Data access method, device and equipment and storage medium
A data access and data technology, applied in the computer field, can solve problems such as the limitation of blockchain application space, the difficulty of chain-to-chain collaboration, and the lack of blockchain interoperability, so as to ensure effectiveness and accuracy, and enrich the scope of application Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] figure 1 It is a flowchart of a data access method in Embodiment 1 of the present application. The embodiment of the present application is applicable to the situation of cross-chain access to data objects belonging to different blockchains in the super blockchain network. In the blockchain system, smart contracts that implement different functions can be deployed. Each smart contract includes a combination of programs, and the set function processing is completed during the process of running the program. The operation of smart contracts involves generating and reading some data, such as user data, business data, etc., which can be called data objects. Each smart contract can manage the storage and read-write access of its own data objects based on the set data storage model, forming a data object set. Generally speaking, the sets of data objects between different smart contracts do not overlap and cannot access each other. When different smart contracts are located...
Embodiment 2
[0092] figure 2 It is a flow chart of a data access method in Embodiment 2 of the present application. The embodiment of the present application is optimized and improved on the basis of the technical solutions of the foregoing embodiments.
[0093] Further, in the process of data access, add "According to the data identification of the data object to be accessed in the source transaction request, if it is determined that the data object to be accessed belongs to a different blockchain, then it is determined that there is a data object belonging to the target blockchain." The access requirements; wherein, the data identification includes at least the names of the data level and the chain level, and the data identification also includes the names of the contract level and the network level", so as to improve the determination mechanism of access requirements.
[0094] Such as figure 2 One data access method shown, including:
[0095] S201. During the process of locally pre-...
Embodiment 3
[0114] image 3 It is a flowchart of a data access method in Embodiment 3 of the present application. The embodiments of the present application are optimized and improved on the basis of the technical solutions of the foregoing embodiments.
[0115] Further, "monitor whether the block where the latest data in the target blockchain is located is a block that is prohibited from rolling back" is refined into "monitoring whether the block where the latest data is located in the target blockchain Whether it is a checkpoint block; wherein, the block before the checkpoint block is prohibited from rolling back", so as to improve the block monitoring mechanism.
[0116] Further, in the process of continuous monitoring, add "if the latest data of the data object to be accessed is monitored to be updated by the target blockchain, then use the updated latest data of the data object to be accessed as the access result, and re-preset Execute the source transaction request" to improve the d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


