Data storage and query method and device, computer system and readable storage medium

A technology for data storage and query methods, applied in the field of blockchain, can solve the problems of tampering, public data tampering, and fraud, and achieve the effect of eliminating the risk of business secret leakage, reducing trust risk, and protecting private data.

Pending Publication Date: 2019-06-14
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when evaluation companies obtain public data and carry out comprehensive evaluation, it is easy to tamper, counterfeit, and falsify the public data due to human factors or market factors, so as to affect the comprehensive evaluation results of the company, thereby causing the current comprehensive evaluation results of the company to be credible. lower case occurs;
[0003] At present, through the establishment of alliance chains in the industry, blockchains, as "trusted machines", have the characteristics of traceability, consensus and decentralization, and the data on the blockchains are all time-stamped, even if the data of a certain node is Modifications cannot cover the sky with only one hand, so the blockchain can provide an absolutely credible environment. Through the decentralized architecture of the blockchain, the global mutual trust mechanism can be used to form a strong P2P trust relationship; the establishment of the mutual trust mechanism can Effectively reduce the cost of risk control on the capital side and solve the bank's doubts about information tampering; however, this method cannot solve the situation that the certification nodes inside the blockchain have tampered with the certification documents. Therefore, it is still impossible to eliminate the evidence. risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage and query method and device, computer system and readable storage medium
  • Data storage and query method and device, computer system and readable storage medium
  • Data storage and query method and device, computer system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] see figure 1 and figure 2 , a kind of data storage inquiry method of the present embodiment, utilize block chain database 2 and data storage query device 1, have several proof nodes in the block chain database 2, comprise the following steps:

[0062] S1: After receiving the certification file and encrypting the certification file, saving the certification file;

[0063] S2: Receive the query application and client authentication information, and output the query authority according to the query application and client authentication information; wherein, the client authentication information is information used to prove the identity of the client, and the client authentication information can be the client's The IP address may also be the unique code of the client, or may be a combination of the IP address of the client and the unique code.

[0064] S3: Receive the query instruction and output the certificate according to the query instruction.

[0065] Specifically...

Embodiment 2

[0107] see image 3 , a data storage query device 1 of the present embodiment, comprising:

[0108] An encryption storage module 11, configured to receive the certification file and encrypt the certification file, and store the certification file;

[0109] The authority management module 12 is used to receive the inquiry application and the client authentication information, and output the inquiry authority according to the inquiry application and the client authentication information;

[0110] The query management module 13 is used to output certification documents according to the query application.

[0111] This technical solution is based on the block chain, uses the block chain database as the block storage system, encrypts the proof node receiving the proof file of the block chain database through the encryption storage module 11, and finally verifies whether the encryption of the proof file is successful by the verification node, To prove that the certification file i...

Embodiment 3

[0113] In order to achieve the above object, the present invention also provides a computer system, which includes a plurality of computer devices 5, and the components of the data storage query device 1 in Embodiment 2 can be dispersed in different computer devices, and the computer devices can be executed Smartphones, tablet computers, laptops, desktop computers, rack servers, blade servers, tower servers or rack servers (including independent servers, or server clusters composed of multiple servers), etc. The computer equipment in this embodiment at least includes but is not limited to: a memory 51 and a processor 52 that can communicate with each other through a system bus, such as Figure 4 shown. It should be pointed out that, Figure 4 Only a computer device is shown with the components - but it should be understood that implementing all of the illustrated components is not a requirement and that more or fewer components may instead be implemented.

[0114] In this em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data storage and query method and device, a computer system and a readable storage medium. By utilizing a block chain database, the block chain database is provided with a plurality of proof nodes, and the method comprises the following steps of receiving a proof file, encrypting the proof file, and storing the proof file; receiving the query application and the client authentication information, and outputting a query authority according to the query application and the client authentication information; and receiving a query instruction and outputting the proof fileaccording to the query instruction. According to the invention, nodes except the block chain database are prevented from tampering the proof file; the comprehensive evaluation result of the company is influenced by counterfeiting and counterfeiting, and meanwhile, the situation that a certain proof node in the block chain database tampers proof files responsible for other proof nodes is also avoided, so that the credit of the comprehensive evaluation result of the company is improved. The method adapts to the requirement of the related party for the proof file of the client, protects the private data, and eliminates the risk of commercial secret leakage.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a data storage and query method, device, computer system and readable storage medium. Background technique [0002] At present, the industry's credit certification for enterprises is mainly based on the comprehensive evaluation of various public data of the company by various evaluation companies. However, when evaluation companies obtain public data and carry out comprehensive evaluation, it is easy to tamper, counterfeit, and falsify the public data due to human factors or market factors, so as to affect the comprehensive evaluation results of the company, thereby causing the current comprehensive evaluation results of the company to be credible. lower case occurs; [0003] At present, through the establishment of alliance chains in the industry, blockchains, as "trusted machines", have the characteristics of traceability, consensus and decentralization, and the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/60G06F21/62G06F21/64
Inventor 汤琦
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products