WO2020244240A1 - 一种针对块链式账本的压缩方法、装置及设备 - Google Patents

一种针对块链式账本的压缩方法、装置及设备 Download PDF

Info

Publication number
WO2020244240A1
WO2020244240A1 PCT/CN2020/071464 CN2020071464W WO2020244240A1 WO 2020244240 A1 WO2020244240 A1 WO 2020244240A1 CN 2020071464 W CN2020071464 W CN 2020071464W WO 2020244240 A1 WO2020244240 A1 WO 2020244240A1
Authority
WO
WIPO (PCT)
Prior art keywords
data block
block
digital signature
ledger
data
Prior art date
Application number
PCT/CN2020/071464
Other languages
English (en)
French (fr)
Inventor
杨新颖
Original Assignee
创新先进技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 创新先进技术有限公司 filed Critical 创新先进技术有限公司
Priority to US16/804,680 priority Critical patent/US10764062B2/en
Priority to US16/944,111 priority patent/US10958440B2/en
Publication of WO2020244240A1 publication Critical patent/WO2020244240A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • the embodiments of this specification relate to the field of information technology, and in particular, to a compression method, device, and equipment for a block chain ledger.
  • the purpose of the embodiments of this application is to provide an effective compression scheme that can target the block chain ledger.
  • the compression point information includes the identification information of the specified data block, the digital signature of the server and the digital signature of the user, which is used to indicate that the previous ledger of the data block has passed the integrity verification;
  • the embodiment of this specification also provides a compression device in a blockchain ledger, which is applied to a centralized server that stores data in a blockchain ledger, including:
  • the acquisition module acquires compression point information about the block chain ledger.
  • the compression point information includes the identification information of the specified data block, the digital signature of the server and the digital signature of the user, which is used to indicate that the previous ledger of the data block has passed Integrity verification;
  • the compression module performs data compression on the ledger before the designated data block.
  • the information about the compression point in the ledger is created in advance to prove that the part of the ledger before a data block has passed the integrity verification, and this part of the ledger is not commonly used and can be compressed. Moreover, the compression point information is recognized by both the user and the server. Therefore, it is possible to compress part of the ledgers that have passed the integrity verification, reduce the storage space of the overall ledgers, and reduce the storage cost of the server.
  • Fig. 1 is a schematic diagram of a process for generating a block chain ledger provided by an embodiment of the specification
  • FIG. 2 is a schematic flowchart of a compression method in a blockchain ledger provided by an embodiment of this specification
  • FIG. 3 is a schematic diagram of an increment of compression point information provided by an embodiment of this specification.
  • Figure 4 is a schematic structural diagram of a compression device in a block chain ledger provided by an embodiment of this specification
  • Fig. 5 is a schematic structural diagram of a device for configuring the method of the embodiment of this specification.
  • FIG. 1 is a schematic diagram of the process of generating a block chain ledger provided by the embodiment of this specification, including:
  • S101 Receive a data record to be stored, and determine a hash value of each data record.
  • the data records to be stored here can be various consumption records of individual users of the client, or can be business results, intermediate states, and operation records generated when the application server executes business logic based on user instructions.
  • Specific business scenarios can include consumption records, audit logs, supply chains, government supervision records, medical records, and so on.
  • the preset block conditions include: the number of data records to be stored reaches the number threshold, for example, every time one thousand data records are received, a new data block is generated and one thousand data records are written into the block; or , The time interval from the last block formation time reaches the time threshold, for example, every 5 minutes, a new data block is generated, and the data records received within these 5 minutes are written into the block.
  • the N here refers to the serial number of the data block.
  • the data block is in the form of a block chain, which is arranged sequentially based on the order of the block time, and has a strong timing characteristic.
  • the block height of the data block increases monotonically based on the sequence of the block time.
  • the block height can be a sequence number, at this time the block height of the Nth data block is N; the block height can also be generated in other ways.
  • the data block at this time is the initial data block.
  • the current data block (the first data block) can be generated based on the hash value of the previous data block (that is, the N-1th data block). For example, a feasible way is to determine the hash value of each data record to be written in the Nth block, and generate a Merck according to the sequence in the block. In the Er tree, the root hash value of the Merkel tree and the hash value of the previous data block are spliced together, and the hash algorithm is used again to generate the hash value of the current block.
  • the hash value of the corresponding data record and the hash value of the data block can be obtained and saved, and integrity verification can be initiated based on the hash value.
  • the specific verification method is to recalculate the hash value of the data record itself and the hash value of the data block in the database, and compare with the locally stored hash value.
  • each data block is determined by a hash value, and the hash value of the data block is determined by the content and sequence of the data records in the data block and the hash value of the previous data block.
  • the user can initiate verification based on the hash value of the data block at any time. Any modification of the data block (including the modification of the data record content or sequence in the data block) will cause the hash value of the data block calculated during verification and The hash value of the data block is inconsistent when it is generated, which causes the verification to fail, thus realizing the immutability under centralization.
  • a segment of data block is designated for continuous integrity verification, or continuous integrity verification starts from the initial data block.
  • the verification method is to obtain the hash value of the previous data block, and use the same algorithm as when generating the hash value of the data block, and recalculate its own data according to its own data record and the hash value of the previous data block. The hash value of the block and the previous one.
  • the embodiment of this specification provides a data compression scheme based on compressed information points, which is applied to a centralized server that stores data in a block chain ledger, as shown in FIG. 2, which is the embodiment of the specification.
  • S201 Acquire compression point information about the blockchain ledger.
