CN109558064A - A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain - Google Patents
A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain Download PDFInfo
- Publication number
- CN109558064A CN109558064A CN201710875650.4A CN201710875650A CN109558064A CN 109558064 A CN109558064 A CN 109558064A CN 201710875650 A CN201710875650 A CN 201710875650A CN 109558064 A CN109558064 A CN 109558064A
- Authority
- CN
- China
- Prior art keywords
- electronic invoice
- invoice data
- backup
- data chain
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0631—Configuration or reconfiguration of storage systems by allocating resources to storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0626—Reducing size or complexity of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Computer Interaction (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of synchronous method of electronic invoice data chain, device, medium and electronic equipment, specifically include: each node passes through the data information of electronic invoice data chained record electronic invoice, when there is abnormal electronic invoice data chain in the electronic invoice data chain of node, backup electronic invoice data chain is obtained by business interdependent node, and from all backup electronic invoice data chains obtained, select legal backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, and then while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legitimacy of the electronic invoice data chain after restoring.
Description
Technical field
The present invention relates to application block chain technical field more particularly to a kind of synchronous method of electronic invoice data chain, dress
It sets, medium and electronic equipment.
Background technique
Electronic invoice is generally pdf document, and in the prior art, each enterprise generally uses the side of database or file
Formula will pass through computer or cloud in the storage to computer perhaps cloud equipment such as the expenditure information of electronic invoice and income information
Equipment carries out centralized management and record to the expenditure information and income information of electronic invoice, and believes for the circulation of electronic invoice
Breath, generally reports to tax board web by each enterprise, carries out centralization by circulation information of the tax board web to electronic invoice
Management and record.
Based on above-mentioned analysis it is found that the expenditure information of electronic invoice in the prior art, income information and circulation information etc.
The management and recording method of data information, safety is relatively low, is unfavorable for carrying out disaster recovery, moreover, setting by computer, cloud
Standby and tax board web carries out centralized management to data informations such as the expenditure information of electronic invoice, income information and circulation information
And record, not only the load of computer, cloud equipment and tax board web can be made heavier, can also occupy a large amount of memory space, this
Outside, the management using the data information of electronic invoice in the prior art and recording mechanism, when the data information of electronic invoice goes out
When now abnormal, under normal circumstances, it is difficult to realize and restores.
Summary of the invention
The embodiment of the invention provides synchronous method, device, medium and the electronic equipments of a kind of electronic invoice data chain, use
Existing in the prior art when the data information of electronic invoice occurs abnormal to solve, the data information of electronic invoice is not easy extensive
Multiple problem.
Specific technical solution provided in an embodiment of the present invention is as follows:
A kind of synchronous method of electronic invoice data chain, comprising:
When there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from all of first node
Backup node is chosen in business interdependent node, wherein the electronic invoice data chain is by the data information of record electronic invoice
Each block-chaining made of;
Obtain the backup electronic invoice data chain of abnormal electronic invoice data chain from each backup node respectively, and from
In all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as target electronic invoice data
Chain, and legitimate verification is carried out to target electronic invoice data chain;
If target electronic invoice data chain is illegal, all backup electronic invoice data chains of legitimate verification are never carried out
In, a backup electronic invoice data chain is chosen again as target electronic invoice data chain carries out legitimate verification;
If target electronic invoice data chain is legal, abnormal electronic invoice data chain is synchronized as target electronic invoice data
Chain.
Preferably, the backup electronic invoice data chain of abnormal electronic invoice data chain is obtained from each backup node,
Include:
Determine the data-link type of exception electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node
In, select corresponding data-link type backup electronic invoice number identical with the data-link type of abnormal electronic invoice data chain
Backup electronic invoice data chain according to chain, as abnormal electronic invoice data chain.
Preferably, choosing a backup electronic invoice data chain from all backup electronic invoice data chains obtained and making
For target electronic invoice data chain, comprising:
From all backup electronic invoice data chains obtained, chooses the creation time of the last one Backup Data block and work as
The shortest backup electronic invoice data chain of time interval between the preceding time is as target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup of the number for the Backup Data block for including is chosen
Electronic invoice data chain is as target electronic invoice data chain.
Preferably, carrying out legitimate verification to target electronic invoice data chain, comprising:
Common recognition node is chosen from all business interdependent nodes of first node, and indicates each common recognition node to target
Last N number of Backup Data block in electronic invoice data chain carries out legitimate verification, wherein N is greater than the positive integer equal to 1;
If determining that last N number of Backup Data block is legal, then assert based on the verification result that each common recognition node returns
Target electronic invoice data chain is legal;Otherwise, assertive goal electronic invoice data chain is illegal.
Preferably, based on the verification result that each common recognition node returns, determine last N number of Backup Data block it is legal it
Afterwards, before assertive goal electronic invoice data chain is legal, further includes:
From remaining all Backup Data block in addition to last N number of Backup Data block in target electronic invoice data chain
In, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, wherein M
It is greater than the positive integer equal to 1.
Preferably, then assertive goal electronic invoice data chain is legal if it is determined that M Backup Data block is legal.
