CN109558064A - A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain - Google Patents

A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain Download PDF

Info

Publication number
CN109558064A
CN109558064A CN201710875650.4A CN201710875650A CN109558064A CN 109558064 A CN109558064 A CN 109558064A CN 201710875650 A CN201710875650 A CN 201710875650A CN 109558064 A CN109558064 A CN 109558064A
Authority
CN
China
Prior art keywords
electronic invoice
invoice data
backup
data chain
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710875650.4A
Other languages
Chinese (zh)
Other versions
CN109558064B (en
Inventor
偶瑞军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201710875650.4A priority Critical patent/CN109558064B/en
Publication of CN109558064A publication Critical patent/CN109558064A/en
Application granted granted Critical
Publication of CN109558064B publication Critical patent/CN109558064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • G06F3/0631Configuration or reconfiguration of storage systems by allocating resources to storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0626Reducing size or complexity of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/04Billing or invoicing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of synchronous method of electronic invoice data chain, device, medium and electronic equipment, specifically include: each node passes through the data information of electronic invoice data chained record electronic invoice, when there is abnormal electronic invoice data chain in the electronic invoice data chain of node, backup electronic invoice data chain is obtained by business interdependent node, and from all backup electronic invoice data chains obtained, select legal backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, and then while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legitimacy of the electronic invoice data chain after restoring.

Description

A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain
Technical field
The present invention relates to application block chain technical field more particularly to a kind of synchronous method of electronic invoice data chain, dress It sets, medium and electronic equipment.
Background technique
Electronic invoice is generally pdf document, and in the prior art, each enterprise generally uses the side of database or file Formula will pass through computer or cloud in the storage to computer perhaps cloud equipment such as the expenditure information of electronic invoice and income information Equipment carries out centralized management and record to the expenditure information and income information of electronic invoice, and believes for the circulation of electronic invoice Breath, generally reports to tax board web by each enterprise, carries out centralization by circulation information of the tax board web to electronic invoice Management and record.
Based on above-mentioned analysis it is found that the expenditure information of electronic invoice in the prior art, income information and circulation information etc. The management and recording method of data information, safety is relatively low, is unfavorable for carrying out disaster recovery, moreover, setting by computer, cloud Standby and tax board web carries out centralized management to data informations such as the expenditure information of electronic invoice, income information and circulation information And record, not only the load of computer, cloud equipment and tax board web can be made heavier, can also occupy a large amount of memory space, this Outside, the management using the data information of electronic invoice in the prior art and recording mechanism, when the data information of electronic invoice goes out When now abnormal, under normal circumstances, it is difficult to realize and restores.
Summary of the invention
The embodiment of the invention provides synchronous method, device, medium and the electronic equipments of a kind of electronic invoice data chain, use Existing in the prior art when the data information of electronic invoice occurs abnormal to solve, the data information of electronic invoice is not easy extensive Multiple problem.
Specific technical solution provided in an embodiment of the present invention is as follows:
A kind of synchronous method of electronic invoice data chain, comprising:
When there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from all of first node Backup node is chosen in business interdependent node, wherein the electronic invoice data chain is by the data information of record electronic invoice Each block-chaining made of;
Obtain the backup electronic invoice data chain of abnormal electronic invoice data chain from each backup node respectively, and from In all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as target electronic invoice data Chain, and legitimate verification is carried out to target electronic invoice data chain;
If target electronic invoice data chain is illegal, all backup electronic invoice data chains of legitimate verification are never carried out In, a backup electronic invoice data chain is chosen again as target electronic invoice data chain carries out legitimate verification;
If target electronic invoice data chain is legal, abnormal electronic invoice data chain is synchronized as target electronic invoice data Chain.
Preferably, the backup electronic invoice data chain of abnormal electronic invoice data chain is obtained from each backup node, Include:
Determine the data-link type of exception electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node In, select corresponding data-link type backup electronic invoice number identical with the data-link type of abnormal electronic invoice data chain Backup electronic invoice data chain according to chain, as abnormal electronic invoice data chain.
Preferably, choosing a backup electronic invoice data chain from all backup electronic invoice data chains obtained and making For target electronic invoice data chain, comprising:
From all backup electronic invoice data chains obtained, chooses the creation time of the last one Backup Data block and work as The shortest backup electronic invoice data chain of time interval between the preceding time is as target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup of the number for the Backup Data block for including is chosen Electronic invoice data chain is as target electronic invoice data chain.
Preferably, carrying out legitimate verification to target electronic invoice data chain, comprising:
Common recognition node is chosen from all business interdependent nodes of first node, and indicates each common recognition node to target Last N number of Backup Data block in electronic invoice data chain carries out legitimate verification, wherein N is greater than the positive integer equal to 1;
If determining that last N number of Backup Data block is legal, then assert based on the verification result that each common recognition node returns Target electronic invoice data chain is legal;Otherwise, assertive goal electronic invoice data chain is illegal.
Preferably, based on the verification result that each common recognition node returns, determine last N number of Backup Data block it is legal it Afterwards, before assertive goal electronic invoice data chain is legal, further includes:
From remaining all Backup Data block in addition to last N number of Backup Data block in target electronic invoice data chain In, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, wherein M It is greater than the positive integer equal to 1.