  • Compression point information is a trust point recognized by both the server and the user. It contains the identification information of the designated data block, the digital signature of the server and the digital signature of the user, which is used to signify that the ledger before the designated data block has passed the integrity Sexual verification.
  • the method agreed by both parties is that the digital signature of the server has been verified by the user, and the digital signature of the user has also been verified by the server.
  • the identification information of the designated data block may be the hash value of the data block or the block height of the data block.
  • the server generally only needs to save one corresponding compression point information.
  • the compression point information can be generated in advance and stored locally on the server.
  • the compression point information may be actively generated by the server, and the specific method is as follows:
  • the server obtains a part of the ledger before the designated data block, verifies the integrity of the part of the ledger, and generates verification success information after the verification is successful.
  • the designated data block can be obtained based on a certain preset condition of the server.
  • the server regularly monitors the query rate of the ledger. When it is found that the previous ledger call rate of a certain data block is lower than the preset value At this time, the data block is determined as a compression point, and the integrity verification is performed on the part of the ledger before the compression point (that is, all data blocks from the initial data block to the compression point).
  • the server periodically (for example, every month) determines the data block whose creation time exceeds one year and is closest to the current time as the designated data block.
  • the server generates a server digital signature for the verification success information, and sends the verification success information including the server digital signature to the client, so that the client performs a user digital signature.
  • the digital signature is the conventional private key encryption.
  • the client can use the corresponding public key to decrypt and verify the encrypted data. After the verification is passed, the client digitally signs the verification success information in a corresponding manner and returns to the service end.
  • the server receives the user digital signature for the verification success information returned by the client, and verifies the user digital signature, and when the verification is passed, the identification information including the specified data block, the server digital signature and the user digital signature are generated The compression point information, and save.
  • the compression point information may be proposed based on user requirements, and the specific implementation is as follows:
  • the server receives the user's compression point generation instruction, and the compression point generation instruction includes the identifier of the designated data block.
  • the designated data block can be specified by the user based on the user's needs, and the identifier of the designated data block can also be a hash value or a block height.
  • the server obtains the part of the ledger before the designated data block, sends the part of the ledger to the client, so that the client can perform integrity verification, and perform the user digital signature after the verification is successful. In other words, in this way, the verification can also be done by the client itself.
  • the server receives the user digital signature of the verification success information for the part of the ledger returned by the client; performs the server digital signature on the verification success information, and generates the identification information including the specified data block, the server digital signature and the user Digitally sign the compression point information and save it.
  • S203 Perform data compression on the ledger before the designated data block.
  • the ledger before the designated data block refers to all data blocks from the initial data block to the designated data block.
  • the compression process can be performed asynchronously with the generation of compression point information.
  • the block height of the corresponding data block can be determined, and it can be known that all data blocks before the data block have passed the integrity verification.
  • the compression process can be performed asynchronously with the generation of compression point information.
  • the compressed time period can be compressed when the server is idle in the background. For example, after the server continues to maintain a low usage rate of CPU and I/O for a certain period of time, and it is expected that there will be no storage peak in the short term, it is judged that the background is idle. Or, based on historical statistics, the server sets a certain time period of the day as an idle period (for example, 0 o'clock to 5 o'clock every day), and performs compression during the idle period.
  • the specific compression method can be a lossless compression format, which is Completely restore the original data without causing any distortion.
  • the user needs to call the compressed ledger again, he can also return to the file at any time.
  • the information about the compression point in the ledger is created in advance to prove that the part of the ledger before a data block has passed the integrity verification, and this part of the ledger is not commonly used and can be compressed. Moreover, the compression point information is recognized by both the user and the server. Therefore, it is possible to compress part of the ledgers that have passed the integrity verification, reduce the storage space of the overall ledgers, and reduce the storage cost of the server.
  • the user can initiate multiple compressions on the historical ledger.
  • the compression point will also increase monotonically over time.
  • the specific implementation method is that the server locally saves a piece of compression point information in advance, and at the same time, after generating another compression point information, corresponding to the saved compression point information and the designated data block in the another compression point information. Compare the block heights of, save the compression point information corresponding to the large block height, and delete the compression point information corresponding to the small block height, so as to keep the corresponding block height in the compression point information constantly increasing monotonically and avoid repeated compression.
  • FIG. 3 is an incremental schematic diagram of the compression point information provided by the embodiment of this specification. For the newly saved compression point information, relative to the deleted compression point information, the block height is always increasing. It should be noted that because there will only be one compression point information for a ledger, the smaller one is in this diagram. The compression point actually existed, but it has been deleted.
  • the embodiment of this specification also provides a compression device in a block chain ledger, which is applied to a centralized server that stores data in a block chain ledger, as shown in Figure 4, which is an embodiment of this specification.
