专利摘要:
the present application discloses a device and method of storing and searching data based on a reliable protocol. in the method, after receiving a service request sent by a user, a trusted protocol node can analyze the service request to obtain each type of data and service data corresponding to each type of data and store, based on a mapping relationship between a data type and data service, the service data that is obtained through analysis in a database corresponding to the trust protocol node. service data is obtained through analysis and service data can be stored, based on the mapping relationship between a type of data and service data, in the database corresponding to the trust protocol node. as such, a user can search the service data based on such a mapping relationship in the database, thereby alleviating a problem in the existing technology of conducting searches on a trust protocol based on an index and effectively improving the flexibility and efficiency of data search in a reliable protocol.
公开号:BR112019013441A2
申请号:R112019013441
申请日:2018-03-26
公开日:2019-12-31
发明作者:Qiu Honglin
申请人:Alibaba Group Holding Ltd;
IPC主号:
专利说明:

“METHOD FOR DATA STORAGE AND DEVICE FOR DATA STORAGE”
Technical Field [001] The present application refers to the field of computational technologies and, in particular, to a device and method of data storage and research based on a trust protocol (blockchain).
Background to the Invention [002] With the continued development of computational technologies, trust protocol technology, which is a new distributed data storage technology, becomes increasingly popular because the data stored in a trust protocol is reliable because temper resistance is a feature of the trust protocol technology (which can also be referred to as distributed accounting technology).
[003] A data storage principle in the trust protocol can be understood as follows: A user initiates a service request using an Ethereum client (ie, a client that supports trust protocol technology, which can also be referred to as a trusted protocol client). The Ethereum customer can send the service request to a consensus network. Each trust protocol node in the consensus network performs the consensus procedure on the service request. Each trust protocol node in the consensus network stores a compilation of data in the service request in a trust protocol corresponding to each trust protocol node after obtaining a consensus on the service request. In addition, the Ethereum customer can store, based on a predetermined data storage format specified in a smart contract, service data in the service request on a storage medium corresponding to the
Petition 870190060139, of 06/27/2019, p. 88/125
2/34 Ethereum customer.
[004] To subsequently help to search for data stored in the storage medium, an index is generally created in a predetermined way, so that the user can perform, using the index, a search operation on the service data stored in the storage medium.
[005] However, in practice, since a search condition used to search for service data is different from the index created (in other words, the search condition does not match an index specified in the smart contract), efficiency data search is relatively low or search fails.
Short Description [006] An embodiment of the present application provides a method of storing data to alleviate problems in existing technology, such as search efficiency being low or search failing when data stored in a trusted protocol is searched.
[007] An embodiment of this request provides a method of storing data, including: receiving, through a trusted protocol node, a service request; analyze the service request to obtain each type of data and service data corresponding to each type of data; and store, based on a mapping relationship between a type of data and service data, the service data that is obtained through analysis in a database corresponding to the trust protocol node.
[008] An embodiment of the present application provides a data storage device to alleviate problems in existing technology, such as search efficiency being low or search failing
Petition 870190060139, of 06/27/2019, p. 89/125
3/34 when data stored in a trusted protocol is searched.
[009] An embodiment of the present request provides a data storage device, including: a receiving module, configured to receive a service request; a data analysis module, configured to analyze the service request to obtain each type of data and corresponding service data for each type of data; and a storage module, configured to store, based on a mapping relationship between a data type and service data, the service data that is obtained by analyzing it in a database corresponding to the trust protocol node .
[010] An embodiment of the present application provides a method of searching for data to alleviate problems in existing technology, such as search efficiency being low or searching fails when data stored in a trusted protocol is searched.
[011] One embodiment of this request provides a method of searching for data, including: receiving, through a trusted protocol node, a request for searching for service data; determine, based on the service data search request, a data type corresponding to the service data to be searched; and search for service data that corresponds to the data type of a database corresponding to the trust protocol node, where the database includes a mapping relationship between a data type and service data.
[012] An embodiment of the present application provides a data search device to alleviate problems in existing technology, such as search efficiency being low or search failing when data stored in a trusted protocol is
Petition 870190060139, of 06/27/2019, p. 90/125
4/34 surveyed.
[013] An embodiment of the present request provides a data search device, including: a request receiving module, configured to receive a service data search request; a type determination module, configured to determine, based on the service data search request, a data type corresponding to the service data to be searched; and a data search module, configured to search for service data that corresponds to the data type of a database corresponding to the device, where the database includes a mapping relationship between a data type and service data.
[014] At least one of the technical solutions described previously used in the embodiments of this application can achieve the following beneficial effects:
[015] In the embodiments of this request, after receiving the service request sent by the user, the trust protocol node can analyze the service request to obtain each type of data and the corresponding service data for each type of service. data and store, based on a mapping relationship between a data type and data service, the service data that is obtained by analyzing it in a database corresponding to the trust protocol node. The service data is obtained through analysis and the service data can be stored, based on the mapping relationship between a type of data and service data, in the database corresponding to the trust protocol node. As such, a user can search for service data based on such a mapping relationship in the database, thereby alleviating a problem in the existing technology of conducting searches on a trust protocol based on an index and effectively improving the flexibility and efficiency of
Petition 870190060139, of 06/27/2019, p. 91/125
5/34 data search in a reliable protocol.
Brief Description of the Figures [016] The accompanying drawings described herein are intended to provide a further understanding of the present application and form a part of the present application. The illustrative embodiments of the present application and their descriptions are intended to describe the present application and are not limitations in the present application. In the attached drawings:
Figure 1 is a schematic diagram illustrating a data storage process, according to an embodiment of the present application;
Figure 2 is a schematic diagram showing a data table, according to an embodiment of the present application;
Figure 3 illustrates a detailed data storage process, according to an embodiment of the present application;
Figure 4 is a schematic diagram illustrating a data storage device, according to an embodiment of the present application; and
Figure 5 is a schematic diagram illustrating a data search device, according to an embodiment of the present application.
Description of the Forms of Realization [017] To enable a technician in the subject to better understand the technical solutions in the present application, the technical solutions in the embodiments of this application are described in a clear and comprehensive manner with reference to the attached drawings in the embodiments of this application. Apparently, the described embodiments are only a few, but not all of the embodiments of the present application. All other embodiments obtained by a technician
Petition 870190060139, of 06/27/2019, p. 92/125
6/34 in the matter based on the ways of carrying out this application, without creative efforts, should focus on the scope of protection of this application.
[018] Figure 1 is a schematic diagram illustrating a data storage process, according to an embodiment of the present application. The process includes the following steps.
[019] (S101). A trust protocol node receives a service request.
[020] In practice, in a service processing process, a user can send a service request to the trust protocol node. The trust protocol node can be an end user device or a server. For example, when the trust protocol node is a server, the user can populate service information on an end user device maintained by the user. After the user performs an operation specified on the end-user device, the end-user device sends the user-filled service information to the server in the form of a service request. Correspondingly, the server can receive the service request.
[021] When the trust protocol node is an end user device, the user can fill in service information on the end user device. The end user device can generate a corresponding service request when determining that the user performs a specified operation (for example, the user performs a touch operation). This is equivalent to receiving the service request sent by the user.