Preferably, then assertive goal electronic invoice data chain is legal if it is determined that M Backup Data block is legal.
A kind of synchronizing device of electronic invoice data chain, comprising:
Module is obtained, for when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from Backup node is chosen in all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electronics Made of each block-chaining of the data information of invoice;
Authentication module, for obtaining the backup electronics hair of abnormal electronic invoice data chain from each backup node respectively Ticket data chain, and from all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as mesh Electronic invoice data chain is marked, and legitimate verification is carried out to target electronic invoice data chain;If target electronic invoice data chain Illegally, then in all backup electronic invoice data chains for never carrying out legitimate verification, a backup electronic invoice is chosen again Data-link carries out legitimate verification as target electronic invoice data chain;
If synchronization module synchronizes abnormal electronic invoice data chain for mesh legal for target electronic invoice data chain Mark electronic invoice data chain.
Preferably, obtaining the backup electronic invoice data chain of abnormal electronic invoice data chain from each backup node When, it obtains module and is specifically used for:
Determine the data-link type of exception electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node In, select corresponding data-link type backup electronic invoice number identical with the data-link type of abnormal electronic invoice data chain Backup electronic invoice data chain according to chain, as abnormal electronic invoice data chain.
Preferably, choosing a backup electronic invoice data chain from all backup electronic invoice data chains obtained and making When for target electronic invoice data chain, authentication module is specifically used for:
From all backup electronic invoice data chains obtained, chooses the creation time of the last one Backup Data block and work as The shortest backup electronic invoice data chain of time interval between the preceding time is as target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup of the number for the Backup Data block for including is chosen Electronic invoice data chain is as target electronic invoice data chain.
Preferably, authentication module is specifically used for when carrying out legitimate verification to target electronic invoice data chain:
Common recognition node is chosen from all business interdependent nodes of first node, and indicates each common recognition node to target Last N number of Backup Data block in electronic invoice data chain carries out legitimate verification, wherein N is greater than the positive integer equal to 1;
If determining that last N number of Backup Data block is legal, then assert based on the verification result that each common recognition node returns Target electronic invoice data chain is legal;Otherwise, assertive goal electronic invoice data chain is illegal.
Preferably, determining that last N number of Backup Data block is legal in the verification result returned based on each common recognition node Later, before assertive goal electronic invoice data chain is legal, authentication module is also used to:
From remaining all Backup Data block in addition to last N number of Backup Data block in target electronic invoice data chain In, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, wherein M It is greater than the positive integer equal to 1.
Preferably, authentication module is also used to: if it is determined that M Backup Data block is legal, then assertive goal electronic invoice number It is legal according to chain.
A kind of nonvolatile computer storage media, nonvolatile computer storage media are stored with executable program, can It executes program and is executed by processor the step of realizing above-mentioned synchronous method.
A kind of electronic equipment, comprising: memory, the computer program of processor and storage on a memory, processor are held The step of realizing above-mentioned synchronous method when row computer program.
The embodiment of the present invention has the beneficial effect that:
In the embodiment of the present invention, believed by the data that each data block in electronic invoice data chain records electronic invoice Breath no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud equipment and the tax bureau While a large amount of memory spaces of website, the load of computer, cloud equipment and tax board web is reduced, moreover, because data Block is once created, then is not easy to be tampered, and therefore, records electronic invoice by each data block in electronic invoice data chain Data information, safety is higher, and reliability is stronger, in addition, can pass through business phase when electronic invoice data chain occurs abnormal Artis obtains backup electronic invoice data chain, and from all backup electronic invoice data chains obtained, it is legal to select Backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, from And while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legal of the electronic invoice data chain after restoring Property.
Detailed description of the invention
Figure 1A is the structural schematic diagram of distributed node network in the embodiment of the present invention;
Figure 1B is the overview schematic diagram of the synchronous method of electronic invoice data chain in the embodiment of the present invention one;
Fig. 2 is the idiographic flow schematic diagram of the synchronous method of electronic invoice data chain in the embodiment of the present invention two;
Fig. 3 is the illustrative view of functional configuration of the synchronizing device of electronic invoice data chain in the embodiment of the present invention three;
Fig. 4 is the hardware structural diagram of electronic equipment in the embodiment of the present invention five.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, is not whole embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Existing in the prior art when the data information of electronic invoice occurs abnormal, the data of electronic invoice in order to solve Information is not easy the problem of restoring, and in the embodiment of the present invention, each enterprise is as a node link to distribution as shown in Figure 1A In formula meshed network, each node in the distributed node network is using digital certificate public key as unique identity (its In, if the node has unified social credibility code, can also using digital certificate public key and unified social credibility code as Unique identity, and be using digital certificate public key and unified social credibility code as the purpose of identity: when this When the digital certificate public key of node is not available, restore the data information of the node using unified social credibility code, for example, Restore electronic invoice data chain etc.), it is based on this, when all electronic invoices of any one node in the distributed node network When there is abnormal electronic invoice data chain in data-link, backup node is chosen from all business interdependent nodes of the node, and The corresponding backup electronic invoice data chain of exception electronic invoice data chain is obtained from each backup node respectively, from obtaining All backup electronic invoice data chains in, choose a backup electronic invoice data chain as target electronic invoice data chain, And to the target electronic invoice data chain carry out legitimate verification, if the target electronic invoice data chain is illegal, never into In all backup electronic invoice data chains of row legitimate verification, a backup electronic invoice data chain is chosen again as target Electronic invoice data chain carries out legitimate verification;If the target electronic invoice data chain is legal, by the exception electronic invoice number Synchronous according to chain is the target electronic invoice data chain.In this way, recording electronics by each data block in electronic invoice data chain The data information of invoice no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud While a large amount of memory spaces of equipment and tax board web, the load of computer, cloud equipment and tax board web is reduced, and And since data block is once created, then it is not easy to be tampered, therefore, is remembered by each data block in electronic invoice data chain The data information of electronic invoice is recorded, safety is higher, and reliability is stronger, in addition, working as the electronic invoice data of any one node When chain occurs abnormal, backup electronic invoice data chain can be obtained by business interdependent node, and electric from all backups obtained In sub- invoice data chain, legal backup electronic invoice data chain is selected, is to synchronize abnormal electronic invoice data chain Legal backup electronic invoice data chain, thus, while realizing the recovery of abnormal electronic invoice data chain, it ensure that extensive The legitimacy of electronic invoice data chain after multiple.