  • a structural schematic diagram of a compression device in a block chain ledger is provided, including:
  • the obtaining module 401 obtains compression point information about the block chain ledger.
  • the compression point information contains the identification information of the specified data block, the digital signature of the server and the digital signature of the user, which is used to indicate that the previous ledger has been Passed integrity verification;
  • the compression module 403 performs data compression on the ledger before the designated data block.
  • the device further includes a first trust point generating module 405, which obtains a part of the ledger before the designated data block, performs integrity verification on the part of the ledger, and generates verification success information after the verification is successful;
  • the server digital signature of the success information sending the verification success information including the server digital signature to the client, so that the client can perform the user digital signature; receiving the user digital signature of the verification success information returned by the client; Generate and save the compression point information including the identification information of the designated data block, the digital signature of the server and the digital signature of the user.
  • the device further includes a second trust point generation module 407, which receives a user’s compression point generation instruction, where the compression point generation instruction contains the identification of the specified data block; obtains a part of the ledger before the specified data block, and sends the Part of the ledger is sent to the client so that the client can perform integrity verification, and perform a user digital signature after the verification is successful; receive the user digital signature of the verification success information for the partial ledger returned by the client; perform the verification success information
  • the server digital signature generates and saves the compression point information including the identification information of the designated data block, the server digital signature and the user digital signature.
  • the device when generating another compression point information, the device further includes a comparison module 409, which obtains the saved compression point information and the block height corresponding to the designated data block in the another compression point information; The size of the two block heights saves the compression point information corresponding to the larger block height, and deletes the compression point information corresponding to the smaller block height.
  • the device further includes a data block generation module 411, which receives the data records to be stored and determines the hash value of each data record; when the preset blocking condition is reached, determines the data to be written in the data block Record, generate the Nth data block containing the hash value of the data block and the data record, including:
  • the hash value and block height of the initial data block are given based on a preset method
  • N>1 determine the hash value of the Nth data block according to the data records in the data block to be written and the hash value of the N-1th data block, and generate a hash containing the Nth data block The Nth data block of the value, each data record and the block time of the data block, where the block height of the data block increases monotonically based on the sequence of the block time.
  • the embodiment of this specification also provides a computer device, which at least includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, wherein the processor implements the blocks shown in FIG. 2 when the program is executed.
  • the compression method in the chain ledger is not limited to a computer device, which at least includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, wherein the processor implements the blocks shown in FIG. 2 when the program is executed.
  • FIG. 5 shows a more specific hardware structure diagram of a computing device provided by an embodiment of this specification.
  • the device may include a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050.
  • the processor 1010, the memory 1020, the input/output interface 1030 and the communication interface 1040 realize the communication connection between each other in the device through the bus 1050.
  • the processor 1010 may be implemented in a general-purpose CPU (Central Processing Unit, central processing unit), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits for execution related Program to implement the technical solutions provided in the embodiments of this specification.
  • a general-purpose CPU Central Processing Unit, central processing unit
  • microprocessor microprocessor
  • application specific integrated circuit Application Specific Integrated Circuit, ASIC
  • ASIC Application Specific Integrated Circuit
  • the memory 1020 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory, random access memory), static storage device, dynamic storage device, etc.
  • the memory 1020 may store an operating system and other application programs. When the technical solutions provided in the embodiments of the present specification are implemented through software or firmware, related program codes are stored in the memory 1020 and called and executed by the processor 1010.
  • the input/output interface 1030 is used to connect an input/output module to realize information input and output.
  • the input/output/module can be configured in the device as a component (not shown in the figure), or can be connected to the device to provide corresponding functions.
  • the input device may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and an output device may include a display, a speaker, a vibrator, an indicator light, and the like.
  • the communication interface 1040 is used to connect a communication module (not shown in the figure) to realize the communication interaction between the device and other devices.
  • the communication module can realize communication through wired means (such as USB, network cable, etc.), or through wireless means (such as mobile network, WIFI, Bluetooth, etc.).
  • the bus 1050 includes a path to transmit information between various components of the device (for example, the processor 1010, the memory 1020, the input/output interface 1030, and the communication interface 1040).
  • the device may also include the necessary equipment for normal operation.
  • the above-mentioned device may also include only the components necessary to implement the solutions of the embodiments of the present specification, rather than all the components shown in the figures.
  • the embodiment of this specification also provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the compression method in the block chain ledger shown in FIG. 2 is implemented.
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • a typical implementation device is a computer.
  • the specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game control A console, a tablet computer, a wearable device, or a combination of any of these devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