A kind of synchronizing device of electronic invoice data chain, comprising:
Module is obtained, for when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from
Backup node is chosen in all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electronics
Made of each block-chaining of the data information of invoice;
Authentication module, for obtaining the backup electronics hair of abnormal electronic invoice data chain from each backup node respectively
Ticket data chain, and from all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as mesh
Electronic invoice data chain is marked, and legitimate verification is carried out to target electronic invoice data chain;If target electronic invoice data chain
Illegally, then in all backup electronic invoice data chains for never carrying out legitimate verification, a backup electronic invoice is chosen again
Data-link carries out legitimate verification as target electronic invoice data chain;
If synchronization module synchronizes abnormal electronic invoice data chain for mesh legal for target electronic invoice data chain
Mark electronic invoice data chain.
Preferably, obtaining the backup electronic invoice data chain of abnormal electronic invoice data chain from each backup node
When, it obtains module and is specifically used for:
Determine the data-link type of exception electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node
In, select corresponding data-link type backup electronic invoice number identical with the data-link type of abnormal electronic invoice data chain
Backup electronic invoice data chain according to chain, as abnormal electronic invoice data chain.
Preferably, choosing a backup electronic invoice data chain from all backup electronic invoice data chains obtained and making
When for target electronic invoice data chain, authentication module is specifically used for:
From all backup electronic invoice data chains obtained, chooses the creation time of the last one Backup Data block and work as
The shortest backup electronic invoice data chain of time interval between the preceding time is as target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup of the number for the Backup Data block for including is chosen
Electronic invoice data chain is as target electronic invoice data chain.
Preferably, authentication module is specifically used for when carrying out legitimate verification to target electronic invoice data chain:
Common recognition node is chosen from all business interdependent nodes of first node, and indicates each common recognition node to target
Last N number of Backup Data block in electronic invoice data chain carries out legitimate verification, wherein N is greater than the positive integer equal to 1;
If determining that last N number of Backup Data block is legal, then assert based on the verification result that each common recognition node returns
Target electronic invoice data chain is legal;Otherwise, assertive goal electronic invoice data chain is illegal.
Preferably, determining that last N number of Backup Data block is legal in the verification result returned based on each common recognition node
Later, before assertive goal electronic invoice data chain is legal, authentication module is also used to:
From remaining all Backup Data block in addition to last N number of Backup Data block in target electronic invoice data chain
In, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, wherein M
It is greater than the positive integer equal to 1.
Preferably, authentication module is also used to: if it is determined that M Backup Data block is legal, then assertive goal electronic invoice number
It is legal according to chain.
A kind of nonvolatile computer storage media, nonvolatile computer storage media are stored with executable program, can
It executes program and is executed by processor the step of realizing above-mentioned synchronous method.
A kind of electronic equipment, comprising: memory, the computer program of processor and storage on a memory, processor are held
The step of realizing above-mentioned synchronous method when row computer program.
The embodiment of the present invention has the beneficial effect that:
In the embodiment of the present invention, believed by the data that each data block in electronic invoice data chain records electronic invoice
Breath no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud equipment and the tax bureau
While a large amount of memory spaces of website, the load of computer, cloud equipment and tax board web is reduced, moreover, because data
Block is once created, then is not easy to be tampered, and therefore, records electronic invoice by each data block in electronic invoice data chain
Data information, safety is higher, and reliability is stronger, in addition, can pass through business phase when electronic invoice data chain occurs abnormal
Artis obtains backup electronic invoice data chain, and from all backup electronic invoice data chains obtained, it is legal to select
Backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, from
And while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legal of the electronic invoice data chain after restoring
Property.
Detailed description of the invention
Figure 1A is the structural schematic diagram of distributed node network in the embodiment of the present invention;
Figure 1B is the overview schematic diagram of the synchronous method of electronic invoice data chain in the embodiment of the present invention one;
Fig. 2 is the idiographic flow schematic diagram of the synchronous method of electronic invoice data chain in the embodiment of the present invention two;
Fig. 3 is the illustrative view of functional configuration of the synchronizing device of electronic invoice data chain in the embodiment of the present invention three;
Fig. 4 is the hardware structural diagram of electronic equipment in the embodiment of the present invention five.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, is not whole embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Existing in the prior art when the data information of electronic invoice occurs abnormal, the data of electronic invoice in order to solve
Information is not easy the problem of restoring, and in the embodiment of the present invention, each enterprise is as a node link to distribution as shown in Figure 1A
In formula meshed network, each node in the distributed node network is using digital certificate public key as unique identity (its
In, if the node has unified social credibility code, can also using digital certificate public key and unified social credibility code as
Unique identity, and be using digital certificate public key and unified social credibility code as the purpose of identity: when this
When the digital certificate public key of node is not available, restore the data information of the node using unified social credibility code, for example,
Restore electronic invoice data chain etc.), it is based on this, when all electronic invoices of any one node in the distributed node network
When there is abnormal electronic invoice data chain in data-link, backup node is chosen from all business interdependent nodes of the node, and
The corresponding backup electronic invoice data chain of exception electronic invoice data chain is obtained from each backup node respectively, from obtaining
All backup electronic invoice data chains in, choose a backup electronic invoice data chain as target electronic invoice data chain,
And to the target electronic invoice data chain carry out legitimate verification, if the target electronic invoice data chain is illegal, never into
In all backup electronic invoice data chains of row legitimate verification, a backup electronic invoice data chain is chosen again as target
Electronic invoice data chain carries out legitimate verification;If the target electronic invoice data chain is legal, by the exception electronic invoice number
Synchronous according to chain is the target electronic invoice data chain.In this way, recording electronics by each data block in electronic invoice data chain
The data information of invoice no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud
While a large amount of memory spaces of equipment and tax board web, the load of computer, cloud equipment and tax board web is reduced, and
And since data block is once created, then it is not easy to be tampered, therefore, is remembered by each data block in electronic invoice data chain
The data information of electronic invoice is recorded, safety is higher, and reliability is stronger, in addition, working as the electronic invoice data of any one node
When chain occurs abnormal, backup electronic invoice data chain can be obtained by business interdependent node, and electric from all backups obtained
In sub- invoice data chain, legal backup electronic invoice data chain is selected, is to synchronize abnormal electronic invoice data chain
Legal backup electronic invoice data chain, thus, while realizing the recovery of abnormal electronic invoice data chain, it ensure that extensive
The legitimacy of electronic invoice data chain after multiple.