The present invention program is described in detail below by specific embodiment, certainly, the present invention is not limited to following realities Apply example.
Embodiment one
The embodiment of the present invention one provides a kind of synchronous method of electronic invoice data chain, wherein the electronic invoice data Chain, which can be to be kept accounts as each pin item of the expenditure information of record electronic invoice, sells item book keeping operation chain made of block chaining, be also possible to The income book keeping operation chain as made of each income book keeping operation block chaining of the income information of record electronic invoice, can also be by electronics The creation of each circulation stage of invoice is used to record electronic invoice in each record block of the accordingly circulation information in circulation stage Circulation record chain of electronic invoice made of link, etc..In addition, the executing subject of the synchronous method can be it is as shown in Figure 1A Any one node in distributed node network, moreover, each node in the distributed node network save it is above-mentioned Electronic invoice circulation record chain, itself pin item book keeping operation chain and income book keeping operation chain and itself each business interdependent node Item book keeping operation chain and income book keeping operation chain are sold, this is based on, as shown in fig.1, the electronic invoice data chain that the embodiment of the present invention one provides Synchronous method process it is as follows:
Step 101: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from first segment Backup node is chosen in all business interdependent nodes of point, wherein the electronic invoice data chain is by record electronic invoice Made of each block-chaining of data information.
Step 102: obtaining the backup electronic invoice number of abnormal electronic invoice data chain from each backup node respectively According to chain, and from all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as target electricity Sub- invoice data chain, and legitimate verification is carried out to target electronic invoice data chain.
Step 103: if target electronic invoice data chain is illegal, all backup electronics of never progress legitimate verification are sent out In ticket data chain, a backup electronic invoice data chain is chosen again and is tested as target electronic invoice data chain progress legitimacy Card.
Step 104: if target electronic invoice data chain is legal, abnormal electronic invoice data chain being synchronized as target.
In the embodiment of the present invention one, believed by the data that each data block in electronic invoice data chain records electronic invoice Breath no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud equipment and the tax bureau While a large amount of memory spaces of website, the load of computer, cloud equipment and tax board web is reduced, moreover, because data Block is once created, then is not easy to be tampered, and therefore, records electronic invoice by each data block in electronic invoice data chain Data information, safety is higher, and reliability is stronger, in addition, can pass through business phase when electronic invoice data chain occurs abnormal Artis obtains backup electronic invoice data chain, and from all backup electronic invoice data chains obtained, it is legal to select Backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, from And while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legal of the electronic invoice data chain after restoring Property.
Embodiment two
The synchronous method of the electronic invoice data chain referred in above-described embodiment one is described in further detail below, is joined It reads shown in Fig. 2, in the embodiment of the present invention two, the detailed process of the synchronous method of electronic invoice data chain is as follows:
Step 201: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from first segment Backup node is chosen in all business interdependent nodes of point.
In the specific implementation, all second nodes can be chosen as backup node, it can also be from all second nodes In, selected part second node is as backup node, and specifically, from all second nodes, selected part second node is made When for backup node, it can use but be not limited to following manner (wherein, operations described below 1-3 is without sequencing):
Operation 1, in all second nodes from first node as drawee party, based on second node to first node expenditure Electronic invoice quantity, filter out meet the first default billing conditions second node.For example, first node is from first node It is greater than preset threshold as the quantity in all second nodes of drawee party, filtering out the electronic invoice paid to first node Second node for another example in all second nodes of the first node from first node as drawee party, is paid according to first node Electronic invoice quantity sequence from high to low, select top n second node, etc..
Operation 2 in all second nodes from first node as the side of making out an invoice, based on the amount of making out an invoice of first node, is screened Meet the second node of the second default billing conditions out.For example, first node from first node as the side of making out an invoice all second In node, the quantity for filtering out the electronic invoice paid to second node is greater than the second node of preset threshold, for another example, first segment In all second nodes of the point from first node as the side of making out an invoice, according to the quantity for the electronic invoice paid to second node from height To low sequence, top n second node, etc. is selected.