公开了一种针对块链式账本的压缩方法、装置及设备。通过本说明书实施例所提供的方案,预先创建关于账本中的压缩点信息,用于证明一个数据块之前的部分账本是已经通过了完整性验证,该部分账本已经不常使用,可以进行压缩,并且,该压缩点信息是得到了用户和服务端的共同认可的。从而,可以对于通过了完整性验证的部分账本进行压缩,减少整体账本的存储空间,降低服务端的存储成本。

Description

一种针对块链式账本的压缩方法、装置及设备 技术领域
本说明书实施例涉及信息技术领域,尤其涉及一种针对块链式账本的压缩方法、装置及设备。
背景技术
在块链式账本中,随着业务的持续,账本中数据块的数量不可避免的持续增长,这对于存储资源带来了压力。但是实际应用中,有很多历史账本是用户基本上不关心的,例如,一年前的账本,用户已经基本上不访问、不参考。但是同时,在块链式账本,由于前后数据块的关联性,那些不被经常访问的账本也不能随意删除。
基于此,需要一种可以针对块链式账本的有效压缩方案。
发明内容
本申请实施例的目的是提供一种可以针对块链式账本的有效压缩方案。
为解决上述技术问题,本申请实施例是这样实现的:
一种块链式账本中的压缩方法,应用于以块链式账本存储数据的中心化的服务端中,包括:
获取关于所述块链式账本的压缩点信息,所述压缩点信息中包含指定数据块的标识信息、服务端数字签名和用户数字签名,用于表征该数据块之前的账本已经通过了完整性验证;
对所述指定数据块之前的账本进行数据压缩。
对应的,本说明书实施例还提供一种块链式账本中的压缩装置,应用于以块链式账本存储数据的中心化的服务端中,包括:
获取模块,获取关于所述块链式账本的压缩点信息,所述压缩点信息中包含指定数据块的标识信息、服务端数字签名和用户数字签名,用于表征该数据块之前的账本已经通过了完整性验证;
压缩模块,对所述指定数据块之前的账本进行数据压缩。
通过本说明书实施例所提供的方案,预先创建关于账本中的压缩点信息,用于证明一个数据块之前的部分账本是已经通过了完整性验证,该部分账本已经不常使用,可以进行压缩,并且,该压缩点信息是得到了用户和服务端的共同认可的。从而,可以对于通过了完整性验证的部分账本进行压缩,减少整体账本的存储空间,降低服务端的存储成本。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本说明书实施例。
此外,本说明书实施例中的任一实施例并不需要达到上述的全部效果。
附图说明
为了更清楚地说明本说明书实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书实施例中记载的一些实施例,对于本领域普通技术人员来讲,还可以根据这些附图获得其他的附图。
图1为本说明书实施例所提供的一种生成块链式账本的流程示意图;
图2为本说明书实施例所提供的一种块链式账本中的压缩方法的流程示意图;
图3为本说明书实施例所提供的压缩点信息的递增示意图;
图4是本说明书实施例提供的一种块链式账本中的压缩装置的结构示意图;
图5是用于配置本说明书实施例方法的一种设备的结构示意图。
具体实施方式
为了使本领域技术人员更好地理解本说明书实施例中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行详细地描述,显然,所描述的实施例仅仅是本说明书的一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员所获得的所有其他实施例,都应当属于保护的范围。
首先对本说明书实施例中所涉及的中心化下的块链式的账本予以说明。在中心化的数据库服务提供方,块链式的账本通过如下方式生成,如图1所示,图1为本说明书实施例所提供的一种生成块链式账本的流程示意图,包括:
S101,接收待存储的数据记录,确定各数据记录的哈希值。
此处的待存储的数据记录,可以是客户端个人用户的各种消费记录,也可以是应用服务器基于用户的指令,在执行业务逻辑时产生的业务结果、中间状态以及操作记录等等。具体的业务场景可以包括消费记录、审计日志、供应链条、政府监管记录、医疗记录等等。
S103,当达到预设的成块条件时,确定待写入数据块中的各数据记录,生成包含数据块的哈希值和数据记录的第N个数据块。
所述预设的成块条件包括:待存储的数据记录数量达到数量阈值,例如,每接收到一千条数据记录时,生成一个新数据块,将一千条数据记录写入块中;或者,距离上一次成块时刻的时间间隔达到时间阈值,例如,每隔5分钟,生成一个新数据块,将在这5分钟内接收到的数据记录写入块中。
此处的N指的是数据块的序号,换言之,在本说明书实施例中,数据块是以块链的形式,基于成块时间的顺序先后排列,具有很强的时序特征。其中,数据块的块高基于成块时间的先后顺序单调递增。块高可以是序号,此时第N个数据块的块高即为N;块高也可以其它方式生成。
当N=1时,即此时的数据块为初始数据块。初始数据块的哈希值和块高基于预设方式给定。例如,初始数据块中不包含数据记录,哈希值则为任一给定的哈希值,块高blknum=0;又例如,初始数据块的生成触发条件与其它数据块的触发条件一致,但是初始数据块的哈希值由对初始数据块中的所有内容取哈希确定。
当N>1时,由于前一数据块的内容和哈希值已经确定,则此时,可以基于前一数据块(即第N-1个数据块)的哈希值生成当前数据块(第N个数据块)的哈希值,例如,一种可行的方式为,确定每一条将要写入第N个块中的数据记录的哈希值,按照在块中的排列顺序,生成一个默克尔树,将默克尔树的根哈希值和前一数据块的哈希值拼接在一起,再次采用哈希算法,生成当前块的哈希值。又例如,还可以按照块中数据记录的顺序进行拼接并取哈希得到整体数据记录的哈希值,拼接前一数据块的哈希值和整体数据记录的哈希值,并对拼接得到的字串进行哈希运算,生成数据块的哈希值。
用户在上传数据成功后,即可以得到对应的数据记录的哈希值以及所处的数据块的哈希值,并保存,并且可以基于该哈希值发起完整性验证。具体的验证方式即为在数据库中重新计算数据记录自身的哈希值以及所处的数据块的哈希值,与本地所保存的进行对比。
