Unlock instant, AI-driven research and patent intelligence for your innovation.

Data shielding method and device, server and medium

A data shielding and data segment technology, applied in the blockchain field, can solve problems such as ineffective data shielding processing, achieve flexible shielding processing, effective shielding processing, and guarantee the effect of true integrity

Active Publication Date: 2021-08-13
HANGZHOU QULIAN TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a data shielding method, device, server and medium, aiming to solve the problem that the data on the blockchain cannot be effectively shielded in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data shielding method and device, server and medium
  • Data shielding method and device, server and medium
  • Data shielding method and device, server and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] see figure 1 , the embodiment of the present application provides a data masking method, including:

[0058] Step 101, in response to receiving a query request for querying the transaction data to be checked, determine the storage identifier of the transaction data to be checked.

[0059] Wherein, the above-mentioned storage identifier is used to indicate the storage sequence of the transaction data on the blockchain. In practice, the above storage identifier can be the sequence number of the transaction data in the blockchain. Each transaction data stored in the blockchain can have a storage ID.

[0060] Wherein, the transaction data to be checked is usually the transaction data to be checked in the block chain.

[0061] In this embodiment, the execution subject of the data masking method is generally a blockchain, and specifically a blockchain node on the blockchain. In practice, blockchain nodes can usually be implemented as servers.

[0062] Here, the requestin...

Embodiment 2

[0077] read on figure 2 , figure 2 A flow chart of another data masking method provided by the embodiment of this application, such as figure 2 As shown, the data masking method may include the following steps:

[0078] Step 201, according to the pre-stored masking rule set, respectively determine the masking rules of each stored transaction data on the block chain.

[0079] Wherein, the shielding rules in the shielding rule set correspond to rule identifiers. A rule ID uniquely corresponds to a blocking rule.

[0080] Wherein, the above-mentioned stored transaction data generally refers to the transaction data stored in the blockchain.

[0081] Here, for each transaction data stored in the block chain, the execution subject can determine the masking rule that matches the transaction data from the masking rule set. In practice, if there is no masking rule matching the transaction data in the masking rule set, it means that the transaction data does not need to be maske...

Embodiment 3

[0124] read on Figure 4 , Figure 4 A flow chart of another data masking method provided by the embodiment of this application, such as Figure 4 As shown, the data masking method may include the following steps:

[0125] Step 401, according to the pre-stored masking rule set, respectively determine the masking rules of each stored transaction data on the block chain.

[0126] Wherein, the shielding rules in the shielding rule set correspond to rule identifiers.

[0127] Step 402, according to the masking rules of each stored transaction data on the block chain, determine the masked state information of each stored transaction data.

[0128] Wherein, the masking status information is used to indicate whether the corresponding transaction data needs to be masked. It should be pointed out that whether the transaction data mentioned in this application needs to be shielded generally refers to whether the transaction data has content that needs to be shielded.

[0129] Here,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of block chains, and provides a data shielding method, which comprises the following steps: in response to a received query request for requesting to query to-be-queried transaction data, determining a storage identifier of the to-be-queried transaction data, the storage identifier being used for indicating a storage sequence of the transaction data on a block chain; from a pre-constructed bitmap, determining a shielding bit corresponding to the storage identifier of the transaction data to be checked, recording the shielding bit as a target shielding bit, obtaining shielding state information on the target shielding bit as target shielding state information, wherein the bitmap comprises a plurality of shielding bits, and one piece of shielding state information is stored on each shielding bit; if the target shielding state information indicates that the to-be-checked transaction data needs to be shielded, searching a shielding rule corresponding to a storage identifier of the to-be-checked transaction data, and recording the shielding rule as a target shielding rule; and performing shielding processing on the to-be-queried transaction data by adopting the target shielding rule, and sending the data obtained by the shielding processing to a requester of the query request.

Description

technical field [0001] The present application belongs to the technical field of blockchain, and in particular relates to a data shielding method, device, server and medium. Background technique [0002] Blockchain is a distributed shared ledger and database, which has the characteristics of decentralization, non-tampering, traceability throughout the process, traceability, collective maintenance, and openness and transparency. In practice, a blockchain usually has multiple blockchain nodes, the data stored on each blockchain node is the same, and each blockchain node usually has a complete ledger. [0003] In related technologies, if the data stored in the blockchain has content that needs to be shielded, for example, when there are sensitive words, the data stored in the blockchain needs to be shielded. Contents of the invention [0004] The embodiment of the present application provides a data masking method, device, server, and medium, aiming to solve the problem in r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06F16/22G06F16/245G06F16/27
CPCG06Q20/405G06F16/2228G06F16/245G06F16/27
Inventor 蔡亮邵羽曾磊詹士潇张帅
Owner HANGZHOU QULIAN TECH CO LTD