies Co., Ltd.|Blockchain-based data evidence storage method and apparatus| CN110753105A|2019-10-17|2020-02-04|中国建设银行股份有限公司|Data transmission method, device, system, electronic equipment and storage medium| CN112749181B|2021-01-20|2021-08-17|方正国际软件有限公司|Big data processing method aiming at authenticity verification and credible traceability and cloud server|
法律状态:
2021-05-04| B25A| Requested transfer of rights approved|Owner name: ADVANTAGEOUS NEW TECHNOLOGIES CO., LTD. (KY) | 2021-05-25| B25A| Requested transfer of rights approved|Owner name: ADVANCED NEW TECHNOLOGIES CO., LTD. (KY) | 2021-10-05| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 CN201610694496.6A|CN106897348B|2016-08-19|2016-08-19|Data storage method, data verification method, data source tracing method and equipment| PCT/CN2017/096322|WO2018032995A1|2016-08-19|2017-08-08|Data storage, data check, and data linkage method and apparatus| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|