[022] Certainly, the trust protocol node can alternatively be a trust protocol client (which is referred to as a client that can process a related service that is based on a trust protocol technology, for example, an Ethereum client ). Correspondingly, when performing service processing using a
Petition 870190060139, of 06/27/2019, p. 93/125
7/34 trust protocol consensus network, the user can start the trust client using an end user device and fill in service information on an interface displayed by the trust protocol client. The trust protocol client can generate a corresponding service request based on the service information completed by the user when it detects that the user performs a specified operation. This is equivalent to receiving the service request sent by the user. In addition, the service request received by the trust protocol node can alternatively be transmitted by another trust protocol node.
[023] (S102). Convert the service request based on a predetermined data format to obtain a data string.
[024] The trust protocol node can convert the service request based on the predetermined data format after receiving the service request, to obtain the corresponding data string.
[025] In the present embodiment of the present application, the predetermined data format includes, but is not limited to, the following fields: an identification information field and a service type field.
[026] The identifying information field is used to distinguish between service data at a user level, for example, information that can uniquely identify the user and is included in the service request, such as a user's public key or an identity user (ID), so that service data can be searched in a user dimension.
[027] The service type field is used to distinguish between service data from a user's various services, so that the user can subsequently search for service data in a dimension of
Petition 870190060139, of 06/27/2019, p. 94/125
8/34 service in a service data search process.
[028] In addition, a data field is specified in the predetermined data format. The data field is used to indicate a mapping relationship between each type of data and each piece of service data in a service request. For example, suppose a service request includes the following data field: name - Xiaoming, age - 18 and weight - 65 kg. In the information, the actual service data is Xiaoming, 18 and 65 kg, and name, age and weight are types of service data data. In other words, in the present embodiment of the present application, the data type is equivalent to a key, the service data is equivalent to a value, and the data field is a key-value data mapping set.
[029] Based on the predetermined data format described above, after receiving the service request sent by the user, the trust protocol node can analyze, based on the predetermined data format, the service request to obtain the data content included in the service request, such as identifying information, a type of service, service data corresponding to each type of data and each type of data that is in a data field. The trust protocol node can then serialize, in a specific way, the data obtained through the analysis, to obtain a data sequence.
[030] For example, suppose that after receiving the service request sent by the user, the trust protocol node obtains the following fields by analyzing the service request based on the predetermined data format: a service type field: merchandise ; an identification information field: ChavePública; a data field: name: umbrella; and cost: 46. The trust protocol node serializes, in a specific way, these fields obtained through analysis and obtains the
Petition 870190060139, of 06/27/2019, p. 95/125
9/34 following sequence of data:
{"ChavePública.esquema": "DEFAULT", "data": "name: umbrella, cost: 46"}.
[031] The service request is converted into the data stream based on the predetermined data format, because in the present embodiment of the present request, the trust protocol node needs to record the service request in a trust protocol for the subsequent verification of service data. In practice, the trust protocol node usually needs to write the service request to the trust protocol based on a specific data format. Therefore, after receiving the service request sent by the user, the trust protocol node needs to convert, based on the predetermined data format, the service request into a data format, that is, a data stream to support the recording the service request in the trust protocol in a subsequent process and further recording the service request in the trust protocol in a form of the data string, so that the service data can be effectively verified based on the service request stored in the trust protocol.
[032] It is worth noting that, in the present embodiment of this request, the trust protocol node can alternatively analyze the service request to obtain each type of data and corresponding service data for each type of data and then convert, based on the predetermined data format, the service data corresponding to each type of data and each type of data that is obtained by means of analysis, to obtain the data sequence. Alternatively, after obtaining, through analysis, each type of data and the service data corresponding to each type of data, the trust protocol node can store first, based on a mapping relationship between a data type and service data, the service data that is obtained through analysis in a database
Petition 870190060139, of 06/27/2019, p. 96/125
10/34 data corresponding to the trust protocol node (in other words, perform step (S103)) and convert, based on the predetermined data format, each type of data included in the service request and the corresponding service data each data type, to obtain the data string.
[033] In other words, in the present embodiment of the present request, the step of converting the service request based on a predetermined data format, to obtain a data stream, is optional.
[034] A specific embodiment process involved in step (S102) of converting the service request based on a predetermined data format, to obtain a data stream, is not necessarily a service request analysis process for obtain each type of data and the service data corresponding to each type of data and then convert, based on the predetermined data format, the service data corresponding to each type of data and each type of data that are obtained through analysis , to obtain the data stream. The data stream can alternatively be generated using another field in the service request other than the service data corresponding to each type of data and each type of data that is obtained by analyzing the service request. A specific field that is required to generate the data stream depends on a data format really needed to support the writing of the service request in the trust protocol.
[035] (S103). Analyze the service request to obtain each type of data and corresponding service data for each type of data.
[036] In the present embodiment of this request, after receiving the service request, the trust protocol node can first send the service request to other trust protocol nodes in a
Petition 870190060139, of 06/27/2019, p. 97/125
11/34 consensus network through transmission, so that each trust protocol node in the consensus network performs a consensus procedure in the service request. Each trust protocol node can store the service request in a trust protocol corresponding to the trust protocol node after determining that each trust protocol node in the consensus network obtains a consensus on the service request.
[037] Furthermore, in the present embodiment of this request, after receiving the service request, the trust protocol node can analyze the service request to obtain each type of data included in the service request and the service data corresponding to each type of data and store, based on the mapping relationship between a type of data and service data, the service data that are obtained by analyzing the database corresponding to the trust protocol node in a process subsequent.
[038] The database mentioned in the present embodiment of the present application can be a relational database. In this method of storing data, data can be searched quickly and the search is not affected by a search condition. In other words, even if an index field is changed, the service data stored in the database can still adapt to a new index field and the service data searched by a user will not be affected by a change to the index used to search for service data.
[039] In the present embodiment of this request, during the storage of service data, the trust protocol node can distinguish, based on a type of service or identification information, between service data to be stored, for that the service data corresponding to the different types of service or information of
Petition 870190060139, of 06/27/2019, p. 98/125
12/34 identification can be stored in different databases. As such, a user can accurately search for service data in a service type dimension or identifying information in a subsequent service data search process.
[040] Based on this, in addition to analyzing the service request to obtain each type of data and the corresponding service data for each type of data, the trust protocol node can obtain, through analysis, a type of service and identifying information that correspond to the service data included in the service request, then convert, based on a predetermined instruction format, each type of data, the service data corresponding to each type of data, the type of service and the identification information that is obtained through analysis, to obtain a data storage instruction and to store, executing the data storage instruction, the service data that is obtained through analysis in the database corresponding to the node of trust protocol in a subsequent process.
[041] For example, the trust protocol node determines, analyzing the service request, that the service data to be stored are shoes # 12xew and 158, the type of service corresponding to the service data to be stored is merchandise , the identification information corresponding to the service data to be stored is PublicParty, and the data types corresponding to the service data shoes # 12xew and 158 respectively are name and cost. The trust protocol node can convert, based on the predetermined instruction format, the type of service, the identification information, the service data corresponding to each type of data and each type of data that is obtained through analysis, to obtain the corresponding data storage instruction. An example form is as follows:
Petition 870190060139, of 06/27/2019, p. 99/125
13/34 insert in the value “ChaveP Públicical .esquema: commodity” (name, cost) shoes # 12xew ',' 158 ').
[042] The trust protocol node can store, by executing the data storage instruction, the service data in the database corresponding to the trust protocol node in a subsequent process.
[043] The trust protocol node can analyze the service request using a predetermined analysis program. The analysis program specifies a data format to be used for analysis and a field to be analyzed. The trust protocol node can analyze the service request by running the analysis program. The analysis program can be carried out by the operation and maintenance personnel of the trust protocol node based on a real need.
