Unlock instant, AI-driven research and patent intelligence for your innovation.

Data shielding method, device, server and medium

A data shielding and data segment technology, applied in the blockchain field, can solve problems such as ineffective data shielding and processing, and achieve the effects of flexible shielding processing, guarantee of true integrity, and effective shielding processing

Active Publication Date: 2022-03-29
HANGZHOU QULIAN TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a data shielding method, device, server and medium, aiming to solve the problem that the data on the blockchain cannot be effectively shielded in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data shielding method, device, server and medium
  • Data shielding method, device, server and medium
  • Data shielding method, device, server and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] see figure 1 , the embodiment of the present application provides a data masking method, including:

[0058] Step 101, in response to receiving a query request for querying the transaction data to be checked, determine the storage identifier of the transaction data to be checked.

[0059] Wherein, the above-mentioned storage identifier is used to indicate the storage sequence of the transaction data on the blockchain. In practice, the above storage identifier can be the sequence number of the transaction data in the blockchain. Each transaction data stored in the blockchain can have a storage ID.

[0060] Wherein, the transaction data to be checked is usually the transaction data to be checked in the block chain.

[0061] In this embodiment, the execution subject of the data masking method is generally a blockchain, and specifically a blockchain node on the blockchain. In practice, blockchain nodes can usually be implemented as servers.

[0062] Here, the requestin...

Embodiment 2

[0077] read on figure 2 , figure 2 A flow chart of another data masking method provided by the embodiment of this application, such as figure 2 As shown, the data masking method may include the following steps:

[0078] Step 201, according to the pre-stored masking rule set, respectively determine the masking rules of each stored transaction data on the block chain.

[0079] Wherein, the shielding rules in the shielding rule set correspond to rule identifiers. A rule ID uniquely corresponds to a blocking rule.

[0080] Wherein, the above-mentioned stored transaction data generally refers to the transaction data stored in the blockchain.

[0081] Here, for each transaction data stored in the block chain, the execution subject can determine the masking rule that matches the transaction data from the masking rule set. In practice, if there is no masking rule matching the transaction data in the masking rule set, it means that the transaction data does not need to be maske...

Embodiment 3

[0124] read on Figure 4 , Figure 4 A flow chart of another data masking method provided by the embodiment of this application, such as Figure 4 As shown, the data masking method may include the following steps:

[0125] Step 401, according to the pre-stored masking rule set, respectively determine the masking rules of each stored transaction data on the block chain.

[0126] Wherein, the shielding rules in the shielding rule set correspond to rule identifiers.

[0127] Step 402, according to the masking rules of each stored transaction data on the block chain, determine the masked state information of each stored transaction data.

[0128] Wherein, the masking status information is used to indicate whether the corresponding transaction data needs to be masked. It should be pointed out that whether the transaction data mentioned in this application needs to be shielded generally refers to whether the transaction data has content that needs to be shielded.

[0129] Here,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application is applicable to the field of blockchain technology, and provides a data shielding method, including: in response to receiving a query request for querying the transaction data to be checked, determining the storage identifier of the transaction data to be checked, wherein the storage identifier is used to indicate the transaction data The storage order on the blockchain; from the pre-built bitmap, determine the mask bit corresponding to the storage identifier of the transaction data to be checked, which is recorded as the target mask bit, and obtain the mask status information on the target mask bit, which is recorded as Target shielding state information, wherein the bitmap includes multiple shielding bits, each shielding bit stores a shielding state information; if the target shielding state information indicates that the transaction data to be checked needs to be shielded, then search for the storage identification of the transaction data to be checked The corresponding masking rule is recorded as the target masking rule; the transaction data to be checked is masked using the target masking rule, and the data obtained by the masking process is sent to the requester of the query request.

Description

technical field [0001] The present application belongs to the technical field of blockchain, and in particular relates to a data shielding method, device, server and medium. Background technique [0002] Blockchain is a distributed shared ledger and database, which has the characteristics of decentralization, non-tampering, traceability throughout the process, traceability, collective maintenance, and openness and transparency. In practice, a blockchain usually has multiple blockchain nodes, the data stored on each blockchain node is the same, and each blockchain node usually has a complete ledger. [0003] In related technologies, if the data stored in the blockchain has content that needs to be shielded, for example, when there are sensitive words, the data stored in the blockchain needs to be shielded. Contents of the invention [0004] The embodiment of the present application provides a data masking method, device, server, and medium, aiming to solve the problem in r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06F16/22G06F16/245G06F16/27
CPCG06Q20/405G06F16/2228G06F16/245G06F16/27
Inventor 蔡亮邵羽曾磊詹士潇张帅
Owner HANGZHOU QULIAN TECH CO LTD