Operation 3 is based on the distance between second node and first node from all second nodes, and it is pre- to filter out satisfaction If regional condition second node.For example, first node from all second nodes, filter out between first node away from From the second node for being greater than preset threshold, for another example, first node from all second nodes, according between first node away from From sequence from big to small, top n second node, etc. is selected.
Operation 4, using all second nodes filtered out as backup node.
Step 202: obtaining the backup electronic invoice of the exception electronic invoice data chain from each backup node respectively Data-link.
When executing step 202, it can use but be not limited to following manner: determine the number of the exception electronic invoice data chain According to chain type;For each backup node, all backup electronic invoice numbers of the first node saved from the backup node According in chain, selecting corresponding data-link type backup electronics identical with the data-link type of the exception electronic invoice data chain Invoice data chain, the backup electronic invoice data chain as the exception electronic invoice data chain.
Step 203: from all backup electronic invoice data chains obtained, choosing a backup electronic invoice data chain and make For target electronic invoice data chain.
Preferably, in order to guarantee that the target backup electronic invoice data chain chosen is newest backup electronic invoice data Chain can use when choosing target electronic invoice data chain but be not limited to following two mode:
First way: from all backup electronic invoice data chains obtained, the last one Backup Data block is chosen The shortest backup electronic invoice data chain of time interval between creation time and current time is as target electronic invoice data Chain.
The second way: from all backup electronic invoice data chains obtained, the number for the Backup Data block for including is chosen The most backup electronic invoice data chain of mesh is as target electronic invoice data chain.
Step 204: common recognition node is chosen from all business interdependent nodes of first node.
In the specific implementation, all second nodes can be chosen and be used as common recognition node, it can also be from all second nodes In, selected part second node is as common recognition node, and specifically, from all second nodes, selected part second node is made For common recognition node when, can use but be not limited to following manner (wherein, operations described below 1-3 is without sequencing):
Operation 1, in all second nodes from first node as drawee party, based on second node to first node expenditure Electronic invoice quantity, filter out meet the first default billing conditions second node.For example, first node is from first node It is greater than preset threshold as the quantity in all second nodes of drawee party, filtering out the electronic invoice paid to first node Second node for another example in all second nodes of the first node from first node as drawee party, is paid according to first node Electronic invoice quantity sequence from high to low, select top n second node, etc..
Operation 2 in all second nodes from first node as the side of making out an invoice, based on the amount of making out an invoice of first node, is screened Meet the second node of the second default billing conditions out.For example, first node from first node as the side of making out an invoice all second In node, the quantity for filtering out the electronic invoice paid to second node is greater than the second node of preset threshold, for another example, first segment In all second nodes of the point from first node as the side of making out an invoice, according to the quantity for the electronic invoice paid to second node from height To low sequence, top n second node, etc. is selected.
Operation 3 is based on the distance between second node and first node from all second nodes, and it is pre- to filter out satisfaction If regional condition second node.For example, first node from all second nodes, filter out between first node away from From the second node for being greater than preset threshold, for another example, first node from all second nodes, according between first node away from From sequence from big to small, top n second node, etc. is selected.
Operation 4, using all second nodes filtered out as common recognition node.
Step 205: indicating each common recognition node to last N number of Backup Data block in the target electronic invoice data chain Carry out legitimate verification, wherein N is greater than the positive integer equal to 1.
Tellable to be, the last N number of Backup Data block progress legitimacy chosen in the target electronic invoice data chain is tested The purpose of card is:
(1) since electronic invoice data chain is not easy to be tampered, so, unauthorized person is typically employed in electronic invoice data chain End increase the mode of electronic invoice data block and attack electronic invoice data chain, be based on this, choose last N number of Backup Data Block carries out legitimate verification, and whether be easier to verify the target electronic invoice data chain legal.
(2) in order to guarantee that the target backup electronic invoice data chain chosen is newest backup electronic invoice data chain, When choosing target electronic invoice data chain, generally choose between the creation time and current time of the last one Backup Data block The shortest backup electronic invoice data chain of time interval is as target electronic invoice data chain, alternatively, choosing the backup number for including According to the most backup electronic invoice data chain of the number of block as target electronic invoice data chain, so, relative to other backups It may include extra backup electronic invoice number in the target electronic invoice data chain that selects for electronic invoice data chain According to block, it is based on this, last N number of Backup Data block is chosen from target electronic invoice data chain and carries out legitimate verification, can be kept away Exempt from accidentally to delete newest electronic invoice data block legal in target electronic invoice data chain, so that it is same to improve electronic invoice data chain The reliability of step.
Step 206: the verification result returned based on each common recognition node judges the last N number of Backup Data block chosen It is whether legal, if so, thening follow the steps 207;Otherwise, step 211 is executed.
It is tellable to be, when the verification result returned based on each common recognition node, determine the last N backup chosen When data block is legal, it can directly assert that the target electronic invoice data chain is legal, certainly, in order to further assure that the mesh The legitimacy for marking electronic invoice data chain can also continue to execute step 207, be removed with verifying in the target electronic invoice data chain Other Backup Data blocks except last N number of Backup Data block whether legitimacy.
Step 207: all standby from remaining in addition to last N number of Backup Data block in the target electronic invoice data chain In part data block, optional M Backup Data block, wherein M is greater than the positive integer equal to 1.
Step 208: indicating that each common recognition node carries out legitimate verification to the M backup book keeping operation block of selection.