[044] It is worth noting that, different from storing service data in the database in the dimension of service type and identification information, if the trust protocol node corresponds to a single database, different data tables can be defined in the database. Each type of service and each piece of identifying information can correspond to a data table. As such, the trust protocol node can store service data in data tables in the database based on a type of service and identifying information. Certainly, the service data corresponding to the type of service and the identification information can be distinguished in the database in a different way than the data table. Details are omitted here for simplicity.
[045] It is worth noting that, in the present embodiment of this request, the trust protocol node can perform step (S103) before executing step (S102), it can execute step (S102) before
Petition 870190060139, of 06/27/2019, p. 100/125
14/34 run the step (S103), or you can run (S102) to get the data string before running the step (S103) to analyze the analysis string obtained to get, based on the method shown in the step (S103) , each type of data and the service data corresponding to each type of data. The step (S102) and the step (S103) can be carried out simultaneously in the present embodiment of the present application. No specific limitations are imposed here.
[046] (S104). Store, based on a mapping relationship between a type of data and service data, the service data that is obtained through analysis in a database corresponding to the trust protocol node.
[047] In the present embodiment of this request, after obtaining, analyzing the service request, each type of data and the service data corresponding to each type of data, the trust protocol node can store the service data that they are obtained by analyzing data types in the database.
[048] For service data corresponding to different types of services and identification information, the trust protocol node can determine, based on the types of services and identification information obtained by analysis, a database corresponding to service types and identification information, and then the trust protocol node can respectively store the service data that is obtained by analyzing the data types in the database.
[049] After obtaining the datastore instruction by executing step (S103), the trust protocol node can execute the datastore instruction to determine the type of service and the identification information that corresponds to the service to be stored. The trust protocol node can then determine
Petition 870190060139, of 06/27/2019, p. 101/125
15/34 also if the trust protocol node corresponds to a database corresponding to the type of service and identification information. If so, the trust protocol node can also separately store the service data that is obtained by analyzing the data types in the database. If not, the trust protocol node needs to create, based on the type of service determined and the identification information determined, a database corresponding to the type of service and identification information, so that the trust protocol node stores the service data in the database.
[050] Certainly, in the present embodiment of this application, if the trust protocol node corresponds to a single database, the trust protocol node can determine whether the database includes a data table corresponding to the type service and identifying information. If so, the trust protocol node separately stores the service data that is obtained by analyzing data types in the data table. If not, the trust protocol node creates, using a predetermined table creation method, a data table corresponding to the type of service and identification information, and then stores the service data that is obtained through the analysis in the data table.
[051] For example, suppose the trust protocol node determines the following fields by executing the data storage instruction: a service type field corresponding to the service data to be stored is "merchandise"; and a user's public key is “PublicParty”, which is used to indicate identification information (as a real user's public key can be relatively complex, the user's public key is simply indicated using PublicParty, here). The trust protocol node can also determine whether the database
Petition 870190060139, of 06/27/2019, p. 102/125
16/34 data corresponding to the trust protocol node includes a data table that includes the PublicParty identification information and the type of merchandise service. When determining that the data table does not exist, the trust protocol node creates the data table corresponding to the type of merchandise service and the identification information PublicParty in the database based on the type of service determined in the merchandise, in the identification information certain PublicPass, and in the predetermined table creation method. An execution instruction is as follows:
create the table “ChavePublicical. schema: merchandise” and “ChavePublic. scheme: merchandise ”does not exist.
[052] After determining (or creating), executing the data storage instruction, the data table corresponding to the service data in the database corresponding to the trust protocol node, the trust protocol node can determine whether the table includes each type of data included in the service data. If so, the trust protocol node creates a row or column corresponding to the type of data in the data table. If not, the trust protocol node can add a row / column corresponding to the data type to the data table based on the data type and a predetermined row / column creation method.
[053] Continuing with the previous example, the trust protocol node determines a data field: name: shoes # 12xew and cost: 158 in the data sequence. In the data field, name and cost are data types and are equivalent to keys, and the service data corresponding to name and cost are equivalent to a value. The trust protocol node can determine whether the data table determined based on the type of merchandise service and the PublicParty identification information includes each type of data in the data field. If so, the trust protocol node does not create a column corresponding to the type of data in the database. If not, the node
Petition 870190060139, of 06/27/2019, p. 103/125
17/34 trust protocol can add a column corresponding to the data type to the data table based on the data type and the predetermined column creation method (if the data table is created in a row dimension, the method line creation can be used). A specific execution instruction is as follows:
create the “name” column and “PublicPass. scheme: commodity ”,“ name ”does not exist; create the “cost” column and “PublicPass. scheme: commodity ”,“ cost ”does not exist.
[054] After determining, by executing the data store instruction, the corresponding data type (the data type can exist previously in the database or can be created by the trust protocol node executing the data storage instruction) to the service data to be stored in the database, the trust protocol node can store the service data in the data type in the database. Certainly, if the trust protocol node determines that the type of data corresponding to the service data to be stored is in a given data table (that is, the data table that corresponds to the type of service and identification information) in the database, the trust protocol node can store the service data that is obtained by analyzing the data type in the data table, as shown in Figure 2.
[055] Figure 2 is a schematic diagram illustrating a data table, according to an embodiment of the present application.
[056] In Figure 2, name and cost are the data types of the service data, PublicParty is the identification information corresponding to the service data, merchandise is the type of service corresponding to the service data and each type of data records data corresponding to the data type. As such, when a user
Petition 870190060139, of 06/27/2019, p. 104/125
18/34 subsequently searches for service data, the trust protocol node can receive a service data search request sent by the user and additionally searches for service data that match the database service search request. A search process can be as follows: after receiving the service data search request, the trust protocol node can first determine a type of service and identifying information that is included in the service data search request. Then, the trust protocol node can determine a data table that corresponds to the type of service and the identification information in the database and search further, from the data table based on a mapping relationship that is between a type of data and service data and the service data that is to be searched based on the service data search request is recorded in the table data.
[057] For example, suppose that the service data search request received by the trust protocol node includes the following fields: PublicKey: PublicKey, scheme: merchandise and name: blouse # 4212v. The trust protocol node can determine, in the service data search request, that a type of service corresponding to the service data search request is merchandise and the identification information is PublicParty, and then identify a service table. data that corresponds to the type of merchandise service and to the PublicParty identification information of the database corresponding to the trust protocol node, and to identify the service data (211) corresponding to blouse index field # 4212v of the data table based on blouse # 4212v index field.
[058] Certainly, if the service data is differentiated based only on the type of data, after receiving the search request from
Petition 870190060139, of 06/27/2019, p. 105/125
19/34 service data sent by the user, the trust protocol node can determine, based on the service data search request, a data type corresponding to the service data to be searched and then search the data corresponding to the data type of the database corresponding to the trust protocol node. When determining the data type, after receiving the service data search request sent by the user, the trust protocol node can determine an index field, that is, a key included in the service data search request and determine the index field, that is, the key, as the data type corresponding to the service data to be searched.
[059] In the data table, in addition to searching for service data using the key as the index field, the service data can be searched by creating an index by a user. For example, continuing with the previous example, if the user needs to search for service data based on a price range, the user can enter the price range in the trust protocol node. The trust protocol node can search, based on the price range entered by the user, for service data that satisfies the price range of the data table in the database and return the service data that satisfies the condition to the user for preview.