通过前述的数据块的生成方式,每一个数据块通过哈希值确定,数据块的哈希值由数据块中的数据记录的内容、顺序以及前一数据块的哈希值决定。用户可以随时基于数据块的哈希值发起验证,对于数据块中任何内容(包括对于数据块中数据记录内容或者顺序的修改)的修改都会造成在验证时计算得到的数据块的哈希值和数据块生成时的哈希值不一致,而导致验证失败,从而实现了中心化下的不可篡改。
在对于块链式的账本进行验证时,一般而言,即指定一段数据块进行连续的完整性验证,或者从初始数据块开始进行连续的完整性验证。验证的方式即为获取前一数据块的哈希值,并采用与生成数据块的哈希值时的同样算法,根据自身的数据记录和前一数据块的哈希值,重新计算一遍自身据块的哈希值,并与之前的。
在这种方式下,随着业务的持续开展,一个账本中的数据块越来越多,而很多历史数据又是用户已经不再经常访问的了。同时,由于块链式账本的前后关联的特性(即后续账本的验证依赖于前面数据块的哈希值),对于那些已经不再经常访问的历史账本,也不能随意删除。
基于此,本说明书实施例提供一种基于压缩信息点的数据压缩方案,应用于以块链式账本存储数据的中心化的服务端中,如图2所示,图2为本说明书实施例所提供的一种块链式账本中的压缩方法的流程示意图,包括:
S201,获取关于所述块链式账本的压缩点信息。
压缩点信息是一个由服务方和用户双方共同认可的信任点,其中包含了指定数据块的标识信息、服务端数字签名和用户数字签名,用于表征该指定数据块之前的账本已经通过了完整性验证。
双方共同认可的方式即为,服务端的数字签名是经过了用户验证无误,用户数字签名也是经过了服务端验证无误。
指定数据块的标识信息可以是数据块的哈希值,也可以是数据块的块高。
此外,对于一个账本而言,服务端一般只需保存一个对应的压缩点信息。
压缩点信息可以在事先生成并保存在服务端本地。
在一种实施例中,压缩点信息可以是通过服务端所主动生成的,具体方式如下:
服务端获取指定数据块之前的部分账本,对所述部分账本进行完整性验证,在验证成功后,生成验证成功信息。在这种方式中,指定数据块可以是基于服务端的某种预 设条件得到,例如,服务端定期对账本的查询率进行监视,当发现某个数据块之前的账本调用率低于预设值时,将该数据块确定为一个压缩点,对压缩点之前的部分账本(即初始数据块到压缩点的所有数据块)执行完整性验证。又例如,服务端定期(例如,每个月)将创建时间超过一年,且距离当前时间最近的数据块确定为指定数据块。
服务端生成对于所述验证成功信息的服务端数字签名,发送所述包含所述服务端数字签名的验证成功信息至客户端,以便客户端进行用户数字签名。数字签名即为常规的私钥加密,客户端可以采用对应的公钥对加密数据进行解密验证,在验证通过后,客户端即对应的方式对所述验证成功信息进行用户数字签名,并返回服务端。
服务端接收客户端返回的对于所述验证成功信息的用户数字签名,并且对所述用户数字签名进行验证,验证通过即生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
在另一种实施例中,压缩点信息可以是基于用户要求所提出的,具体实施方式如下:
服务端接收用户的压缩点生成指令,所述压缩点生成指令中包含指定数据块的标识。在这种方式下,指定数据块可以基于用户需要用用户自行指定,指定数据块的标识同样可以是哈希值或者块高。
服务端获取指定数据块之前的部分账本,发送所述部分账本至客户端,以便客户端进行完整性验证,并在验证成功后进行用户数字签名。换言之,在这种方式下,验证也可以由客户端自行完成。
服务端接收客户端返回的对于所述部分账本的验证成功信息的用户数字签名;对于所述验证成功信息进行服务端数字签名,生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
S203,对所述指定数据块之前的账本进行数据压缩。
所述指定数据块之前的账本是指从初始数据块开始到指定数据块为止的所有数据块。一般而言,压缩的过程可以与压缩点信息的生成异步进行。
基于压缩点信息所包含的指定数据块的标识信息,可以确定出对应的数据块的块高,并且可以知道,该数据块之前的所有数据块已经通过了完整性验证。
一般而言,压缩的过程可以与压缩点信息的生成异步进行。具体而言,压缩的时 间段可以是服务端在后台空闲时进行压缩。例如,服务端在CPU和I/O持续维持在较低使用率一定时间后,并且预期短期内不会有存储峰值来临,判断后台空闲。或者,服务端基于历史统计,将每天的某个时间段设置为空闲时段(例如,每天的0点至5点),在空闲时段进行压缩。
在本说明书实施例中,由于被压缩的账本只是可能暂时不被调用,而在以后仍然有可能会被重新浏览,因此,本说明书实施例中,具体的压缩方式可以是无损压缩格式,即可完全恢复原始数据而不引起任何失真。在用户有需要对已经压缩的账本进行再次调用时,还可以随时回档。
通过本说明书实施例所提供的方案,预先创建关于账本中的压缩点信息,用于证明一个数据块之前的部分账本是已经通过了完整性验证,该部分账本已经不常使用,可以进行压缩,并且,该压缩点信息是得到了用户和服务端的共同认可的。从而,可以对于通过了完整性验证的部分账本进行压缩,减少整体账本的存储空间,降低服务端的存储成本。
在一种实施方式下,随着时间推移,用户可以对历史账本发起多次压缩。换言之,压缩点也会随着时间推移而单调递增。具体实现方式为,服务端本地预先保存一个压缩点信息,同时,在生成另一次压缩点信息后,对已经保存的压缩点信息和所述另一压缩点信息中的指定数据块的所分别对应的块高进行比较,保存大的块高所对应的压缩点信息,删除小的块高所对应的压缩点信息,从而保持压缩点信息中所对应的块高不断单调递增,避免重复压缩。如图3所示,图3为本说明书实施例所提供的压缩点信息的递增示意图。对于最新保存的压缩点信息而言,相对于被删除的压缩点信息,块高总是递增的,需要说明的是,由于一个账本的压缩点信息只会有一个,在该示意图中较小的压缩点实际上是曾经存在,但是已经被删除了。
对应的,本说明书实施例还提供一种块链式账本中的压缩装置,应用于以块链式账本存储数据的中心化的服务端中,如图4所示,图4是本说明书实施例提供的一种块链式账本中的压缩装置的结构示意图,包括:
获取模块401,获取关于所述块链式账本的压缩点信息,所述压缩点信息中包含指定数据块的标识信息、服务端数字签名和用户数字签名,用于表征该数据块之前的账本已经通过了完整性验证;