Step 209: whether the verification result returned based on each common recognition node judges the M Backup Data block chosen It is legal, if so, thening follow the steps 210;Otherwise, step 211 is executed.
Step 210: assert that the target electronic invoice data chain is legal, and abnormal electronic invoice data chain is synchronized as the mesh Mark electronic invoice data chain.
Step 211: assert that the target electronic invoice data chain is illegal, and never carry out all backups electricity of legitimate verification In sub- invoice data chain, a backup electronic invoice data chain is chosen again as target electronic invoice data chain and carries out legitimacy Verifying, i.e. return step 205.
In the embodiment of the present invention two, believed by the data that each data block in electronic invoice data chain records electronic invoice Breath no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud equipment and the tax bureau While a large amount of memory spaces of website, the load of computer, cloud equipment and tax board web is reduced, moreover, because data Block is once created, then is not easy to be tampered, and therefore, records electronic invoice by each data block in electronic invoice data chain Data information, safety is higher, and reliability is stronger, in addition, can pass through business phase when electronic invoice data chain occurs abnormal Artis obtains backup electronic invoice data chain, and from all backup electronic invoice data chains obtained, it is legal to select Backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, from And while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legal of the electronic invoice data chain after restoring Property, also, during legitimate verification, by carrying out legitimate verification to last N number of backup electronic invoice data block, no The legitimacy that only can quickly and accurately verify the backup electronic invoice data chain can also avoid accidentally deleting the backup electronics Newest electronic invoice data block in invoice data chain, to improve the synchronous reliability of electronic invoice data chain.
Embodiment three
The embodiment of the present invention three provides a kind of synchronizing device of electronic invoice data chain, as shown in fig.3, the electronics is sent out The synchronizing device of ticket data chain includes at least:
Module 301 is obtained, for when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, Backup node is chosen from all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electricity Made of each block-chaining of the data information of sub- invoice;
Authentication module 302, for obtaining the backup electricity of abnormal electronic invoice data chain from each backup node respectively Sub- invoice data chain, and from all backup electronic invoice data chains obtained, it chooses a backup electronic invoice data chain and makees For target electronic invoice data chain, and legitimate verification is carried out to target electronic invoice data chain;If target electronic invoice number It is illegal according to chain, then in all backup electronic invoice data chains for never carrying out legitimate verification, a backup electronics is chosen again Invoice data chain carries out legitimate verification as target electronic invoice data chain;
Abnormal electronic invoice data chain is synchronized if legal for target electronic invoice data chain and is by synchronization module 303 Target electronic invoice data chain.
Preferably, the backup electronic invoice data of abnormal electronic invoice data chain is obtained from each backup node respectively When chain, obtains module 301 and is specifically used for:
Determine the data-link type of exception electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node In, select corresponding data-link type backup electronic invoice number identical with the data-link type of abnormal electronic invoice data chain Backup electronic invoice data chain according to chain, as abnormal electronic invoice data chain.
Preferably, choosing a backup electronic invoice data chain from all backup electronic invoice data chains obtained and making When for target electronic invoice data chain, authentication module 302 is specifically used for:
From all backup electronic invoice data chains obtained, chooses the creation time of the last one Backup Data block and work as The shortest backup electronic invoice data chain of time interval between the preceding time is as target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup of the number for the Backup Data block for including is chosen Electronic invoice data chain is as target electronic invoice data chain.
Preferably, authentication module 302 is specifically used for when carrying out legitimate verification to target electronic invoice data chain:
Common recognition node is chosen from all business interdependent nodes of first node, and indicates each common recognition node to target Last N number of Backup Data block in electronic invoice data chain carries out legitimate verification, wherein N is greater than the positive integer equal to 1;
If determining that last N number of Backup Data block is legal, then assert based on the verification result that each common recognition node returns Target electronic invoice data chain is legal;Otherwise, assertive goal electronic invoice data chain is illegal.
Preferably, determining that last N number of Backup Data block is legal in the verification result returned based on each common recognition node Later, before assertive goal electronic invoice data chain is legal, authentication module 302 is also used to:
From remaining all Backup Data block in addition to last N number of Backup Data block in target electronic invoice data chain In, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, wherein M It is greater than the positive integer equal to 1.
Preferably, authentication module 302 is also used to: if it is determined that M Backup Data block is legal, then assertive goal electronic invoice Data-link is legal.
Example IV
After describing the method and apparatus of exemplary embodiment of the invention, next, to the exemplary reality of the present invention The nonvolatile computer storage media synchronous for electronic invoice data chain for applying mode is introduced.The embodiment of the present invention four A kind of nonvolatile computer storage media is provided, which is stored with executable program, should Executable code processor executes the step of synchronous method for realizing above-mentioned electronic invoice data chain, for example realizes as shown in figure 1 Shown step 101: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from first node All business interdependent nodes in choose backup node, wherein the electronic invoice data chain is by the number of record electronic invoice It is believed that made of each block-chaining of breath;Step 102: obtaining abnormal electronic invoice number from each backup node respectively According to the backup electronic invoice data chain of chain, and from all backup electronic invoice data chains obtained, a backup electronics is chosen Invoice data chain carries out legitimate verification as target electronic invoice data chain, and to target electronic invoice data chain;Step 103: if target electronic invoice data chain is illegal, never in all backup electronic invoice data chains of progress legitimate verification, Again a backup electronic invoice data chain, which is chosen, as target electronic invoice data chain carries out legitimate verification;Step 104: if Target electronic invoice data chain is legal, then synchronizes abnormal electronic invoice data chain for target electronic invoice data chain.