[060] In existing technology, the trust protocol node needs to record service data in a trust protocol based on a data storage format specified in a smart contract. In addition, the trust protocol node generally stores, based on the data storage format, the service data in a memory corresponding to the trust protocol node by default. Therefore, in a smart contract compilation process, typically
Petition 870190060139, of 06/27/2019, p. 106/125
20/34 it is specified that the trust protocol node stores, based on the specified data storage format, the service data in memory corresponding to the trust protocol node. Likewise, when a user searches the trust protocol node service data using the smart contract, the user also needs to search, in a fixed form of search (for example, using an index field in a fixed format), the corresponding service data from the memory corresponding to the trust protocol node.
[061] However, in practice, the index field used by the user to search the service data is not exclusive. Consequently, an index field used by the user to search for service data may not be specified in the smart contract. When the user uses an index field that does not satisfy the smart contract, the trust node cannot identify previous service data from the trust protocol node using the smart contract.
[062] For example, when the trust protocol node stores, based on the predetermined data storage format using the smart contract, the service request in memory corresponding to the trust protocol node, the user can subsequently search the data memory service using only one key as an index field. However, the trust protocol node stores all parts of service data, one by one, based on the data format specified in the smart contract using the smart contract, in other words, it does not store the service data in a way of data table in the relational database. Therefore, when the user needs to search for service data based on the content recorded in a value, the smart contract cannot effectively support a search field entered by the user in the trust protocol node.
Petition 870190060139, of 06/27/2019, p. 107/125
21/34
Consequently, the user cannot identify, using the smart contract, previous service data from the memory corresponding to the trust protocol node (because the previous service data can be searched using only a key as an index field). Alternatively, the trust protocol node can identify the corresponding service data from the memory corresponding to the trust protocol node only when the trust protocol node traverses the memory for a long period of time based on the search field entered by the user.
[063] In the present embodiment of this request, after receiving the service request sent by the user, the trust protocol node can analyze the service request to determine each type of data included in the service request and the service data corresponding to each type of data and finally store, based on the mapping relationship between a type of data and service data, the service data that are obtained through analysis in the database corresponding to the trust protocol node. As such, a user can search for service data based on such a mapping relationship in the database, thereby alleviating a problem in the existing technology of conducting searches on an index-based trust protocol and effectively improving search flexibility and efficiency. data in a trusted protocol.
[064] It is worth noting that, in the present form of carrying out this request, the service data of users can be distinguished in the database based on identification information only, and the classification of the type of service is not performed for all users. Therefore, in the previous process, the trust protocol node can create the database, create the data table in the database, or determine the data table in the database based on information from
Petition 870190060139, of 06/27/2019, p. 108/125
22/34 identification. Certainly, service data can be distinguished in the database based on just one type of service. A specific way can be used to distinguish between service data, depending on the need for the service.
[065] To better describe the data storage process provided in the previous embodiment, in an embodiment of the present application, the data storage method provided in the present application is further described using a specific execution process, as shown in Figure 3.
[066] Figure 3 illustrates a detailed data storage process, according to an embodiment of the present application. The process includes the following steps.
[067] (S301). A trust protocol node receives a service request.
[068] The trust protocol node can receive a service request sent by a user using an end user device. The trust protocol node can be an end user device, it can be a server, or it can be a client that can process a related service that is based on a trust protocol technology.
[069] (S302). Analyze the service request to determine each type of data included in the service request and the service data corresponding to each type of data.
[070] After receiving the service request, the trust protocol node can analyze the service request to determine each type of data included in the service request and the service data corresponding to each type of data. The trust protocol node can analyze the service request using a predetermined analysis program. The analysis program can be defined by the staff of
Petition 870190060139, of 06/27/2019, p. 109/125
23/34 operation and maintenance of the trust protocol node based on a real need.
[071] (S303). Convert, based on a predetermined data format, the service data corresponding to each type of data and each type of data that is obtained through analysis, to obtain a data sequence.
[072] After obtaining each type of data included in the service request and the service data corresponding to each type of data by analyzing the service request, the trust protocol node can convert, based on the predetermined data format, the service data corresponding to each type of data and each type of data that is obtained through analysis, to obtain the data sequence. A specific process of obtaining the data sequence can be the following: The trust protocol node can serialize, in a specific way, the data that is obtained through the analysis, to obtain the corresponding data sequence.
[073] (S304). Send the service request to a consensus network for the consensus procedure and store the data string in a trust protocol corresponding to the trust protocol node after determining that a consensus is obtained in the service request.
[074] Upon receiving the service request, the trust protocol node can send the service request to the consensus network, so that another trust protocol node in the consensus network performs a consensus procedure on the service request . After determining that the other trust protocol node obtains consensus on the service request, the trust protocol node can store, in a form of the data stream, the service request in the trust protocol saved by the protocol node confidence for subsequent verification of service data.
Petition 870190060139, of 06/27/2019, p. 110/125
24/34 [075] In the present embodiment of this request, each time the trust protocol node receives a service request, the trust protocol node sends the service request to the consensus network for the procedure consensus. Alternatively, the trust protocol node can first receive service requests sent by users, pack service requests received in a pre-processing block by determining that a consensus phase arrives and send the pre-processing block to the network consensus for consensus procedure. Correspondingly, after receiving service requests sent by users, the trust protocol node can analyze service requests, one by one, to determine a type of data and service data corresponding to the type of data that is included in each service request and then convert, based on the predetermined data format, the data type and the service data corresponding to the type of data that are included in each service request, to obtain each data stream.
[076] After determining that the other trust protocol node in the consensus network obtains a consensus on the preprocessing block sent to the consensus network, the trust protocol node can store, in a form of each corresponding data sequence for each service request, each service request included in the preprocessing block in the trust protocol included in the trust protocol node.
[077] (S305). Store, based on a mapping relationship between a type of data and service data, the service data that is obtained through analysis in a database corresponding to the trust protocol node.
[078] When converting each type of data and the service data that
Petition 870190060139, of 06/27/2019, p. 111/125
25/34 are obtained through analysis, the trust protocol node can store, based on the mapping relationship between a type of data and service data, the service data that is obtained through analysis in the database corresponding to the trust protocol node, to ensure that a user can subsequently identify the corresponding service data from the database based on the mapping relationship between a data type and service data.
[079] The trust protocol node can execute the step (S303) and the step (S305) simultaneously. In other words, when the trust protocol node converts the service data corresponding to each type of data and each type of data that is obtained through analysis, to obtain the data sequence, the trust protocol node can store , based on a mapping relationship between a data type and service data, the service data that is obtained through analysis in a database corresponding to the trust protocol node.
[080] Certainly, after determining that the other trust protocol node in the consensus network obtains a consensus on the service request, the trust protocol node can store, based on the mapping relationship between a data type and data of service, the service data that is obtained by analyzing the database corresponding to the trust protocol node.
[081] The data storage method and the data search method provided in the embodiments of the present application have been described above. Based on the same concept, the embodiments of the present application further provide a data storage device and a data search device, as shown in Figure 4 and Figure 5.
[082] Figure 4 is a schematic diagram that illustrates a
Petition 870190060139, of 06/27/2019, p. 112/125
26/34 data storage device, according to an embodiment of the present application. The device includes: a reception module (401), configured to receive a service request; a data analysis module (402), configured to analyze the service request to obtain each type of data and corresponding service data for each type of data; and a storage module (403), configured to store, based on a mapping relationship between a type of data and service data, the service data that is obtained through analysis in a database corresponding to the trust protocol.