The present invention program is described in detail below by specific embodiment, certainly, the present invention is not limited to following realities
Apply example.
Embodiment one
The embodiment of the present invention one provides a kind of synchronous method of electronic invoice data chain, wherein the electronic invoice data
Chain, which can be to be kept accounts as each pin item of the expenditure information of record electronic invoice, sells item book keeping operation chain made of block chaining, be also possible to
The income book keeping operation chain as made of each income book keeping operation block chaining of the income information of record electronic invoice, can also be by electronics
The creation of each circulation stage of invoice is used to record electronic invoice in each record block of the accordingly circulation information in circulation stage
Circulation record chain of electronic invoice made of link, etc..In addition, the executing subject of the synchronous method can be it is as shown in Figure 1A
Any one node in distributed node network, moreover, each node in the distributed node network save it is above-mentioned
Electronic invoice circulation record chain, itself pin item book keeping operation chain and income book keeping operation chain and itself each business interdependent node
Item book keeping operation chain and income book keeping operation chain are sold, this is based on, as shown in fig.1, the electronic invoice data chain that the embodiment of the present invention one provides
Synchronous method process it is as follows:
Step 101: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from first segment
Backup node is chosen in all business interdependent nodes of point, wherein the electronic invoice data chain is by record electronic invoice
Made of each block-chaining of data information.
Step 102: obtaining the backup electronic invoice number of abnormal electronic invoice data chain from each backup node respectively
According to chain, and from all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as target electricity
Sub- invoice data chain, and legitimate verification is carried out to target electronic invoice data chain.
Step 103: if target electronic invoice data chain is illegal, all backup electronics of never progress legitimate verification are sent out
In ticket data chain, a backup electronic invoice data chain is chosen again and is tested as target electronic invoice data chain progress legitimacy
Card.
Step 104: if target electronic invoice data chain is legal, abnormal electronic invoice data chain being synchronized as target.
In the embodiment of the present invention one, believed by the data that each data block in electronic invoice data chain records electronic invoice
Breath no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud equipment and the tax bureau
While a large amount of memory spaces of website, the load of computer, cloud equipment and tax board web is reduced, moreover, because data
Block is once created, then is not easy to be tampered, and therefore, records electronic invoice by each data block in electronic invoice data chain
Data information, safety is higher, and reliability is stronger, in addition, can pass through business phase when electronic invoice data chain occurs abnormal
Artis obtains backup electronic invoice data chain, and from all backup electronic invoice data chains obtained, it is legal to select
Backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, from
And while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legal of the electronic invoice data chain after restoring
Property.
Embodiment two
The synchronous method of the electronic invoice data chain referred in above-described embodiment one is described in further detail below, is joined
It reads shown in Fig. 2, in the embodiment of the present invention two, the detailed process of the synchronous method of electronic invoice data chain is as follows:
Step 201: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from first segment
Backup node is chosen in all business interdependent nodes of point.
In the specific implementation, all second nodes can be chosen as backup node, it can also be from all second nodes
In, selected part second node is as backup node, and specifically, from all second nodes, selected part second node is made
When for backup node, it can use but be not limited to following manner (wherein, operations described below 1-3 is without sequencing):
Operation 1, in all second nodes from first node as drawee party, based on second node to first node expenditure
Electronic invoice quantity, filter out meet the first default billing conditions second node.For example, first node is from first node
It is greater than preset threshold as the quantity in all second nodes of drawee party, filtering out the electronic invoice paid to first node
Second node for another example in all second nodes of the first node from first node as drawee party, is paid according to first node
Electronic invoice quantity sequence from high to low, select top n second node, etc..
Operation 2 in all second nodes from first node as the side of making out an invoice, based on the amount of making out an invoice of first node, is screened
Meet the second node of the second default billing conditions out.For example, first node from first node as the side of making out an invoice all second
In node, the quantity for filtering out the electronic invoice paid to second node is greater than the second node of preset threshold, for another example, first segment
In all second nodes of the point from first node as the side of making out an invoice, according to the quantity for the electronic invoice paid to second node from height
To low sequence, top n second node, etc. is selected.
Operation 3 is based on the distance between second node and first node from all second nodes, and it is pre- to filter out satisfaction
If regional condition second node.For example, first node from all second nodes, filter out between first node away from
From the second node for being greater than preset threshold, for another example, first node from all second nodes, according between first node away from
From sequence from big to small, top n second node, etc. is selected.
Operation 4, using all second nodes filtered out as backup node.
Step 202: obtaining the backup electronic invoice of the exception electronic invoice data chain from each backup node respectively
Data-link.
When executing step 202, it can use but be not limited to following manner: determine the number of the exception electronic invoice data chain
According to chain type;For each backup node, all backup electronic invoice numbers of the first node saved from the backup node
According in chain, selecting corresponding data-link type backup electronics identical with the data-link type of the exception electronic invoice data chain
Invoice data chain, the backup electronic invoice data chain as the exception electronic invoice data chain.