Embodiment five
After the method, apparatus and nonvolatile computer storage media for describing exemplary embodiment of the invention, Next, the electronic equipment synchronous for electronic invoice data chain to exemplary embodiment of the invention is introduced.This hair Bright embodiment five provides a kind of electronic equipment, which can be but be not limited to PC device, tax control tray Deng specifically, which may include: memory 401, processor 402 and the computer journey being stored on memory 401 The step of sequence, processor 402 realizes the synchronous method of above-mentioned electronic invoice data chain when executing the computer program, for example realize Step 101 as shown in fig. 1: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from Backup node is chosen in all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electronics Made of each block-chaining of the data information of invoice;Step 102: being obtained from each backup node respectively abnormal electric The backup electronic invoice data chain of sub- invoice data chain, and from all backup electronic invoice data chains obtained, choose one Backup electronic invoice data chain is as target electronic invoice data chain, and carries out legitimacy to target electronic invoice data chain and test Card;Step 103: if target electronic invoice data chain is illegal, never carrying out all backup electronic invoice numbers of legitimate verification According in chain, a backup electronic invoice data chain is chosen again as target electronic invoice data chain and carries out legitimate verification;Step Rapid 104: if target electronic invoice data chain is legal, abnormal electronic invoice data chain being synchronized as target electronic invoice data Chain.
Preferably, memory 401 may include read-only memory (ROM) and random access memory (RAM), processor 402 can be and to processor.
Further, the electronic equipment in the embodiment of the present invention five can also include input unit 403 and output device 404 Deng.Input unit 403 may include stylus, keyboard, mouse, touch screen etc.;Output device 404 may include display equipment, Such as liquid crystal display (Liquid Crystal Display, LCD), cathode-ray tube (Cathode Ray Tube, CRT), touching Touch screen etc..Memory 401, processor 402, input unit 403 and output device 404 can be connected by bus or other modes It connects, in Fig. 4 only for being connected by bus.
In conclusion in the embodiment of the present invention, when there is abnormal electronic invoice in the electronic invoice data chain of first node When data-link, backup node is chosen from all business interdependent nodes of first node, wherein the electronic invoice data chain is Made of each block-chaining as the data information of record electronic invoice;It is obtained from each backup node respectively abnormal The backup electronic invoice data chain of electronic invoice data chain, and from all backup electronic invoice data chains obtained, choose one Item backup electronic invoice data chain carries out legitimacy as target electronic invoice data chain, and to target electronic invoice data chain Verifying;If target electronic invoice data chain is illegal, never in all backup electronic invoice data chains of progress legitimate verification, Again a backup electronic invoice data chain, which is chosen, as target electronic invoice data chain carries out legitimate verification;If target electronic Invoice data chain is legal, then synchronizes abnormal electronic invoice data chain for target electronic invoice data chain.In this way, being sent out by electronics The data information of each data block record electronic invoice in ticket data chain, no longer carries out center to the data information of electronic invoice Change management and record, while saving a large amount of memory spaces of computer, cloud equipment and tax board web, reduces calculating The load of machine, cloud equipment and tax board web is then not easy to be tampered moreover, because data block is once created, and therefore, passes through The data information of each data block record electronic invoice in electronic invoice data chain, safety is higher, and reliability is stronger, this Outside, when electronic invoice data chain occurs abnormal, backup electronic invoice data chain can be obtained by business interdependent node, and from In all backup electronic invoice data chains obtained, legal backup electronic invoice data chain is selected, so as to by abnormal electronics Synchronous invoice data chain is legal backup electronic invoice data chain, thus, realizing the extensive of abnormal electronic invoice data chain While multiple, the legitimacy of the electronic invoice data chain after restoring ensure that.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions each in flowchart and/or the block diagram The combination of process and/or box in process and/or box and flowchart and/or the block diagram.It can provide these computers Processor of the program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices To generate a machine, so that generating use by the instruction that computer or the processor of other programmable data processing devices execute In the dress for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (14)

1. a kind of synchronous method of electronic invoice data chain characterized by comprising
When there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from all of the first node Backup node is chosen in business interdependent node, wherein the electronic invoice data chain is by the data information of record electronic invoice Each block-chaining made of;
Obtain the backup electronic invoice data chain of the abnormal electronic invoice data chain from each backup node respectively, and from In all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as target electronic invoice data Chain, and legitimate verification is carried out to the target electronic invoice data chain;
If the target electronic invoice data chain is illegal, all backup electronic invoice data chains of legitimate verification are never carried out In, a backup electronic invoice data chain is chosen again as target electronic invoice data chain carries out legitimate verification;
If the target electronic invoice data chain is legal, the abnormal electronic invoice data chain is synchronized as the target electronic Invoice data chain.
2. synchronous method as described in claim 1, which is characterized in that obtain the exception from each backup node respectively The backup electronic invoice data chain of electronic invoice data chain, comprising:
Determine the data-link type of the abnormal electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node In, it selects corresponding data-link type backup electronics identical with the data-link type of the abnormal electronic invoice data chain and sends out Ticket data chain, the backup electronic invoice data chain as the abnormal electronic invoice data chain.