[083] The device also includes: a consensus module (404), configured to convert, based on a predetermined data format, each type of data included in the service request and the corresponding service data for each type of data, to obtain a data stream; perform a consensus procedure on the service request using a consensus network; and storing the data string in a trust protocol corresponding to the device after a consensus is reached on the service request.
[084] The data analysis module (402) determines at least one of a type of service or identifying information corresponding to the service request.
[085] The storage module (403) converts, based on a predetermined instruction format, at least one among each type of data, the service data corresponding to each type of data, the type of service or the identification information which are obtained through analysis, to obtain a data storage instruction; and stores the service data that is obtained by analyzing it in the database, executing the data storage instruction.
[086] The storage module (403) creates, based on at least
Petition 870190060139, of 06/27/2019, p. 113/125
27/34 minus one of the type of service or identification information, a database corresponding to at least one of the type of service or identification information when it determines, when executing the data storage instruction, that no bank of data that corresponds to at least one of the type of service or identifying information is identified; and stores the service data that is obtained through analysis in the created database.
[087] The storage module (403) creates each type of data that is obtained by analyzing the data sequence in the database when determining that the database does not include the data type; and stores service data corresponding to the data type in the database.
[088] Figure 5 is a schematic diagram illustrating a data search device, according to an embodiment of the present application. The device includes: a request receiving module (501), configured to receive a service data search request; a type determination module (502), configured to determine, based on the service data search request, a data type corresponding to the service data to be searched; and a data search module (503), configured to search for service data that corresponds to the data type of a database corresponding to the device, where the database includes a mapping relationship between a data type and data from service.
[089] In the embodiments of this request, after receiving the service request sent by the user, the trust protocol node can analyze the service request to obtain each type of data and the service data corresponding to each type of service. data and store, based on the mapping relationship between a data type and service data, the service data that is obtained through analysis in the database
Petition 870190060139, of 06/27/2019, p. 114/125
28/34 corresponding to the trust protocol node. The service data is obtained through analysis and the service data can be stored, based on the mapping relationship between a type of data and service data, in the database corresponding to the trust protocol node. As such, a user can search for service data based on such a mapping relationship in the database, thus alleviating a problem in the existing technology of performing search on an index-based trust protocol and effectively improving search flexibility and efficiency. data in a trusted protocol.
[090] In the 1990s, if a technical improvement was a hardware improvement (for example, an improvement to a circuit structure, such as a diode, a transistor or a switch) or a software improvement (an improvement to a method procedure) could be clearly distinguished. However, as technologies develop, current improvements in many method procedures can be seen as direct improvements in hardware circuit structures. A designer usually schedules an improved method procedure on a hardware circuit to obtain a corresponding hardware circuit structure. Therefore, a method procedure can be improved using a hardware entity module. For example, a programmable logic device (PLD) (for example, a field programmable gate network (FPGA)) is an integrated circuit, and a logical PLD function is determined by a user through device programming. The designer performs the programming to “integrate” a digital system into a PLD without asking a chip manufacturer to design and produce an application-specific integrated circuit chip. In addition, today, instead of manually manufacturing an integrated circuit chip, this type of programming is mainly implemented using “logical compiler” software. The software
Petition 870190060139, of 06/27/2019, p. 115/125
29/34 logical compiler is similar to a software compiler used to develop and write a program. The original code needs to be written in a specific programming language for compilation. The language is referred to as a hardware description language (HDL). There are several HDLs, such as Advanced Boolean Expression Language (ABEL), Altera Hardware Description Language (AHDL), Confluence, Cornell University Programming Language (CUPL), HDCal, Java Hardware Description Language (JHDL), Lava, Lola, MyHDL, PALASM and Ruby hardware description language (RHDL). High Speed Integrated Circuit Hardware (VHDL) and Verilog are the most used language today. A person skilled in the art should also understand that a hardware circuit that implements a logical method procedure can be easily obtained as long as the method procedure is programmed logically using the various hardware description languages described and is programmed in an integrated circuit.
[091] A controller can be implemented using any appropriate method. For example, the controller can be a microprocessor or processor, or a computer-readable medium that stores computer-readable program code (such as software or firmware) that can be run by the microprocessor or processor, a logic port, a switch , an application-specific integrated circuit (ASIC), a programmable logic controller or a built-in microprocessor. Controller examples include, but are not limited to, the following microprocessors: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320. The memory controller can also be implemented as a part of the memory control logic. A person skilled in the art also knows that, in addition to implementing the controller using computer-readable program code, logical programming can be
Petition 870190060139, of 06/27/2019, p. 116/125
30/34 executed in the method steps to allow the controller to implement the same function in the forms of the logic gate, the switch, the application-specific integrated circuit, the programmable logic controller, and the built-in microcontroller. Therefore, the controller can be considered as a hardware component, and a device configured to implement various functions in the controller can also be considered as a structure in the hardware component. Or, the device configured to implement various functions can even be considered both as a software module that implements the method and as a structure in the hardware component.
[092] The system, device, module or unit illustrated in the previous embodiments can be implemented using a computer chip or an entity, or can be implemented using a product with a certain function. A typical deployment device is a computer. The computer can be, for example, a personal computer, a portable computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an e-mail device , a game console, a tablet computer, a usable device, or a combination of any of those devices.
[093] To facilitate description, the device above is described by dividing the functions into several units. Certainly, when the present application is implemented, a function of each unit can be implemented in one or more pieces of software and / or hardware.
[094] A person skilled in the art should understand that an embodiment of the present invention can be provided as a method, system or computer program product. Therefore, the present invention can use a form of only embodiments of
Petition 870190060139, of 06/27/2019, p. 117/125
31/34 hardware, only software embodiments, or embodiments with a combination of software and hardware. In addition, the embodiments of the present invention may use a form of a computer program product that is implemented on one or more storage media usable by a computer (including, but not limited to disk memory, a CD-ROM , an optical memory, etc.) that include computer-usable program code.
[095] The present invention is described with reference to flowcharts and / or block diagrams of the method, device (system) and computer program product based on the embodiments of the present invention. It is worth noting that computer program instructions can be used to implement each process and / or each block in flowcharts and / or block diagrams and a combination of processes and / or blocks in flowcharts and / or block diagrams. These computer program instructions can be provided for a general-purpose computer, a dedicated computer, an embedded processor, or a processor from another programmable data processing device to generate a machine, so that instructions executed by the computer or the processor another programmable data processing device manages a device to implement a specific function in one or more processes in flowcharts and / or in one or more blocks in block diagrams.
[096] These computer program instructions can be stored in a computer-readable memory that can instruct the computer or other programmable data-processing device to function in a specific way, so that the instructions stored in the computer-readable memory generate a artifact that includes an instructional device. The instructional device implements a specific function in
Petition 870190060139, of 06/27/2019, p. 118/125
32/34 one or more processes in flowcharts and / or in one or more blocks in block diagrams.
[097] These computer program instructions can be loaded onto the computer or other programmable data processing device, so that a series of operations and steps are performed on the computer or on the other programmable device, thereby generating computer-implemented processing. Therefore, instructions executed on the computer or other programmable device provide steps to implement a specific function in one or more processes in flowcharts and / or in one or more blocks in block diagrams.
[098] In a typical configuration, a computing device includes one or more processors (CPUs), one or more input / output interfaces, one or more network interfaces and one or more memories.
[099] The memory may include a non-persistent memory, a random access memory (RAM), a non-volatile memory and / or other form that is in a computer-readable medium, for example, a read-only memory (ROM) or a flash memory (flash RAM). Memory is an example of a computer-readable medium.