Step 203: from all backup electronic invoice data chains obtained, choosing a backup electronic invoice data chain and make
For target electronic invoice data chain.
Preferably, in order to guarantee that the target backup electronic invoice data chain chosen is newest backup electronic invoice data
Chain can use when choosing target electronic invoice data chain but be not limited to following two mode:
First way: from all backup electronic invoice data chains obtained, the last one Backup Data block is chosen
The shortest backup electronic invoice data chain of time interval between creation time and current time is as target electronic invoice data
Chain.
The second way: from all backup electronic invoice data chains obtained, the number for the Backup Data block for including is chosen
The most backup electronic invoice data chain of mesh is as target electronic invoice data chain.
Step 204: common recognition node is chosen from all business interdependent nodes of first node.
In the specific implementation, all second nodes can be chosen and be used as common recognition node, it can also be from all second nodes
In, selected part second node is as common recognition node, and specifically, from all second nodes, selected part second node is made
For common recognition node when, can use but be not limited to following manner (wherein, operations described below 1-3 is without sequencing):
Operation 1, in all second nodes from first node as drawee party, based on second node to first node expenditure
Electronic invoice quantity, filter out meet the first default billing conditions second node.For example, first node is from first node
It is greater than preset threshold as the quantity in all second nodes of drawee party, filtering out the electronic invoice paid to first node
Second node for another example in all second nodes of the first node from first node as drawee party, is paid according to first node
Electronic invoice quantity sequence from high to low, select top n second node, etc..
Operation 2 in all second nodes from first node as the side of making out an invoice, based on the amount of making out an invoice of first node, is screened
Meet the second node of the second default billing conditions out.For example, first node from first node as the side of making out an invoice all second
In node, the quantity for filtering out the electronic invoice paid to second node is greater than the second node of preset threshold, for another example, first segment
In all second nodes of the point from first node as the side of making out an invoice, according to the quantity for the electronic invoice paid to second node from height
To low sequence, top n second node, etc. is selected.
Operation 3 is based on the distance between second node and first node from all second nodes, and it is pre- to filter out satisfaction
If regional condition second node.For example, first node from all second nodes, filter out between first node away from
From the second node for being greater than preset threshold, for another example, first node from all second nodes, according between first node away from
From sequence from big to small, top n second node, etc. is selected.
Operation 4, using all second nodes filtered out as common recognition node.
Step 205: indicating each common recognition node to last N number of Backup Data block in the target electronic invoice data chain
Carry out legitimate verification, wherein N is greater than the positive integer equal to 1.
Tellable to be, the last N number of Backup Data block progress legitimacy chosen in the target electronic invoice data chain is tested
The purpose of card is:
(1) since electronic invoice data chain is not easy to be tampered, so, unauthorized person is typically employed in electronic invoice data chain
End increase the mode of electronic invoice data block and attack electronic invoice data chain, be based on this, choose last N number of Backup Data
Block carries out legitimate verification, and whether be easier to verify the target electronic invoice data chain legal.
(2) in order to guarantee that the target backup electronic invoice data chain chosen is newest backup electronic invoice data chain,
When choosing target electronic invoice data chain, generally choose between the creation time and current time of the last one Backup Data block
The shortest backup electronic invoice data chain of time interval is as target electronic invoice data chain, alternatively, choosing the backup number for including
According to the most backup electronic invoice data chain of the number of block as target electronic invoice data chain, so, relative to other backups
It may include extra backup electronic invoice number in the target electronic invoice data chain that selects for electronic invoice data chain
According to block, it is based on this, last N number of Backup Data block is chosen from target electronic invoice data chain and carries out legitimate verification, can be kept away
Exempt from accidentally to delete newest electronic invoice data block legal in target electronic invoice data chain, so that it is same to improve electronic invoice data chain
The reliability of step.
Step 206: the verification result returned based on each common recognition node judges the last N number of Backup Data block chosen
It is whether legal, if so, thening follow the steps 207;Otherwise, step 211 is executed.
It is tellable to be, when the verification result returned based on each common recognition node, determine the last N backup chosen
When data block is legal, it can directly assert that the target electronic invoice data chain is legal, certainly, in order to further assure that the mesh
The legitimacy for marking electronic invoice data chain can also continue to execute step 207, be removed with verifying in the target electronic invoice data chain
Other Backup Data blocks except last N number of Backup Data block whether legitimacy.
Step 207: all standby from remaining in addition to last N number of Backup Data block in the target electronic invoice data chain
In part data block, optional M Backup Data block, wherein M is greater than the positive integer equal to 1.
Step 208: indicating that each common recognition node carries out legitimate verification to the M backup book keeping operation block of selection.
Step 209: whether the verification result returned based on each common recognition node judges the M Backup Data block chosen
It is legal, if so, thening follow the steps 210;Otherwise, step 211 is executed.
Step 210: assert that the target electronic invoice data chain is legal, and abnormal electronic invoice data chain is synchronized as the mesh
Mark electronic invoice data chain.
Step 211: assert that the target electronic invoice data chain is illegal, and never carry out all backups electricity of legitimate verification
In sub- invoice data chain, a backup electronic invoice data chain is chosen again as target electronic invoice data chain and carries out legitimacy
Verifying, i.e. return step 205.