3. synchronous method as described in claim 1, which is characterized in that from all backup electronic invoice data chains obtained, A backup electronic invoice data chain is chosen as target electronic invoice data chain, comprising:
From all backup electronic invoice data chains obtained, choose the last one Backup Data block creation time and it is current when Between between the shortest backup electronic invoice data chain of time interval as the target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup electronics of the number for the Backup Data block for including is chosen Invoice data chain is as the target electronic invoice data chain.
4. synchronous method as described in claim 1, which is characterized in that carry out legitimacy to the target electronic invoice data chain Verifying, comprising:
Common recognition node is chosen from all business interdependent nodes of the first node, and indicates each common recognition node to described Last N number of Backup Data block in target electronic invoice data chain carries out legitimate verification, wherein N is greater than just whole equal to 1 Number;
If determining that last N number of Backup Data block is legal based on the verification result that each common recognition node returns, then assert The target electronic invoice data chain is legal;Otherwise, assert that the target electronic invoice data chain is illegal.
5. synchronous method as claimed in claim 4, which is characterized in that the verification result based on each common recognition node return, After determining that last N number of Backup Data block is legal, before assert that the target electronic invoice data chain is legal, also wrap It includes:
From remaining all Backup Data in addition to last N number of Backup Data block in the target electronic invoice data chain In block, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, Wherein, M is greater than the positive integer equal to 1.
6. synchronous method as claimed in claim 5, which is characterized in that if it is determined that the M Backup Data block is legal, then recognize The fixed target electronic invoice data chain is legal.
7. a kind of synchronizing device of electronic invoice data chain characterized by comprising
Module is obtained, for when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from described Backup node is chosen in all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electronics Made of each block-chaining of the data information of invoice;
Authentication module, for obtaining the backup electronics hair of the abnormal electronic invoice data chain from each backup node respectively Ticket data chain, and from all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as mesh Electronic invoice data chain is marked, and legitimate verification is carried out to the target electronic invoice data chain;If the target electronic hair Ticket data chain is illegal, then in all backup electronic invoice data chains for never carrying out legitimate verification, chooses a backup again Electronic invoice data chain carries out legitimate verification as target electronic invoice data chain;
Synchronization module, it is if legal for the target electronic invoice data chain, the abnormal electronic invoice data chain is synchronous For the target electronic invoice data chain.
8. synchronizing device as claimed in claim 7, which is characterized in that from each backup node, it is electric to obtain the exception When the backup electronic invoice data chain of sub- invoice data chain, the acquisition module is specifically used for:
Determine the data-link type of the abnormal electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node In, it selects corresponding data-link type backup electronics identical with the data-link type of the abnormal electronic invoice data chain and sends out Ticket data chain, the backup electronic invoice data chain as the abnormal electronic invoice data chain.
9. synchronizing device as claimed in claim 7, which is characterized in that from all backup electronic invoice data chains obtained, When choosing a backup electronic invoice data chain as target electronic invoice data chain, the authentication module is specifically used for:
From all backup electronic invoice data chains obtained, choose the last one Backup Data block creation time and it is current when Between between the shortest backup electronic invoice data chain of time interval as the target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup electronics of the number for the Backup Data block for including is chosen Invoice data chain is as the target electronic invoice data chain.
10. synchronizing device as claimed in claim 7, which is characterized in that it is legal to carry out to the target electronic invoice data chain Property verifying when, the authentication module is specifically used for:
Common recognition node is chosen from all business interdependent nodes of the first node, and indicates each common recognition node to described Last N number of Backup Data block in target electronic invoice data chain carries out legitimate verification, wherein N is greater than just whole equal to 1 Number;
If determining that last N number of Backup Data block is legal based on the verification result that each common recognition node returns, then assert The target electronic invoice data chain is legal;Otherwise, assert that the target electronic invoice data chain is illegal.
11. synchronizing device as claimed in claim 10, which is characterized in that in the verifying knot returned based on each common recognition node Fruit, after determining that last N number of Backup Data block is legal, before assert that the target electronic invoice data chain is legal, The authentication module is also used to:
From remaining all Backup Data in addition to last N number of Backup Data block in the target electronic invoice data chain In block, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, Wherein, M is greater than the positive integer equal to 1.
12. synchronous method as claimed in claim 11, which is characterized in that the authentication module is also used to: if it is determined that the M Backup Data block is legal, then assert that the target electronic invoice data chain is legal.
13. a kind of nonvolatile computer storage media, which is characterized in that the nonvolatile computer storage media is stored with Executable program, the executable code processor execute the step of realizing claim 1-6 any described synchronous method.
14. a kind of electronic equipment characterized by comprising memory, processor and the computer being stored on the memory The step of claim 1-6 any described synchronous method is realized when program, the processor execute the computer program.