[0100] The computer-readable medium includes persistent, non-persistent, removable and non-removable media that can store information using any method or technology. The information can be a computer-readable instruction, a data structure, a program module or other data. Examples of the computer storage medium include, but are not limited to, a parameter random access memory (PRAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), another type of memory random access (RAM), a read-only memory (ROM), an electrically erasable programmable and read-only memory (EEPROM), a flash memory
Petition 870190060139, of 06/27/2019, p. 119/125
33/34 or other memory technology, a read-only compact disc (CD-ROM) memory, a versatile digital disc (DVD) or other optical storage, a magnetic tape cassette, a magnetic tape / magnetic disk storage or other magnetic storage device or any other means of non-transmission. The computer's storage medium can be used to store information accessible by a computing device. As described in this specification, the computer-readable medium does not include computer-readable transient means, such as a modulated data signal and a carrier.
[0101] It is also worth noting that the terms “include”, “understand”, or any other variants thereof, are intended to cover a non-exclusive inclusion, so that a process, a method, a product or a device that includes a series of elements, not only includes those elements, but also includes other elements that are not expressly listed, or even includes elements inherent to such a process, method, product or device. An element described by "includes a ..." additionally includes, without further restrictions, another identical or equal element in the process, method, product or device that includes the element.
[0102] One skilled in the art should understand that the embodiments of the present application can be provided as a method, a system or a computer program product. Therefore, the present application may use a form of just hardware embodiments, just software embodiments, or embodiments with a combination of software and hardware. In addition, the present application may use a form of a computer program product that is implemented on one or more storage media usable per computer (including, but not limited to, disk memory, CD-ROM, optical memory etc.) which includes program code usable by computer.
Petition 870190060139, of 06/27/2019, p. 120/125
34/34 [0103] The present application can be described in the general context of computer executable instructions executed by a computer, for example, a program module. Generally, the program module includes a routine, program, object, component, data structure, etc., that performs a specific task or implements a specific abstract data type. The present application can also be practiced in distributed computing environments. In distributed computing environments, tasks are performed by remote processing devices connected via a communications network. In a distributed computing environment, the program module can be located on both local and remote computer storage media that includes storage devices.
[0104] The embodiments in this specification are progressively described. For equal or similar parts of the embodiments, references to the embodiments can be made. Each embodiment focuses on a difference from other embodiments. In particular, a system embodiment is basically similar to a method embodiment and is therefore briefly described. For related parties, references can be made to related descriptions in the embodiment of the method.
[0105] The preceding descriptions are embodiments of this application, and are not intended to limit this application. A person skilled in the art can make several modifications and changes to this application. Any modification, equivalent substitution or improvement made without departing from the spirit and principle of this application must be within the scope of the claims in this application.
权利要求:
Claims (10)
[1]
Claims
1. DATA STORAGE METHOD, characterized by the fact that the method comprises:
receive, through a trust protocol node (blockchain), a service request;
determine at least one of a type of service or identifying information corresponding to the service request;
analyze the service request to obtain each type of data and service data corresponding to each type of data;
convert, based on a predetermined instruction format, at least one of each type of data, the service data corresponding to each type of data, the type of service or the identification information obtained through analysis, to obtain an instruction of Data storage; and store, based on a mapping relationship between a data type and service data, the service data that is obtained by analyzing it in a database corresponding to the trust protocol node, executing the storage instruction of Dice.
[2]
2. METHOD, according to claim 1, characterized by the fact that after analyzing the service request, the method also comprises:
convert, based on a predetermined data format, each type of data contained in the service request and the corresponding service data for each type of data, to obtain a data string;
perform a consensus procedure on the service request using a consensus network; and store the data string in a trusted protocol
Petition 870190060139, of 06/27/2019, p. 122/125
2/3 corresponding to the trust protocol node after a consensus is reached in the service request.
[3]
3. METHOD, according to claim 1, characterized by the fact that the predetermined instruction format comprises an identification information field and a service type field.
[4]
4. METHOD, according to claim 1, characterized by the fact that the storage of service data that is obtained through analysis in the database, executing the data storage instruction, comprises:
create, based on at least one of the type of service or identification information, a database corresponding to at least one of the type of service or identification information in response to the determination, executing the data storage instruction, of that no database corresponding to at least one of the type of service or identifying information is identified; and store the service data that is obtained through analysis in the created database.
[5]
5. METHOD, according to claim 1, characterized by the fact that the storage of service data that is obtained through analysis in the database comprises:
create each type of data that is obtained by analyzing the data stream in the database in response to the determination that the database does not understand the data type; and store service data corresponding to the data type in the database.
[6]
6. METHOD, according to claim 1, characterized by the fact that the service request comprises a service data search request.
Petition 870190060139, of 06/27/2019, p. 123/125
3/3
[7]
7. METHOD, according to claim 6, characterized by the fact that determining, based on the service data search request, the type of data corresponding to the service data to be searched, comprises determining an included index field in the service data search request.
[8]
8. METHOD, according to claim 1, characterized by the fact that it also comprises:
search for the service data that corresponds to the data type from the database corresponding to the trust protocol node.
[9]
9. METHOD, according to claim 1, characterized by the fact that the identifying information comprises a public user key or a user identity.
[10]
10. DATA STORAGE DEVICE, characterized by the fact that the device comprises a plurality of modules configured to execute the method as defined in any one of claims 1 to 9.
类似技术:
公开号 | 公开日 | 专利标题
BR112019013441A2|2019-12-31|data storage method and data storage device
EP3531656B1|2020-09-30|Block chain-based data processing method and device
BR112019014589A2|2020-02-18|SERVICE AND APPLIANCE PROCESSING METHOD
JP6963006B2|2021-11-05|Data storage, data checking, and data concatenation methods and equipment
BR112019013204A2|2019-12-10|service processing method and service processing device
BR112019013412B1|2022-02-01|Method for processing data based on a reliable protocol, computer-readable medium, and computer-implemented system.