In the embodiment of the present invention two, believed by the data that each data block in electronic invoice data chain records electronic invoice
Breath no longer carries out centralized management and record to the data information of electronic invoice, is saving computer, cloud equipment and the tax bureau
While a large amount of memory spaces of website, the load of computer, cloud equipment and tax board web is reduced, moreover, because data
Block is once created, then is not easy to be tampered, and therefore, records electronic invoice by each data block in electronic invoice data chain
Data information, safety is higher, and reliability is stronger, in addition, can pass through business phase when electronic invoice data chain occurs abnormal
Artis obtains backup electronic invoice data chain, and from all backup electronic invoice data chains obtained, it is legal to select
Backup electronic invoice data chain, to synchronize abnormal electronic invoice data chain for legal backup electronic invoice data chain, from
And while realizing the recovery of abnormal electronic invoice data chain, it ensure that the legal of the electronic invoice data chain after restoring
Property, also, during legitimate verification, by carrying out legitimate verification to last N number of backup electronic invoice data block, no
The legitimacy that only can quickly and accurately verify the backup electronic invoice data chain can also avoid accidentally deleting the backup electronics
Newest electronic invoice data block in invoice data chain, to improve the synchronous reliability of electronic invoice data chain.
Embodiment three
The embodiment of the present invention three provides a kind of synchronizing device of electronic invoice data chain, as shown in fig.3, the electronics is sent out
The synchronizing device of ticket data chain includes at least:
Module 301 is obtained, for when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node,
Backup node is chosen from all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electricity
Made of each block-chaining of the data information of sub- invoice;
Authentication module 302, for obtaining the backup electricity of abnormal electronic invoice data chain from each backup node respectively
Sub- invoice data chain, and from all backup electronic invoice data chains obtained, it chooses a backup electronic invoice data chain and makees
For target electronic invoice data chain, and legitimate verification is carried out to target electronic invoice data chain;If target electronic invoice number
It is illegal according to chain, then in all backup electronic invoice data chains for never carrying out legitimate verification, a backup electronics is chosen again
Invoice data chain carries out legitimate verification as target electronic invoice data chain;
Abnormal electronic invoice data chain is synchronized if legal for target electronic invoice data chain and is by synchronization module 303
Target electronic invoice data chain.
Preferably, the backup electronic invoice data of abnormal electronic invoice data chain is obtained from each backup node respectively
When chain, obtains module 301 and is specifically used for:
Determine the data-link type of exception electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node
In, select corresponding data-link type backup electronic invoice number identical with the data-link type of abnormal electronic invoice data chain
Backup electronic invoice data chain according to chain, as abnormal electronic invoice data chain.
Preferably, choosing a backup electronic invoice data chain from all backup electronic invoice data chains obtained and making
When for target electronic invoice data chain, authentication module 302 is specifically used for:
From all backup electronic invoice data chains obtained, chooses the creation time of the last one Backup Data block and work as
The shortest backup electronic invoice data chain of time interval between the preceding time is as target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup of the number for the Backup Data block for including is chosen
Electronic invoice data chain is as target electronic invoice data chain.
Preferably, authentication module 302 is specifically used for when carrying out legitimate verification to target electronic invoice data chain:
Common recognition node is chosen from all business interdependent nodes of first node, and indicates each common recognition node to target
Last N number of Backup Data block in electronic invoice data chain carries out legitimate verification, wherein N is greater than the positive integer equal to 1;
If determining that last N number of Backup Data block is legal, then assert based on the verification result that each common recognition node returns
Target electronic invoice data chain is legal;Otherwise, assertive goal electronic invoice data chain is illegal.
Preferably, determining that last N number of Backup Data block is legal in the verification result returned based on each common recognition node
Later, before assertive goal electronic invoice data chain is legal, authentication module 302 is also used to:
From remaining all Backup Data block in addition to last N number of Backup Data block in target electronic invoice data chain
In, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block, wherein M
It is greater than the positive integer equal to 1.
Preferably, authentication module 302 is also used to: if it is determined that M Backup Data block is legal, then assertive goal electronic invoice
Data-link is legal.
Example IV
After describing the method and apparatus of exemplary embodiment of the invention, next, to the exemplary reality of the present invention
The nonvolatile computer storage media synchronous for electronic invoice data chain for applying mode is introduced.The embodiment of the present invention four
A kind of nonvolatile computer storage media is provided, which is stored with executable program, should
Executable code processor executes the step of synchronous method for realizing above-mentioned electronic invoice data chain, for example realizes as shown in figure 1
Shown step 101: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from first node
All business interdependent nodes in choose backup node, wherein the electronic invoice data chain is by the number of record electronic invoice
It is believed that made of each block-chaining of breath;Step 102: obtaining abnormal electronic invoice number from each backup node respectively
According to the backup electronic invoice data chain of chain, and from all backup electronic invoice data chains obtained, a backup electronics is chosen
Invoice data chain carries out legitimate verification as target electronic invoice data chain, and to target electronic invoice data chain;Step
103: if target electronic invoice data chain is illegal, never in all backup electronic invoice data chains of progress legitimate verification,
Again a backup electronic invoice data chain, which is chosen, as target electronic invoice data chain carries out legitimate verification;Step 104: if
Target electronic invoice data chain is legal, then synchronizes abnormal electronic invoice data chain for target electronic invoice data chain.