压缩模块403,对所述指定数据块之前的账本进行数据压缩。
进一步地,所述装置还包括第一信任点生成模块405,获取指定数据块之前的部分账本,对所述部分账本进行完整性验证,在验证成功后,生成验证成功信息;生成对于所述验证成功信息的服务端数字签名,发送所述包含所述服务端数字签名的验证成功信息至客户端,以便客户端进行用户数字签名;接收客户端返回的对于所述验证成功信息的用户数字签名;生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
进一步地,所述装置还包括第二信任点生成模块407,接收用户的压缩点生成指令,所述压缩点生成指令中包含指定数据块的标识;获取指定数据块之前的部分账本,发送所述部分账本至客户端,以便客户端进行完整性验证,并在验证成功后进行用户数字签名;接收客户端返回的对于所述部分账本的验证成功信息的用户数字签名;对于所述验证成功信息进行服务端数字签名,生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
进一步地,当生成另一压缩点信息时,所述装置还包括比较模块409,获取已经保存的压缩点信息和所述另一压缩点信息中的指定数据块的所分别对应的块高;比较两个块高的大小,保存较大的块高所对应的压缩点信息,删除较小的块高所对应的压缩点信息。
进一步地,所述装置还包括数据块生成模块411,接收待存储的数据记录,确定各数据记录的哈希值;当达到预设的成块条件时,确定待写入数据块中的各数据记录,生成包含数据块的哈希值和数据记录的第N个数据块,具体包括:
当N=1时,初始数据块的哈希值和块高基于预设方式给定;
当N>1时,根据待写入数据块中的各数据记录和第N-1个数据块的哈希值确定第N个数据块的哈希值,生成包含第N个数据块的哈希值、各数据记录和数据块的成块时间的第N个数据块,其中,数据块的块高基于成块时间的先后顺序单调递增。
本说明书实施例还提供一种计算机设备,其至少包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,处理器执行所述程序时实现图2所示的块链式账本中的压缩方法。
图5示出了本说明书实施例所提供的一种更为具体的计算设备硬件结构示意图,该设备可以包括:处理器1010、存储器1020、输入/输出接口1030、通信接口1040和总线1050。其中处理器1010、存储器1020、输入/输出接口1030和通信接口1040通过 总线1050实现彼此之间在设备内部的通信连接。
处理器1010可以采用通用的CPU(Central Processing Unit,中央处理器)、微处理器、应用专用集成电路(Application Specific Integrated Circuit,ASIC)、或者一个或多个集成电路等方式实现,用于执行相关程序,以实现本说明书实施例所提供的技术方案。
存储器1020可以采用ROM(Read Only Memory,只读存储器)、RAM(Random Access Memory,随机存取存储器)、静态存储设备,动态存储设备等形式实现。存储器1020可以存储操作***和其他应用程序,在通过软件或者固件来实现本说明书实施例所提供的技术方案时,相关的程序代码保存在存储器1020中,并由处理器1010来调用执行。
输入/输出接口1030用于连接输入/输出模块,以实现信息输入及输出。输入输出/模块可以作为组件配置在设备中(图中未示出),也可以外接于设备以提供相应功能。其中输入设备可以包括键盘、鼠标、触摸屏、麦克风、各类传感器等,输出设备可以包括显示器、扬声器、振动器、指示灯等。
通信接口1040用于连接通信模块(图中未示出),以实现本设备与其他设备的通信交互。其中通信模块可以通过有线方式(例如USB、网线等)实现通信,也可以通过无线方式(例如移动网络、WIFI、蓝牙等)实现通信。
总线1050包括一通路,在设备的各个组件(例如处理器1010、存储器1020、输入/输出接口1030和通信接口1040)之间传输信息。
需要说明的是,尽管上述设备仅示出了处理器1010、存储器1020、输入/输出接口1030、通信接口1040以及总线1050,但是在具体实施过程中,该设备还可以包括实现正常运行所必需的其他组件。此外,本领域的技术人员可以理解的是,上述设备中也可以仅包含实现本说明书实施例方案所必需的组件,而不必包含图中所示的全部组件。
本说明书实施例还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现图2所示的块链式账本中的压缩方法。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储 器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本说明书实施例可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本说明书实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本说明书实施例各个实施例或者实施例的某些部分所述的方法。
上述实施例阐明的***、方法、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于方法实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的方法实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,在实施本说明书实施例方案时可以把各模块的功能在同一个或多个软件和/或硬件中实现。也可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
以上所述仅是本说明书实施例的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本说明书实施例原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本说明书实施例的保护范围。