JP6804668B2|2020-12-23|Block data validation method and equipment
BR112019014478A2|2020-05-26|METHOD FOR DETERMINING THE DATABASE STATUS AND DEVICE FOR DETERMINING THE DATABASE STATUS
TW201909009A|2019-03-01|Data processing method and device based on blockchain
BR112019013394A2|2020-03-03|DATA PROCESSING METHOD AND DATA PROCESSING DEVICE
WO2019192258A1|2019-10-10|Data synchronization method, device and apparatus
US9304742B2|2016-04-05|Modifying a middleware
US20170032024A1|2017-02-02|Information query
BR112019010976A2|2019-10-15|scan and pay method and device used in mobile devices
US20200210425A1|2020-07-02|Data processing method, apparatus, and device
US10901971B2|2021-01-26|Random walking and cluster-based random walking method, apparatus and device
US20200244460A1|2020-07-30|Blockchain-based identity authentication method, apparatus, and device
JP7021228B2|2022-02-16|Blockchain-based data storage and query methods and devices
US20210263750A1|2021-08-26|Method and apparatus for efficient programming of electronic payment processing
BR112019010669A2|2019-10-01|method for name matching and apparatus for name matching
JP2007219612A|2007-08-30|Interface program and information processor
CN109460312A|2019-03-12|Request the processing method and processing device of failure
同族专利:
公开号 | 公开日
TW201837747A|2018-10-16|
EP3547240A1|2019-10-02|
MX2019007806A|2019-09-06|
US11204915B2|2021-12-21|
WO2018177252A1|2018-10-04|
US10713239B2|2020-07-14|
CN107239479B|2020-03-13|
US20200026700A1|2020-01-23|
US10942921B2|2021-03-09|
SG10202105047SA|2021-06-29|
TWI698813B|2020-07-11|
AU2018241565B2|2020-05-14|
CN107239479A|2017-10-10|
KR20190094188A|2019-08-12|
RU2729960C1|2020-08-13|
US20210141784A1|2021-05-13|
CA3048741C|2021-04-13|
AU2018241565A1|2019-07-18|
JP2020508503A|2020-03-19|
SG10202100669YA|2021-02-25|
KR102258437B1|2021-06-02|
ZA201904223B|2020-10-28|
CA3048741A1|2018-10-04|
EP3547240A4|2019-10-02|
PH12019501518A1|2020-06-01|
US20200265041A1|2020-08-20|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

CN100527694C|2006-05-10|2009-08-12|华为技术有限公司|Method and device for providing multi public network service for small networks|
CN101256650B|2008-03-21|2012-02-15|中国科学院软件研究所|Method and system for extracting enterprise data based on service entity|
WO2011011540A2|2009-07-21|2011-01-27|Carexgen, Inc|Cloud-based healthcare information exchange|
US8732163B2|2009-08-04|2014-05-20|Sybase, Inc.|Query optimization with memory I/O awareness|
US9569771B2|2011-04-29|2017-02-14|Stephen Lesavich|Method and system for storage and retrieval of blockchain blocks using galois fields|
US20150379510A1|2012-07-10|2015-12-31|Stanley Benjamin Smith|Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.|
CN103095746B|2011-10-28|2016-08-03|腾讯科技(深圳)有限公司|A kind of method and device being sent message by microblogging to group user|
CN103713859B|2013-12-30|2015-02-25|税友软件集团股份有限公司|Removable storage device and removable storage data access method|
JP6437285B2|2014-11-21|2018-12-12|シャープ株式会社|COMMUNICATION DEVICE AND COMMUNICATION DEVICE CONTROL METHOD|
US20160224949A1|2015-02-04|2016-08-04|Ripple Labs Inc.|Temporary consensus subnetwork in a distributed network for payment processing|
US20160267566A1|2015-03-13|2016-09-15|Mark Levitt|Systems and methods for managing an inventory of digital gift card assets|
US10346397B2|2015-03-26|2019-07-09|Caswil Corporation|System and method for querying data sources|
EP3278287A4|2015-03-31|2018-08-22|Nasdaq, Inc.|Systems and methods of blockchain transaction recordation|
AU2016288644A1|2015-07-02|2018-02-22|Nasdaq, Inc.|Systems and methods of secure provenance for distributed transaction databases|
US20170085555A1|2015-07-14|2017-03-23|Fmr Llc|Point-to-Point Transaction Guidance Apparatuses, Methods and Systems|
EP3345360B1|2015-09-04|2021-03-03|Nec Corporation|Method for storing an object on a plurality of storage nodes|
CN105487816B|2015-11-26|2019-01-11|布比(北京)网络技术有限公司|A kind of method and device of data transfer|
CN105404701B|2015-12-31|2018-11-13|浙江图讯科技股份有限公司|A kind of heterogeneous database synchronization method based on peer-to-peer network|
US20170236121A1|2016-02-11|2017-08-17|Mastercard International Incorporated|Method and system for offline blockchain exchanges|
KR101701131B1|2016-04-28|2017-02-13|주식회사 라피|Data recording and validation methods and systems using the connecting of blockchain between different type|
JP6731783B2|2016-05-19|2020-07-29|株式会社野村総合研究所|Tamper detection system and tamper detection method|
CN106445993A|2016-07-11|2017-02-22|天津米游科技有限公司|Data fingerprint query method and device based on block chain|
US20180018356A1|2016-07-13|2018-01-18|Deepspace Storage Systems Inc.|Relational database online storage manager|
CN106383754A|2016-09-19|2017-02-08|北京众享比特科技有限公司|Database backup and recovery system based on block chain technology, and database backup method based on block chain technology, and database recovery method based on block chain technology|
US10360191B2|2016-10-07|2019-07-23|International Business Machines Corporation|Establishing overlay trust consensus for blockchain trust validation system|
CN106506493A|2016-10-27|2017-03-15|摩登大道时尚电子商务有限公司|Data processing method based on block platform chain|
CN106506638B|2016-11-04|2020-01-07|江苏通付盾科技有限公司|Block storage method and device in block chain|
WO2018144302A1|2017-01-31|2018-08-09|Rush Thomas Jay|Blockchain data-processing engine|
US10225078B2|2017-02-09|2019-03-05|International Business Machines Corporation|Managing a database management system using a blockchain database|
CN107239479B|2017-03-28|2020-03-13|创新先进技术有限公司|Block chain based data storage and query method and device|
US10404471B1|2017-04-26|2019-09-03|Wells Fargo Bank, N.A.|Secure ledger assurance tokenization|
US10565192B2|2017-08-01|2020-02-18|International Business Machines Corporation|Optimizing queries and other retrieve operations in a blockchain|
CN107423426B|2017-08-02|2020-06-02|众安信息技术服务有限公司|Data archiving method for block chain block data and electronic equipment|
US10977629B2|2017-09-29|2021-04-13|Oracle Financial Services Software Limited|Computerized messaging module for blockchain networks|
US10831764B2|2017-12-02|2020-11-10|International Business Machines Corporation|Query processing and access control in a blockchain network|
US10783272B2|2017-12-08|2020-09-22|Nec Corporation|Method and system of preserving privacy for usage of lightweight blockchain clients|
US11243945B2|2017-12-11|2022-02-08|International Business Machines Corporation|Distributed database having blockchain attributes|CN107196989B|2017-03-21|2019-08-09|阿里巴巴集团控股有限公司|A kind of processing method and processing device of service request|
CN107239479B|2017-03-28|2020-03-13|创新先进技术有限公司|Block chain based data storage and query method and device|
CN107450979B|2017-03-28|2020-06-02|创新先进技术有限公司|Block chain consensus method and device|
CN107562775B|2017-07-14|2020-04-24|创新先进技术有限公司|Data processing method and device based on block chain|
US20190116036A1|2017-10-17|2019-04-18|Hcl Technologies Limited|System and method for building a blockchain application|
CN107943951B|2017-11-24|2020-08-11|中钞信用卡产业发展有限公司杭州区块链技术研究院|Method and system for retrieving block chain service information|
CN107944868A|2017-12-07|2018-04-20|杭州趣链科技有限公司|A kind of electronics deposit system and management method based on block chain intelligence contract|