Embodiment five
After the method, apparatus and nonvolatile computer storage media for describing exemplary embodiment of the invention,
Next, the electronic equipment synchronous for electronic invoice data chain to exemplary embodiment of the invention is introduced.This hair
Bright embodiment five provides a kind of electronic equipment, which can be but be not limited to PC device, tax control tray
Deng specifically, which may include: memory 401, processor 402 and the computer journey being stored on memory 401
The step of sequence, processor 402 realizes the synchronous method of above-mentioned electronic invoice data chain when executing the computer program, for example realize
Step 101 as shown in fig. 1: when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from
Backup node is chosen in all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electronics
Made of each block-chaining of the data information of invoice;Step 102: being obtained from each backup node respectively abnormal electric
The backup electronic invoice data chain of sub- invoice data chain, and from all backup electronic invoice data chains obtained, choose one
Backup electronic invoice data chain is as target electronic invoice data chain, and carries out legitimacy to target electronic invoice data chain and test
Card;Step 103: if target electronic invoice data chain is illegal, never carrying out all backup electronic invoice numbers of legitimate verification
According in chain, a backup electronic invoice data chain is chosen again as target electronic invoice data chain and carries out legitimate verification;Step
Rapid 104: if target electronic invoice data chain is legal, abnormal electronic invoice data chain being synchronized as target electronic invoice data
Chain.
Preferably, memory 401 may include read-only memory (ROM) and random access memory (RAM), processor
402 can be and to processor.
Further, the electronic equipment in the embodiment of the present invention five can also include input unit 403 and output device 404
Deng.Input unit 403 may include stylus, keyboard, mouse, touch screen etc.;Output device 404 may include display equipment,
Such as liquid crystal display (Liquid Crystal Display, LCD), cathode-ray tube (Cathode Ray Tube, CRT), touching
Touch screen etc..Memory 401, processor 402, input unit 403 and output device 404 can be connected by bus or other modes
It connects, in Fig. 4 only for being connected by bus.
In conclusion in the embodiment of the present invention, when there is abnormal electronic invoice in the electronic invoice data chain of first node
When data-link, backup node is chosen from all business interdependent nodes of first node, wherein the electronic invoice data chain is
Made of each block-chaining as the data information of record electronic invoice;It is obtained from each backup node respectively abnormal
The backup electronic invoice data chain of electronic invoice data chain, and from all backup electronic invoice data chains obtained, choose one
Item backup electronic invoice data chain carries out legitimacy as target electronic invoice data chain, and to target electronic invoice data chain
Verifying;If target electronic invoice data chain is illegal, never in all backup electronic invoice data chains of progress legitimate verification,
Again a backup electronic invoice data chain, which is chosen, as target electronic invoice data chain carries out legitimate verification;If target electronic
Invoice data chain is legal, then synchronizes abnormal electronic invoice data chain for target electronic invoice data chain.In this way, being sent out by electronics
The data information of each data block record electronic invoice in ticket data chain, no longer carries out center to the data information of electronic invoice
Change management and record, while saving a large amount of memory spaces of computer, cloud equipment and tax board web, reduces calculating
The load of machine, cloud equipment and tax board web is then not easy to be tampered moreover, because data block is once created, and therefore, passes through
The data information of each data block record electronic invoice in electronic invoice data chain, safety is higher, and reliability is stronger, this
Outside, when electronic invoice data chain occurs abnormal, backup electronic invoice data chain can be obtained by business interdependent node, and from
In all backup electronic invoice data chains obtained, legal backup electronic invoice data chain is selected, so as to by abnormal electronics
Synchronous invoice data chain is legal backup electronic invoice data chain, thus, realizing the extensive of abnormal electronic invoice data chain
While multiple, the legitimacy of the electronic invoice data chain after restoring ensure that.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions each in flowchart and/or the block diagram
The combination of process and/or box in process and/or box and flowchart and/or the block diagram.It can provide these computers
Processor of the program instruction to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices
To generate a machine, so that generating use by the instruction that computer or the processor of other programmable data processing devices execute
In the dress for realizing the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram
It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention
The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention
And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.
Claims (14)
1. a kind of synchronous method of electronic invoice data chain characterized by comprising
When there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from all of the first node
Backup node is chosen in business interdependent node, wherein the electronic invoice data chain is by the data information of record electronic invoice
Each block-chaining made of;
Obtain the backup electronic invoice data chain of the abnormal electronic invoice data chain from each backup node respectively, and from
In all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as target electronic invoice data
Chain, and legitimate verification is carried out to the target electronic invoice data chain;
If the target electronic invoice data chain is illegal, all backup electronic invoice data chains of legitimate verification are never carried out
In, a backup electronic invoice data chain is chosen again as target electronic invoice data chain carries out legitimate verification;
If the target electronic invoice data chain is legal, the abnormal electronic invoice data chain is synchronized as the target electronic
Invoice data chain.
2. synchronous method as described in claim 1, which is characterized in that obtain the exception from each backup node respectively
The backup electronic invoice data chain of electronic invoice data chain, comprising:
Determine the data-link type of the abnormal electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node
In, it selects corresponding data-link type backup electronics identical with the data-link type of the abnormal electronic invoice data chain and sends out
Ticket data chain, the backup electronic invoice data chain as the abnormal electronic invoice data chain.
3. synchronous method as described in claim 1, which is characterized in that from all backup electronic invoice data chains obtained,
A backup electronic invoice data chain is chosen as target electronic invoice data chain, comprising:
From all backup electronic invoice data chains obtained, choose the last one Backup Data block creation time and it is current when
Between between the shortest backup electronic invoice data chain of time interval as the target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup electronics of the number for the Backup Data block for including is chosen
Invoice data chain is as the target electronic invoice data chain.