Claims (11)

  1. 一种块链式账本中的压缩方法,应用于以块链式账本存储数据的中心化的服务端中,包括:
    获取关于所述块链式账本的压缩点信息,所述压缩点信息中包含指定数据块的标识信息、服务端数字签名和用户数字签名,用于表征该数据块之前的账本已经通过了完整性验证;
    对所述指定数据块之前的账本进行数据压缩。
  2. 如权利要求1所述的方法,所述压缩点信息由如下方式预先生成:
    获取指定数据块之前的部分账本,对所述部分账本进行完整性验证,在验证成功后,生成验证成功信息;
    生成对于所述验证成功信息的服务端数字签名,发送所述包含所述服务端数字签名的验证成功信息至客户端,以便客户端进行用户数字签名;
    接收客户端返回的对于所述验证成功信息的用户数字签名;
    生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
  3. 如权利要求1所述的方法,所述压缩点信息由如下方式预先生成:
    接收用户的压缩点生成指令,所述压缩点生成指令中包含指定数据块的标识;
    获取指定数据块之前的部分账本,发送所述部分账本至客户端,以便客户端进行完整性验证,并在验证成功后进行用户数字签名;
    接收客户端返回的对于所述部分账本的验证成功信息的用户数字签名;
    对于所述验证成功信息进行服务端数字签名,生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
  4. 如权利要求2或者3所述的方法,当生成另一压缩点信息时,所述方法还包括:
    获取已经保存的压缩点信息和所述另一压缩点信息中的指定数据块的所分别对应的块高;
    比较两个块高的大小,保存大的块高所对应的压缩点信息,删除小的块高所对应的压缩点信息。
  5. 如权利要求1所述的方法,在中心化的数据库服务端,块链式账本中的数据块通过如下方式预先生成:
    接收待存储的数据记录,确定各数据记录的哈希值;
    当达到预设的成块条件时,确定待写入数据块中的各数据记录,生成包含数据块的 哈希值和数据记录的第N个数据块,具体包括:
    当N=1时,初始数据块的哈希值和块高基于预设方式给定;
    当N>1时,根据待写入数据块中的各数据记录和第N-1个数据块的哈希值确定第N个数据块的哈希值,生成包含第N个数据块的哈希值、各数据记录和数据块的成块时间的第N个数据块,其中,数据块的块高基于成块时间的先后顺序单调递增。
  6. 一种块链式账本中的压缩装置,应用于以块链式账本存储数据的中心化的服务端中,包括:
    获取模块,获取关于所述块链式账本的压缩点信息,所述压缩点信息中包含指定数据块的标识信息、服务端数字签名和用户数字签名,用于表征该数据块之前的账本已经通过了完整性验证;
    压缩模块,对所述指定数据块之前的账本进行数据压缩。
  7. 如权利要求6所述的装置,还包括第一信任点生成模块,获取指定数据块之前的部分账本,对所述部分账本进行完整性验证,在验证成功后,生成验证成功信息;生成对于所述验证成功信息的服务端数字签名,发送所述包含所述服务端数字签名的验证成功信息至客户端,以便客户端进行用户数字签名;接收客户端返回的对于所述验证成功信息的用户数字签名;生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
  8. 如权利要求6所述的装置,所述装置还包括第二信任点生成模块:接收用户的压缩点生成指令,所述压缩点生成指令中包含指定数据块的标识;获取指定数据块之前的部分账本,发送所述部分账本至客户端,以便客户端进行完整性验证,并在验证成功后进行用户数字签名;接收客户端返回的对于所述部分账本的验证成功信息的用户数字签名;对于所述验证成功信息进行服务端数字签名,生成包含所述指定数据块的标识信息、服务端数字签名和用户数字签名的压缩点信息,并保存。
  9. 如权利要求7或者8所述的装置,当生成另一压缩点信息时,所述装置还包括比较模块,获取已经保存的压缩点信息和所述另一压缩点信息中的指定数据块的所分别对应的块高;比较两个块高的大小,保存较大的块高所对应的压缩点信息,删除较小的块高所对应的压缩点信息。
  10. 如权利要求6所述的装置,所述装置还包括数据块生成模块,接收待存储的数据记录,确定各数据记录的哈希值;当达到预设的成块条件时,确定待写入数据块中的各数据记录,生成包含数据块的哈希值和数据记录的第N个数据块,具体包括:
    当N=1时,初始数据块的哈希值和块高基于预设方式给定;
    当N>1时,根据待写入数据块中的各数据记录和第N-1个数据块的哈希值确定第N个数据块的哈希值,生成包含第N个数据块的哈希值、各数据记录和数据块的成块时间的第N个数据块,其中,数据块的块高基于成块时间的先后顺序单调递增。
  11. 一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现如权利要求1至5任一项所述的方法。
PCT/CN2020/071464 2019-06-03 2020-01-10 一种针对块链式账本的压缩方法、装置及设备 WO2020244240A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US16/804,680 US10764062B2 (en) 2019-06-03 2020-02-28 Blockchain ledger compression
US16/944,111 US10958440B2 (en) 2019-06-03 2020-07-30 Blockchain ledger compression

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910476242.0 2019-06-03
CN201910476242.0A CN110362568B (zh) 2019-06-03 2019-06-03 一种针对块链式账本的压缩方法、装置及设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/804,680 Continuation US10764062B2 (en) 2019-06-03 2020-02-28 Blockchain ledger compression

Publications (1)

Publication Number Publication Date
WO2020244240A1 true WO2020244240A1 (zh) 2020-12-10

Family

ID=68215530

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/071464 WO2020244240A1 (zh) 2019-06-03 2020-01-10 一种针对块链式账本的压缩方法、装置及设备

Country Status (2)