CN201710875650.4A 2017-09-25 2017-09-25 Electronic invoice data chain synchronization method, device, medium and electronic equipment Active CN109558064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710875650.4A CN109558064B (en) 2017-09-25 2017-09-25 Electronic invoice data chain synchronization method, device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710875650.4A CN109558064B (en) 2017-09-25 2017-09-25 Electronic invoice data chain synchronization method, device, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN109558064A true CN109558064A (en) 2019-04-02
CN109558064B CN109558064B (en) 2022-06-07

Family

ID=65861915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710875650.4A Active CN109558064B (en) 2017-09-25 2017-09-25 Electronic invoice data chain synchronization method, device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN109558064B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111931247A (en) * 2020-07-04 2020-11-13 华电联合(北京)电力工程有限公司 Verification method, verification device, verification system and computer-readable storage medium for verification data
CN116760632A (en) * 2023-08-10 2023-09-15 腾讯科技(深圳)有限公司 Data processing method, device, equipment and readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160092451A1 (en) * 2014-09-30 2016-03-31 Storagecraft Technology Corporation Pruning free blocks out of a decremental backup chain
CN106295406A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 A kind of block chain that is used for is from safe storage system and method thereof
CN106383754A (en) * 2016-09-19 2017-02-08 北京众享比特科技有限公司 Database backup and recovery system based on block chain technology, and database backup method based on block chain technology, and database recovery method based on block chain technology
CN106412037A (en) * 2016-09-19 2017-02-15 ***股份有限公司 Security electronic file processing system and method based on block link structure
CN106547648A (en) * 2016-10-21 2017-03-29 杭州嘉楠耘智信息科技有限公司 Backup data processing method and device
CN106713412A (en) * 2016-11-09 2017-05-24 弗洛格(武汉)信息科技有限公司 Block chain system and construction method of block chain system
CN106775497A (en) * 2017-01-19 2017-05-31 郑志超 Distributed storage method and equipment based on block chain
CN106952124A (en) * 2017-03-16 2017-07-14 北京牛链科技有限公司 Electronic bill management system and method based on distribution book keeping operation

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160092451A1 (en) * 2014-09-30 2016-03-31 Storagecraft Technology Corporation Pruning free blocks out of a decremental backup chain
CN106295406A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 A kind of block chain that is used for is from safe storage system and method thereof
CN106383754A (en) * 2016-09-19 2017-02-08 北京众享比特科技有限公司 Database backup and recovery system based on block chain technology, and database backup method based on block chain technology, and database recovery method based on block chain technology
CN106412037A (en) * 2016-09-19 2017-02-15 ***股份有限公司 Security electronic file processing system and method based on block link structure
CN106547648A (en) * 2016-10-21 2017-03-29 杭州嘉楠耘智信息科技有限公司 Backup data processing method and device
CN106713412A (en) * 2016-11-09 2017-05-24 弗洛格(武汉)信息科技有限公司 Block chain system and construction method of block chain system
CN106775497A (en) * 2017-01-19 2017-05-31 郑志超 Distributed storage method and equipment based on block chain
CN106952124A (en) * 2017-03-16 2017-07-14 北京牛链科技有限公司 Electronic bill management system and method based on distribution book keeping operation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张庆胜等: "基于区块链的电子******研究", 《信息安全研究》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111931247A (en) * 2020-07-04 2020-11-13 华电联合(北京)电力工程有限公司 Verification method, verification device, verification system and computer-readable storage medium for verification data
CN116760632A (en) * 2023-08-10 2023-09-15 腾讯科技(深圳)有限公司 Data processing method, device, equipment and readable storage medium
CN116760632B (en) * 2023-08-10 2023-11-03 腾讯科技(深圳)有限公司 Data processing method, device, equipment and readable storage medium

Also Published As

Publication number Publication date
CN109558064B (en) 2022-06-07

Similar Documents

Publication Publication Date Title
CN108932348B (en) Block chain merging processing method and device, block chain node and storage medium
CN109034809B (en) Block chain generation method and device, block chain node and storage medium
CN106611061B (en) Database write-in method and system based on block chain network
US11301136B2 (en) Capacity forecasting based on capacity policies and transactions
CN109410045A (en) A kind of parallel chain common recognition method, equipment and storage medium
CN107908494A (en) Processing method, device, electronic equipment and the storage medium of anomalous event
CN109784058A (en) Version strong consistency method of calibration, client, server and storage medium
US8554727B2 (en) Method and system of tiered quiescing
CN108536752A (en) A kind of method of data synchronization, device and equipment
CN111988188A (en) Transaction endorsement method, device and storage medium
CN104182900A (en) Business data processing method, device and system
CN112035350B (en) Test method and device for block chain system and computer equipment
CN109492049A (en) Data processing, block generation and synchronous method for block chain network
CN110190963A (en) A kind of monitoring method, device and equipment for the request of time service certificates constructing
CN109558064A (en) A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain
US10133642B2 (en) Techniques for presenting views of a backup environment for an organization on a sub-organizational basis
CN104282098B (en) The making out an invoice and copy tax process upgrade method of a kind of tax-controlling device
CN107992763A (en) The power-off protection method and device of a kind of file system
CN110555682A (en) multi-channel implementation method based on alliance chain
US20210144451A1 (en) Control method, content management system, recording medium, and data structure
CN109697371A (en) Data base management method, device, medium and electronic equipment
CN110019972A (en) The restoration methods and electronic device of the storage method of electronic invoice, chain of keeping accounts
CN108304569B (en) Test data accumulation method and device
CN110347657A (en) Data creation method, device, electronic equipment and storage medium
CN110858211A (en) Data storage method, device and system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant