Method for creating, retrieving and editing data based on block chain and readable storage medium
A block chain and editing technology, applied in the field of block chain, can solve the problems of unguaranteed entry quality, repeated editing of entries, and financial risks of website single point failure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 220
[0113] In step S220, it is verified whether the created entry complies with entry rules. In this step, the specific operations are as follows Figure 2B Example 220 of:
[0114] Before step S221, the first node receives the entry. In this step, the first node may receive the entry directly or receive the entry via the second node.
[0115] In step S221, the first node verifies whether the signature, the public key, and the content of the entry are consistent. When the signature in the entry, the public key, and the content of the entry are consistent, step S221 is performed. For example, the first node can use an existing elliptic curve algorithm (such as ED25519, edcsa.SECP256k1) to verify the signature, public key, and edited content. Consistency, otherwise the entry message is discarded.
[0116] Step S222, the first node verifies whether the content of the entry complies with legal regulations and composes the entry content rules, wherein the entry content writing rule...
Embodiment 420
[0135] S420. The first node verifies whether the edited version of the entry complies with the entry rule. This step S420 can specifically be based on Figure 4B The disclosed embodiment 420 implements:
[0136] S421. The first node verifies whether the signature, public key, and edited content in the edited version of the entry are consistent. For example, the first node may use an existing elliptic curve algorithm (such as ED25519, edcsa.SECP256k1) to verify whether the signature, public key, and edited content are consistent. When the signature, public key, and entry content in the edited version of the entry are consistent, step S422 is executed; otherwise, the entry message is discarded.
[0137] S422. The first node verifies whether the edited content complies with the law and complies with entry writing rules. Among them, entry content writing rules include but are not limited to: the upper limit and lower limit of the number of words in the entry content, the keywor...
Embodiment 430
[0138] When the edited version of the entry conforms to the entry rule, step S430 is performed: storing the edited version of the entry into the block being generated. This step S430 can specifically be based on Figure 4C The disclosed embodiment 430 achieves:
[0139] S431, the first node charges editing fees from users who edit the latest version of the entry; when the first node receives the editing fees, execute step S432.
[0140] S432. The first node stores the edited version of the entry as a transaction in the block being generated.
[0141] S433. After the block being generated generates a block, the first node stores the generated block in the database of the first node, wherein the generated block also includes a hash value of the previous block.
[0142] In a specific implementation, the first node packs a reasonable number and size of entries and / or edited versions of the entries into blocks, and all first nodes on the block chain adopt a consensus mechanism (for...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


