A chain data anchoring method and device
An anchoring device and anchoring technology, applied in the field of blockchain, can solve the problems of insufficient credibility of evidence chain information, and achieve the effect of overcoming the lack of credibility.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0104] Embodiment 1: After each user node extracts evidence files from the storage area (the local storage area of the user node or the storage area docked with the management node), it reports the evaluation elements of the extracted evidence files, or it can be in the verification office After the extracted evidence files have not been tampered with, report the evaluation elements of the evidence files.
Embodiment approach 2
[0105] Embodiment 2: Disclose the evidence file in a read-only manner to each user node that accesses the consortium chain, so that each user node that accesses the consortium chain reports the evaluation elements of the disclosed evidence file.
[0106] In the specific implementation process, the evaluation elements can take many forms, which are explained below:
[0107] Form 1: The evaluation element is the score value of the evidence file. Specifically, the range of the score value can be set, and the user node can score the obtained evidence file within the range of the score value, so that the management node can obtain the evidence file value of each user node. scoring value. For example, the scoring value range can be set to 0-5, or can be set to 0-10, or can be set to 0-100. Of course, the scoring value range can also be set to other ranges according to actual needs. Correspondingly, the preset evaluation condition is the scoring value threshold, and the scoring val...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


