Data shielding method and device, server and medium
A data shielding and data segment technology, applied in the blockchain field, can solve problems such as ineffective data shielding processing, achieve flexible shielding processing, effective shielding processing, and guarantee the effect of true integrity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] see figure 1 , the embodiment of the present application provides a data masking method, including:
[0058] Step 101, in response to receiving a query request for querying the transaction data to be checked, determine the storage identifier of the transaction data to be checked.
[0059] Wherein, the above-mentioned storage identifier is used to indicate the storage sequence of the transaction data on the blockchain. In practice, the above storage identifier can be the sequence number of the transaction data in the blockchain. Each transaction data stored in the blockchain can have a storage ID.
[0060] Wherein, the transaction data to be checked is usually the transaction data to be checked in the block chain.
[0061] In this embodiment, the execution subject of the data masking method is generally a blockchain, and specifically a blockchain node on the blockchain. In practice, blockchain nodes can usually be implemented as servers.
[0062] Here, the requestin...
Embodiment 2
[0077] read on figure 2 , figure 2 A flow chart of another data masking method provided by the embodiment of this application, such as figure 2 As shown, the data masking method may include the following steps:
[0078] Step 201, according to the pre-stored masking rule set, respectively determine the masking rules of each stored transaction data on the block chain.
[0079] Wherein, the shielding rules in the shielding rule set correspond to rule identifiers. A rule ID uniquely corresponds to a blocking rule.
[0080] Wherein, the above-mentioned stored transaction data generally refers to the transaction data stored in the blockchain.
[0081] Here, for each transaction data stored in the block chain, the execution subject can determine the masking rule that matches the transaction data from the masking rule set. In practice, if there is no masking rule matching the transaction data in the masking rule set, it means that the transaction data does not need to be maske...
Embodiment 3
[0124] read on Figure 4 , Figure 4 A flow chart of another data masking method provided by the embodiment of this application, such as Figure 4 As shown, the data masking method may include the following steps:
[0125] Step 401, according to the pre-stored masking rule set, respectively determine the masking rules of each stored transaction data on the block chain.
[0126] Wherein, the shielding rules in the shielding rule set correspond to rule identifiers.
[0127] Step 402, according to the masking rules of each stored transaction data on the block chain, determine the masked state information of each stored transaction data.
[0128] Wherein, the masking status information is used to indicate whether the corresponding transaction data needs to be masked. It should be pointed out that whether the transaction data mentioned in this application needs to be shielded generally refers to whether the transaction data has content that needs to be shielded.
[0129] Here,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