Country Link
CN (1) CN110362568B (zh)
WO (1) WO2020244240A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110362568B (zh) * 2019-06-03 2020-07-24 阿里巴巴集团控股有限公司 一种针对块链式账本的压缩方法、装置及设备
US10764062B2 (en) 2019-06-03 2020-09-01 Alibaba Group Holding Limited Blockchain ledger compression
CN112235429B (zh) * 2020-12-17 2021-03-30 暗链科技(深圳)有限公司 一种中心记账式去中心化分布式数据处理方法及***

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107728941A (zh) * 2017-09-28 2018-02-23 中国银行股份有限公司 一种区块链数据压缩方法及***
CN108242021A (zh) * 2016-12-26 2018-07-03 航天信息股份有限公司 一种账务数据的处理***、方法及装置
CN108563796A (zh) * 2018-05-04 2018-09-21 蔷薇信息技术有限公司 区块链的数据压缩处理方法、装置及电子设备
CN108920573A (zh) * 2018-06-22 2018-11-30 北京奇艺世纪科技有限公司 一种数据缓存处理方法、装置及终端设备
CN109493043A (zh) * 2018-10-30 2019-03-19 广州品唯软件有限公司 交易记录区块化方法、装置、电子设备及存储介质
CN110362568A (zh) * 2019-06-03 2019-10-22 阿里巴巴集团控股有限公司 一种针对块链式账本的压缩方法、装置及设备

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183439A (zh) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 电子票据处理***及处理方法
CN101295387A (zh) * 2007-04-23 2008-10-29 北京数字证书认证中心有限公司 一种实现网上交易数据电文的方法
CN102291418A (zh) * 2011-09-23 2011-12-21 胡祥义 一种云计算安全架构的实现方法
CN102710605A (zh) * 2012-05-08 2012-10-03 重庆大学 一种云制造环境下的信息安全管控方法
CN103714022A (zh) * 2014-01-13 2014-04-09 浪潮(北京)电子信息产业有限公司 一种基于数据块的混合存储***
CN106251216B (zh) * 2016-07-18 2020-12-25 恒宝股份有限公司 一种用于缓解节点存储压力的方法和***
CN107181797B (zh) * 2017-05-11 2020-03-06 中国农业银行股份有限公司 一种区块链的区块压缩方法和***
CN109391645B (zh) * 2017-08-03 2020-09-11 ***通信有限公司研究院 区块链轻量化处理方法、区块链节点及存储介质
CN107819749A (zh) * 2017-10-26 2018-03-20 平安科技(深圳)有限公司 基于以太坊的区块链***和交易数据处理方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108242021A (zh) * 2016-12-26 2018-07-03 航天信息股份有限公司 一种账务数据的处理***、方法及装置
CN107728941A (zh) * 2017-09-28 2018-02-23 中国银行股份有限公司 一种区块链数据压缩方法及***
CN108563796A (zh) * 2018-05-04 2018-09-21 蔷薇信息技术有限公司 区块链的数据压缩处理方法、装置及电子设备
CN108920573A (zh) * 2018-06-22 2018-11-30 北京奇艺世纪科技有限公司 一种数据缓存处理方法、装置及终端设备
CN109493043A (zh) * 2018-10-30 2019-03-19 广州品唯软件有限公司 交易记录区块化方法、装置、电子设备及存储介质
CN110362568A (zh) * 2019-06-03 2019-10-22 阿里巴巴集团控股有限公司 一种针对块链式账本的压缩方法、装置及设备

Also Published As

Publication number Publication date
CN110362568B (zh) 2020-07-24
CN110362568A (zh) 2019-10-22

Similar Documents

Publication Publication Date Title
WO2020244240A1 (zh) 一种针对块链式账本的压缩方法、装置及设备
CN110162662B (zh) 一种块链式账本中数据记录的验证方法、装置及设备
WO2020211496A1 (zh) 一种块链式账本中的签名验证方法、***、装置及设备
US10764062B2 (en) Blockchain ledger compression
CN113726751B (zh) 一种块链式账本中的权重管理方法、装置及设备
US11057220B2 (en) Signature verification for a blockchain ledger
WO2020199711A1 (zh) 数据存储方法、***、装置及设备
CN112487492B (zh) 数据验证方法、***及设备
WO2021073240A1 (zh) 一种块链式账本中的数据存储方法、装置及设备
CN110190963B (zh) 一种针对授时证书生成请求的监控方法、装置及设备
US10911251B2 (en) Blockchain ledger authentication
US11005648B2 (en) Blockchain-type data storage
US11126751B2 (en) Index creation for data records
WO2021000578A1 (zh) 一种块链式账本中的用户创建方法、装置及设备
WO2020211493A1 (zh) 一种块链式账本中的数据验证方法、***、装置及设备
WO2020253231A1 (zh) 一种基于收据的数据存储方法、装置及设备
WO2020244236A1 (zh) 一种块链式账本的授时认证方法、装置及设备
WO2021057127A1 (zh) 一种基于多条业务属性的数据存储方法、装置及设备
WO2021027252A1 (zh) 块链式账本中的数据存储方法、装置及设备
US10979233B2 (en) Monitoring time certificate generation requests
CN110636042B (zh) 一种服务端已验证块高的更新方法、装置及设备
CN110717172B (zh) 一种块链式账本中的权限移交方法、装置及设备
US20200177390A1 (en) Providing data verification in a blockchain ledger
CN112380573B (zh) 一种块链式账本中的数字签名方法、装置及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20817933

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20817933

Country of ref document: EP

Kind code of ref document: A1