CN108446314B|2018-02-07|2021-08-13|平安科技(深圳)有限公司|Student information storage method, computer readable storage medium and terminal equipment|
CN108345685A|2018-03-07|2018-07-31|物数(上海)信息科技有限公司|More granularity data processing methods, system, equipment and storage medium under block chain|
CN108833330B|2018-04-08|2020-07-17|浙江商业职业技术学院|Rural e-commerce data authentication method|
CN108809929B|2018-04-08|2020-07-17|浙江商业职业技术学院|Rural financial system based on block chain technology|
CN108664623A|2018-05-14|2018-10-16|中钞信用卡产业发展有限公司杭州区块链技术研究院|A kind of date storage method, device, equipment and medium|
CN108632386B|2018-05-15|2021-06-08|众安信息技术服务有限公司|Block chain link point cluster building method and device|
CN109034832A|2018-06-13|2018-12-18|湖南搜云网络科技股份有限公司|The information processing method and device of block chain, information processing node and storage medium|
CN108984645B|2018-06-25|2021-02-02|百度在线网络技术(北京)有限公司|Block chain processing method, device, equipment and storage medium|
CN108984768B|2018-07-21|2022-03-08|江苏飞搏软件股份有限公司|Distributed chained data resource catalog and index management method|
CN109145201B|2018-07-26|2020-11-10|百度在线网络技术(北京)有限公司|Information management method, device, equipment and storage medium based on block chain|
CN109101835A|2018-08-08|2018-12-28|苏州酷外文化传媒有限公司|The information security management method and device of blind date dating site based on block chain|
CN109145189A|2018-08-22|2019-01-04|杭州微链区块链科技有限公司|A kind of data deposit and search system and its method based on block chain|
CN108876383A|2018-08-27|2018-11-23|广东工业大学|A kind of data trade method, device and equipment based on block chain|
CN109241361A|2018-08-31|2019-01-18|上海雄九投资控股有限公司|Data processing method based on block chain|
CN109347917A|2018-09-14|2019-02-15|北京沃杰知识产权有限公司|Block chain data common recognition processing method, system, storage medium and electronic equipment|
CN110958211A|2018-09-27|2020-04-03|北京云雾链网络科技有限公司|Data processing system and method based on block chain|
CN109377338A|2018-10-17|2019-02-22|中链科技有限公司|Financial product processing method and processing device based on block chain|
US11036497B1|2018-10-24|2021-06-15|Cerner Innovation, Inc.|Code assessment for quality control of an object relational mapper and correction of problematic cast functions|
CN109614823A|2018-10-26|2019-04-12|阿里巴巴集团控股有限公司|A kind of processing method of data, device and equipment|
CN109388643A|2018-10-26|2019-02-26|陕西医链区块链集团有限公司|A kind of rapid data searching system and method based on block chain|
CN110011800B|2018-11-07|2020-04-14|阿里巴巴集团控股有限公司|Block chain data reading method and device|
CN109446204A|2018-11-27|2019-03-08|北京微播视界科技有限公司|A kind of date storage method of instant messaging, device, electronic equipment and medium|
CN111224793B|2018-11-27|2021-06-01|华为技术有限公司|Data storage method and device, computer equipment and readable storage medium|
TWI700707B|2018-11-28|2020-08-01|臺北醫學大學|Method and system for retrieving electronic medical and health records by blockchain|
CN109669943A|2018-11-30|2019-04-23|深圳灵图慧视科技有限公司|Date storage method, data query method and device|
CN109815051A|2018-12-20|2019-05-28|深圳智乾区块链科技有限公司|The data processing method and system of block chain|
CN110046036A|2018-12-25|2019-07-23|阿里巴巴集团控股有限公司|A kind of operation requests distribution method, device and equipment|
CN109559231B|2018-12-29|2020-08-04|华东师范大学|Block chain-oriented tracing query method|
CN109766389B|2019-01-09|2020-09-22|华东师范大学|Block chain light client verification query method based on bitmap index|
CN111475309A|2019-01-24|2020-07-31|北京京东尚科信息技术有限公司|Data processing method, device, block chain service system and storage medium|
CN110119486A|2019-04-18|2019-08-13|杭州宇链科技有限公司|A kind of data format and its generation and analytic method for the transaction of block chain|
US10990705B2|2019-04-18|2021-04-27|Advanced New Technologies Co., Ltd.|Index creation for data records|
WO2020211569A1|2019-04-18|2020-10-22|创新先进技术有限公司|Method for constructing index of data record|
CN110070444A|2019-04-25|2019-07-30|中钞信用卡产业发展有限公司杭州区块链技术研究院|A kind of block chain transaction flow management method and relevant apparatus|
CN110209671A|2019-05-17|2019-09-06|无锡朝阳供应链科技股份有限公司|A kind of the access system and its application of distribution account book data|
CN110211649A|2019-05-30|2019-09-06|爱多特网络技术有限公司|Case based on block chain technology shares motivational techniques and system|
CN110347674A|2019-06-03|2019-10-18|阿里巴巴集团控股有限公司|A kind of index creation method, device and equipment based on service identification|
US10963453B2|2019-06-03|2021-03-30|Advanced New Technologies Co., Ltd.|Service identifier-based data indexing|
CN112152974B|2019-06-28|2022-02-25|华为技术有限公司|Data right determining method based on block chain network and related device|
CN110334154B|2019-06-28|2020-07-21|阿里巴巴集团控股有限公司|Block chain based hierarchical storage method and device and electronic equipment|
EP3669280B1|2019-07-11|2021-09-08|Advanced New Technologies Co., Ltd.|Shared blockchain data storage|
WO2019179540A2|2019-07-11|2019-09-26|Alibaba Group Holding Limited|Shared blockchain data storage|
WO2019179538A2|2019-07-11|2019-09-26|Alibaba Group Holding Limited|Shared blockchain data storage|
US10951417B2|2019-07-12|2021-03-16|Advanced New Technologies Co., Ltd.|Blockchain-based transaction verification|
CN110457398A|2019-08-15|2019-11-15|广州蚁比特区块链科技有限公司|Block data storage method and device|
CN110609839B|2019-09-17|2021-05-25|北京海益同展信息科技有限公司|Method, device and equipment for processing block chain data and readable storage medium|
CN110659264A|2019-09-26|2020-01-07|联想有限公司|Business processing method and device for computing system and computing system|
CN110795437A|2019-11-04|2020-02-14|泰康保险集团股份有限公司|Service processing method, system, device and computer readable storage medium|
KR102337836B1|2019-11-11|2021-12-10|한국전자기술연구원|External information recognizing and information providing method using blockchain|
KR102298566B1|2019-12-19|2021-09-03|한전케이디엔주식회사|Apparatus for interfacing communication between legacy system for recruiting and platform of block_chain|
CN111488613A|2020-04-08|2020-08-04|北京瑞策科技有限公司|Data efficient query method and device for service data block chain|
CN111866147A|2020-07-23|2020-10-30|山东浪潮商用系统有限公司|Remote video service handling method, system and management terminal|
CN112765280B|2021-02-03|2021-09-24|腾讯科技(深圳)有限公司|Block data storage method and device, computer readable medium and electronic equipment|
CN113139019A|2021-06-18|2021-07-20|智己汽车科技有限公司|Method and device for recording mileage data of vehicle on block chain|
法律状态:
2021-04-06| B25A| Requested transfer of rights approved|Owner name: ADVANTAGEOUS NEW TECHNOLOGIES CO., LTD. (KY) |
2021-04-27| B25A| Requested transfer of rights approved|Owner name: ADVANCED NEW TECHNOLOGIES CO., LTD. (KY) |
2021-10-13| B350| Update of information on the portal [chapter 15.35 patent gazette]|
2021-10-26| B15K| Others concerning applications: alteration of classification|Free format text: A CLASSIFICACAO ANTERIOR ERA: G06F 17/30 Ipc: G06F 16/24 (2019.01), H04L 9/00 (2006.01) |
2021-11-03| B07A| Application suspended after technical examination (opinion) [chapter 7.1 patent gazette]|
优先权:
申请号 | 申请日 | 专利标题
CN201710191771.7A|CN107239479B|2017-03-28|2017-03-28|Block chain based data storage and query method and device|
PCT/CN2018/080505|WO2018177252A1|2017-03-28|2018-03-26|Block chain-based data storage and query method and device|
[返回顶部]