4. synchronous method as described in claim 1, which is characterized in that carry out legitimacy to the target electronic invoice data chain
Verifying, comprising:
Common recognition node is chosen from all business interdependent nodes of the first node, and indicates each common recognition node to described
Last N number of Backup Data block in target electronic invoice data chain carries out legitimate verification, wherein N is greater than just whole equal to 1
Number;
If determining that last N number of Backup Data block is legal based on the verification result that each common recognition node returns, then assert
The target electronic invoice data chain is legal;Otherwise, assert that the target electronic invoice data chain is illegal.
5. synchronous method as claimed in claim 4, which is characterized in that the verification result based on each common recognition node return,
After determining that last N number of Backup Data block is legal, before assert that the target electronic invoice data chain is legal, also wrap
It includes:
From remaining all Backup Data in addition to last N number of Backup Data block in the target electronic invoice data chain
In block, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block,
Wherein, M is greater than the positive integer equal to 1.
6. synchronous method as claimed in claim 5, which is characterized in that if it is determined that the M Backup Data block is legal, then recognize
The fixed target electronic invoice data chain is legal.
7. a kind of synchronizing device of electronic invoice data chain characterized by comprising
Module is obtained, for when there is abnormal electronic invoice data chain in the electronic invoice data chain of first node, from described
Backup node is chosen in all business interdependent nodes of first node, wherein the electronic invoice data chain is by record electronics
Made of each block-chaining of the data information of invoice;
Authentication module, for obtaining the backup electronics hair of the abnormal electronic invoice data chain from each backup node respectively
Ticket data chain, and from all backup electronic invoice data chains obtained, a backup electronic invoice data chain is chosen as mesh
Electronic invoice data chain is marked, and legitimate verification is carried out to the target electronic invoice data chain;If the target electronic hair
Ticket data chain is illegal, then in all backup electronic invoice data chains for never carrying out legitimate verification, chooses a backup again
Electronic invoice data chain carries out legitimate verification as target electronic invoice data chain;
Synchronization module, it is if legal for the target electronic invoice data chain, the abnormal electronic invoice data chain is synchronous
For the target electronic invoice data chain.
8. synchronizing device as claimed in claim 7, which is characterized in that from each backup node, it is electric to obtain the exception
When the backup electronic invoice data chain of sub- invoice data chain, the acquisition module is specifically used for:
Determine the data-link type of the abnormal electronic invoice data chain;
For each backup node, all backup electronic invoice data chains of the first node saved from the backup node
In, it selects corresponding data-link type backup electronics identical with the data-link type of the abnormal electronic invoice data chain and sends out
Ticket data chain, the backup electronic invoice data chain as the abnormal electronic invoice data chain.
9. synchronizing device as claimed in claim 7, which is characterized in that from all backup electronic invoice data chains obtained,
When choosing a backup electronic invoice data chain as target electronic invoice data chain, the authentication module is specifically used for:
From all backup electronic invoice data chains obtained, choose the last one Backup Data block creation time and it is current when
Between between the shortest backup electronic invoice data chain of time interval as the target electronic invoice data chain;Alternatively,
From all backup electronic invoice data chains obtained, the most backup electronics of the number for the Backup Data block for including is chosen
Invoice data chain is as the target electronic invoice data chain.
10. synchronizing device as claimed in claim 7, which is characterized in that it is legal to carry out to the target electronic invoice data chain
Property verifying when, the authentication module is specifically used for:
Common recognition node is chosen from all business interdependent nodes of the first node, and indicates each common recognition node to described
Last N number of Backup Data block in target electronic invoice data chain carries out legitimate verification, wherein N is greater than just whole equal to 1
Number;
If determining that last N number of Backup Data block is legal based on the verification result that each common recognition node returns, then assert
The target electronic invoice data chain is legal;Otherwise, assert that the target electronic invoice data chain is illegal.
11. synchronizing device as claimed in claim 10, which is characterized in that in the verifying knot returned based on each common recognition node
Fruit, after determining that last N number of Backup Data block is legal, before assert that the target electronic invoice data chain is legal,
The authentication module is also used to:
From remaining all Backup Data in addition to last N number of Backup Data block in the target electronic invoice data chain
In block, optional M Backup Data block, and indicate that each common recognition node carries out legitimate verification to M backup book keeping operation block,
Wherein, M is greater than the positive integer equal to 1.
12. synchronous method as claimed in claim 11, which is characterized in that the authentication module is also used to: if it is determined that the M
Backup Data block is legal, then assert that the target electronic invoice data chain is legal.
13. a kind of nonvolatile computer storage media, which is characterized in that the nonvolatile computer storage media is stored with
Executable program, the executable code processor execute the step of realizing claim 1-6 any described synchronous method.
