Data storage data processing method based on block chain

A processing method, block chain technology, applied in the direction of electronic digital data processing, data processing applications, special data processing applications, etc., can solve data leakage, malicious damage, hidden dangers of data security, etc., to increase reliability and ensure authenticity Sexuality, the effect of alleviating contradictions and conflicts

Pending Publication Date: 2019-10-15
HARBIN UNIV OF SCI & TECH
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users often question the honesty of the system and worry that their uploaded data will be leaked or maliciously damaged, which is not conducive to the establishment of a long-term trust relationship between the system and users
[0007] 2) Data security risks
[0008] 3) Huge resource overhead
[0009] In addition, due to the generally limited computer knowledge of law enforcement officers, misjudgments may occur in the determination of electronic evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data storage data processing method based on block chain
  • Data storage data processing method based on block chain
  • Data storage data processing method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0080] Specific Embodiments 1. The processing method of blockchain-based electronic deposit data described in this embodiment includes methods for uploading electronic data, methods for preserving electronic data, methods for querying electronic data, methods for downloading electronic data, and methods for electronic data Authorization method, electronic data comparison method and user point establishment method;

[0081] The method for uploading electronic data includes the following steps:

[0082] Step A1. Calculate the point cost m of this upload operation;

[0083] Step A2, obtaining the current user's points c;

[0084] Step A3, judging whether c is greater than or equal to m; if the judgment result is yes, then execute step A41; if the judgment result is no, then execute step A42;

[0085] Step A41, providing an upload function, and then performing step A5;

[0086] Step A42, reminding the user that the current points are insufficient; then end;

[0087] Step A5, u...

specific Embodiment approach 2

[0264] Embodiment 2. The difference between this embodiment and the blockchain-based data storage and data processing method described in Embodiment 1 is that the index idea is introduced in the process of writing the smart contract to constrain Different users' access rights to electronic data.

[0265] In the process of writing the smart contract, four structural variables of File, Record, Member and User are defined, which respectively store key information of electronic data files, key information of electronic data file fragmentation, and all relationships between user data and electronic data files . Based on the above four variables, writing of electronic data information, query of electronic data information, authorization of electronic data, update of user information and query of user information are programmed in sequence. Considering that the writing speed of Ethereum data is slow and it is easy to affect the user experience, an asynchronous request method (sendAs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data storage data processing method based on a block chain, and relates to a data processing technology. While ensuring authenticity, integrity and security of stored certificate data, privacy information of user can be protected to certain extent, the Web3j interaction function is utilized, the intelligent contract is compiled, the packaged key information is anchored tothe main chain of the block chain in a structural body mode, and it is guaranteed that the electronic data cannot be tampered. Meanwhile, an index thought is introduced in the compiling process of the intelligent contract to constrain access permissions of different users to the electronic data, multi-point fragmentation storage of the electronic data is completed by using a distributed storage fault-tolerant technology, and the safety of data fragmentation storage of each node is ensured with relatively low redundancy cost. According to the method, a scheme for evaluating the performance ofthe user nodes is provided for the network and storage, and a basis is provided for selection of the storage user nodes.

Description

technical field [0001] The invention relates to a data certificate storage system and its data processing technology. Background technique [0002] With the rapid development of Internet technology and the large-scale popularization of electronic products, electronic data has begun to enter the public eye. Due to the high efficiency of transmission and use, electronic data has quickly become one of the mainstream data types nowadays. [0003] Electronic data has the characteristics of easy creation, storage, transmission and high utilization, and is reliable and provable electronic data evidence. At present, the judiciary is no longer satisfied with traditional evidence materials, and electronic data materials such as electronic contracts, telephone recordings, electronic orders and e-mails have become new types of evidence materials. However, dangerous behaviors such as malicious intrusion attacks and virus infections often cause serious consequences such as leakage, tamp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/13G06F16/182G06F21/60G06F21/62G06Q20/38
CPCG06F16/137G06F16/182G06F21/602G06F21/6218G06Q20/3827G06Q20/3829
Inventor 王博修国义
Owner HARBIN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products