14. a kind of electronic equipment characterized by comprising memory, processor and the computer being stored on the memory
The step of claim 1-6 any described synchronous method is realized when program, the processor execute the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710875650.4A CN109558064B (en) | 2017-09-25 | 2017-09-25 | Electronic invoice data chain synchronization method, device, medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710875650.4A CN109558064B (en) | 2017-09-25 | 2017-09-25 | Electronic invoice data chain synchronization method, device, medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109558064A true CN109558064A (en) | 2019-04-02 |
CN109558064B CN109558064B (en) | 2022-06-07 |
Family
ID=65861915
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710875650.4A Active CN109558064B (en) | 2017-09-25 | 2017-09-25 | Electronic invoice data chain synchronization method, device, medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109558064B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111931247A (en) * | 2020-07-04 | 2020-11-13 | 华电联合(北京)电力工程有限公司 | Verification method, verification device, verification system and computer-readable storage medium for verification data |
CN116760632A (en) * | 2023-08-10 | 2023-09-15 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and readable storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160092451A1 (en) * | 2014-09-30 | 2016-03-31 | Storagecraft Technology Corporation | Pruning free blocks out of a decremental backup chain |
CN106295406A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | A kind of block chain that is used for is from safe storage system and method thereof |
CN106383754A (en) * | 2016-09-19 | 2017-02-08 | 北京众享比特科技有限公司 | Database backup and recovery system based on block chain technology, and database backup method based on block chain technology, and database recovery method based on block chain technology |
CN106412037A (en) * | 2016-09-19 | 2017-02-15 | ***股份有限公司 | Security electronic file processing system and method based on block link structure |
CN106547648A (en) * | 2016-10-21 | 2017-03-29 | 杭州嘉楠耘智信息科技有限公司 | Backup data processing method and device |
CN106713412A (en) * | 2016-11-09 | 2017-05-24 | 弗洛格(武汉)信息科技有限公司 | Block chain system and construction method of block chain system |
CN106775497A (en) * | 2017-01-19 | 2017-05-31 | 郑志超 | Distributed storage method and equipment based on block chain |
CN106952124A (en) * | 2017-03-16 | 2017-07-14 | 北京牛链科技有限公司 | Electronic bill management system and method based on distribution book keeping operation |
-
2017
- 2017-09-25 CN CN201710875650.4A patent/CN109558064B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160092451A1 (en) * | 2014-09-30 | 2016-03-31 | Storagecraft Technology Corporation | Pruning free blocks out of a decremental backup chain |
CN106295406A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | A kind of block chain that is used for is from safe storage system and method thereof |
CN106383754A (en) * | 2016-09-19 | 2017-02-08 | 北京众享比特科技有限公司 | Database backup and recovery system based on block chain technology, and database backup method based on block chain technology, and database recovery method based on block chain technology |
CN106412037A (en) * | 2016-09-19 | 2017-02-15 | ***股份有限公司 | Security electronic file processing system and method based on block link structure |
CN106547648A (en) * | 2016-10-21 | 2017-03-29 | 杭州嘉楠耘智信息科技有限公司 | Backup data processing method and device |
CN106713412A (en) * | 2016-11-09 | 2017-05-24 | 弗洛格(武汉)信息科技有限公司 | Block chain system and construction method of block chain system |
CN106775497A (en) * | 2017-01-19 | 2017-05-31 | 郑志超 | Distributed storage method and equipment based on block chain |
CN106952124A (en) * | 2017-03-16 | 2017-07-14 | 北京牛链科技有限公司 | Electronic bill management system and method based on distribution book keeping operation |
Non-Patent Citations (1)
Title |
---|
张庆胜等: "基于区块链的电子******研究", 《信息安全研究》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111931247A (en) * | 2020-07-04 | 2020-11-13 | 华电联合(北京)电力工程有限公司 | Verification method, verification device, verification system and computer-readable storage medium for verification data |
CN116760632A (en) * | 2023-08-10 | 2023-09-15 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and readable storage medium |
CN116760632B (en) * | 2023-08-10 | 2023-11-03 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109558064B (en) | 2022-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108932348B (en) | Block chain merging processing method and device, block chain node and storage medium | |
CN109034809B (en) | Block chain generation method and device, block chain node and storage medium | |
CN106611061B (en) | Database write-in method and system based on block chain network | |
US11301136B2 (en) | Capacity forecasting based on capacity policies and transactions | |
CN109410045A (en) | A kind of parallel chain common recognition method, equipment and storage medium | |
CN107908494A (en) | Processing method, device, electronic equipment and the storage medium of anomalous event | |
CN109784058A (en) | Version strong consistency method of calibration, client, server and storage medium | |
US8554727B2 (en) | Method and system of tiered quiescing | |
CN108536752A (en) | A kind of method of data synchronization, device and equipment | |
CN111988188A (en) | Transaction endorsement method, device and storage medium | |
CN104182900A (en) | Business data processing method, device and system | |
CN112035350B (en) | Test method and device for block chain system and computer equipment | |
CN109492049A (en) | Data processing, block generation and synchronous method for block chain network | |
CN110190963A (en) | A kind of monitoring method, device and equipment for the request of time service certificates constructing | |
CN109558064A (en) | A kind of synchronous method, device, medium and the electronic equipment of electronic invoice data chain | |
US10133642B2 (en) | Techniques for presenting views of a backup environment for an organization on a sub-organizational basis | |
CN104282098B (en) | The making out an invoice and copy tax process upgrade method of a kind of tax-controlling device | |
CN107992763A (en) | The power-off protection method and device of a kind of file system | |
CN110555682A (en) | multi-channel implementation method based on alliance chain | |
US20210144451A1 (en) | Control method, content management system, recording medium, and data structure | |
CN109697371A (en) | Data base management method, device, medium and electronic equipment | |
CN110019972A (en) | The restoration methods and electronic device of the storage method of electronic invoice, chain of keeping accounts | |
CN108304569B (en) | Test data accumulation method and device | |
CN110347657A (en) | Data creation method, device, electronic equipment and storage medium | |
CN110858211A (en) | Data storage method, device and system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |