WO2022134473A1 - 区块节点数据的授权处理方法、装置、设备及存储介质 - Google Patents

区块节点数据的授权处理方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2022134473A1
WO2022134473A1 PCT/CN2021/097327 CN2021097327W WO2022134473A1 WO 2022134473 A1 WO2022134473 A1 WO 2022134473A1 CN 2021097327 W CN2021097327 W CN 2021097327W WO 2022134473 A1 WO2022134473 A1 WO 2022134473A1
Authority
WO
WIPO (PCT)
Prior art keywords
block
node
block node
information
data
Prior art date
Application number
PCT/CN2021/097327
Other languages
English (en)
French (fr)
Inventor
王强
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2022134473A1 publication Critical patent/WO2022134473A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present application relates to the technical field of block storage, and in particular, to a method, apparatus, device and storage medium for authorization processing of block node data.
  • the current blockchain technology can allow other block nodes on the blockchain to view the data stored on the current block node, that is, data can be shared among each block node.
  • the inventor found that since any block on the same blockchain can view and download data stored in other blocks at will, this may cause the data stored in a node to be stolen, resulting in data leakage.
  • an embodiment of the present application provides a method for authorization processing of block node data, the method comprising:
  • verifying whether the first block node is capable of processing the second block node according to the preset condition and the first node information of the first block node The authority block node of the block data authority; if it is verified that the first block node is the authority block node according to the preset conditions and the first node information, the first block node is authorized Have the authority to process the block data; otherwise, refuse to authorize the first block node to process the block data.
  • an embodiment of the present application provides an apparatus for authorizing processing of block node data, the apparatus comprising:
  • a receiving unit configured to receive a request from the first block node to the second block node for authorization to process the block data stored on the second block node, where the request carries the first block The first node information of the node;
  • an acquisition unit for acquiring preset conditions for authorizing the processing of the block data stored on the second block node
  • a verification unit configured to respond to the request of the receiving unit, according to the preset condition obtained by the obtaining unit and the description of the first block node carried in the request of the receiving unit
  • the first node information verifies whether the first block node is an authority block node that has the authority to process the block data on the second block node;
  • an authorization unit configured to authorize the first block node to process if the verification unit verifies that the first block node is the authority block node according to the preset condition and the first node information the block data; otherwise, refuse to authorize the first block node to process the block data.
  • an embodiment of the present application provides a computer device, including a memory and a processor, where computer-readable instructions are stored in the memory, and when the computer-readable instructions are executed by the processor, the processor causes the processor to Perform the above method steps.
  • an embodiment of the present application provides a storage medium storing computer-readable instructions.
  • the computer-readable instructions are executed by one or more processors, the one or more processors perform the above method steps.
  • a preset condition for authorizing processing of block data stored on the second block node is obtained; in response to the request, the first block node is verified according to the preset condition and the first node information of the first block node.
  • a block node is an authority block node that has the authority to process the block data on the second block node;
  • the first block node has the authority to process the block data; otherwise, it refuses to authorize the first block node to process the block data. Therefore, by adopting the embodiment of the present application, since a preset condition for authorizing the processing of block data on any block node is configured, the current block node only has the block data processing authority if it meets the preset condition, thereby Improve the data security of the entire blockchain.
  • Fig. 1 is the implementation environment diagram of a kind of authorization processing method of block node data provided in one embodiment
  • FIG. 2 is a block diagram of the internal structure of a computer device in one embodiment
  • FIG. 3 is a schematic flowchart of a method for authorizing block node data provided by an embodiment of the present disclosure
  • FIG. 4 is a schematic structural diagram of an apparatus for authorizing processing of block node data according to an embodiment of the present disclosure.
  • FIG. 1 is an implementation environment diagram of an authorization processing method for block node data provided in an embodiment. As shown in FIG. 1 , the implementation environment includes a computer device 110 and a terminal 120 .
  • the terminal 120 and the computer device 110 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., but are not limited thereto.
  • the computer device 110 and the terminal 110 can be connected through Bluetooth, USB (Universal Serial Bus, Universal Serial Bus) or other communication connection methods, which are not limited in this application.
  • FIG. 2 is a schematic diagram of the internal structure of a computer device in one embodiment.
  • the computer device includes a processor, a non-volatile storage medium, a memory, and a network interface connected through a system bus.
  • the non-volatile storage medium of the computer device stores an operating system, a database and computer-readable instructions
  • the database may store a sequence of control information.
  • the processor can realize a An authorization processing method for block node data.
  • the processor of the computer device is used to provide computing and control capabilities and support the operation of the entire computer device.
  • Computer-readable instructions may be stored in the memory of the computer device, and when executed by the processor, the computer-readable instructions may cause the processor to execute a method for authorizing block node data.
  • the network interface of the computer equipment is used for communication with the terminal connection.
  • an embodiment of the present disclosure provides an authorization processing method for block node data.
  • the authorization processing method for block node data is applied to the server side, and specifically includes the following method steps:
  • S302 Receive a request from the first block node to the second block node for authorization to process the block data stored on the second block node, and the request carries the first node information of the first block node;
  • the first node information of the first block node includes at least one of the following items: first version number information of the first block node, first IP address information of the first block node, first area The first business scenario information of the block node, the first time validity period information of the first block node, and the first transaction information of the first block node associated with the transaction.
  • the first node information of the first block node may also include other contents, which will not be repeated here.
  • the first block node may be a block node adjacent to the second block node, or may be a block node separated from the second block node by a preset distance.
  • the preset distance is not limited.
  • the first block node and the second block node are often block nodes in the same blockchain.
  • the first block node When the first block node connects to the second block node for the first time, it will be required to determine the status according to the handshake protocol, and after the handshake, it will start to request the peer node's address data and block data.
  • the P2P network protocol is adopted between each block node.
  • the P2P network protocol is the underlying module in all blockchains, responsible for network transmission and broadcast of transaction data, node discovery and maintenance.
  • the P2P interaction protocol used for communication between each block node of the blockchain has its own set of instructions.
  • the instructions are reflected in the command field of the message header. These commands provide the upper layer with node discovery, node acquisition, and block header acquisition. and various functions of block acquisition.
  • a distributed probe route analysis method is used to analyze the block data stored on the second block node.
  • the request may be a request to view the block data stored on the second block node, or the request may also be a request to view and download the block data stored on the second block node ask.
  • the algorithm involved in the process of analyzing the block data stored on the second block node using the distributed probe route analysis method is a classic distributed consensus algorithm, which includes the Raft algorithm and the Paxos algorithm.
  • the Raft algorithm is a strong leader-type consensus algorithm, which cannot resist attacks by nodes maliciously tampering with data.
  • the Paxos algorithm is more complex and can provide consensus algorithms suitable for different occasions.
  • consensus algorithms with Byzantine fault tolerance such as PBFT (Practical Byzantine Fault Tolerance).
  • PBFT is a state mechanism that requires all nodes to jointly maintain a state and take consistent actions.
  • PBFT is suitable for occasions with high performance requirements such as consortium chains.
  • the Fabric framework in the Hyperledger project uses a modified version of PBET by default.
  • the method for data transmission between each block node in the same block chain adopts the flooding algorithm.
  • the mechanism of the algorithm is: the transaction is generated from a certain block node, and then broadcast to the adjacent area. block nodes, and then further propagate from adjacent block nodes until it propagates to each block node in the entire blockchain.
  • the authorization processing method provided by the embodiment of the present application further includes: discovering the block node .
  • Block node discovery is the first step for any block node to access the blockchain P2P network.
  • the discovery of block nodes can be divided into the discovery of initial block nodes and the discovery of block nodes after startup.
  • the discovery of initial block nodes can be realized in two ways: the first way is DNS seed, also known as DNS seed node.
  • DNS is a centralized domain name query service. Use the nc command to try to connect to the port of a host under the domain name. After the connection is successful, you can get the running structure.
  • the second implementation is to hard-code some addresses in the code, which are hard-coded seed nodes. When all DNS seed nodes fail, full nodes will try to connect to hardcoded seed nodes.
  • the method for authorizing the block node data provided by the embodiment of the present application further includes the following steps: starting the discovery of the block node.
  • a block node can send the list of peer block nodes maintained by itself to neighboring block nodes. Therefore, after the initial block node is discovered, the current block node needs to request a list from the initial block node, that is, copy the block node list of the initial block node to the current block node.
  • the process of data access and transmission between the first block node and the second block node will involve the block node interaction protocol. Once the block nodes are connected, the interaction between the block nodes will follow some specific commands. These commands are often written in the header of the message, and the message content is written in the message body. Commands include request commands and data interaction commands. After the block node connection is completed, the first thing to do is the handshake operation. In this operation, provide some brief information, such as swap the version numbers first, to see if it is compatible.
  • Commands are generally divided into control commands and data transmission commands.
  • the getaddr command in the blockchain network is used to obtain the list of available block nodes of the other party, and the inv command provides data transmission.
  • the message body will contain a data vector.
  • the method for authorization processing of block node data further includes the following steps: synchronizing blocks between the first block node and the second block node.
  • synchronize blocks There are two ways to synchronize blocks, one is: HeaderFirst, this method will synchronize the block header first, and then obtain the block body from other block nodes after the synchronization is completed. In this way, it can not only achieve a good interaction process, but also Reduce the burden on the network; the other is: BlockFirst, this method requires that the blocks obtained from other block nodes must be complete.
  • S304 Obtain a preset condition for authorizing processing of the block data stored on the second block node; in the embodiment of the present application, the preset condition includes at least one of the following: a second version number of the block data authorized to process information, second IP address information authorized to process block data, second business scenario information authorized to process block data, second time-limited information authorized to process block data, and transaction-related information authorized to process block data Second transaction information.
  • S306 In response to the request, verify, according to the preset conditions and the first node information of the first block node, whether the first block node is an authority block node that has the authority to process the block data on the second block node; If the preset conditions and the first node information verify that the first block node is an authority block node, the first block node is authorized to have the authority to process the block data; otherwise, the authorization of the first block node to process the block data is refused. .
  • verifying whether the first block node is an authority block node that has the authority to process block data on the second block node according to the preset conditions and the first node information of the first block node includes the following: step:
  • the preset conditions are: the first version number information and the second version number information, and the first IP address information. Verification is only possible when the second IP address information, the first business scenario information and the second business scenario information, the first time validity period information and the second time validity period information, and the first transaction information and the second transaction information are all consistent.
  • the first block node is an authority block node, so that the data security level of the blockchain where the second block node is located can be guaranteed to be high, and the data security of the blockchain can be effectively improved.
  • the authority block node is a block node that is in the same blockchain as the second block node and can process the block data stored on the second block node.
  • the specific processing process Including: only being able to view the block data stored on the second block node, or, not only being able to view the block data stored on the second block node, but also being able to download the block stored on the second block node data.
  • different preset conditions can be configured according to different requirements for blockchain data security in different application scenarios.
  • the first version number information and the second version number information, the first IP address information and the second IP address information, the first business scenario information and the Any one of the second business scenario information, the first-time validity period information and the second-time validity period information, and the first transaction information and the second transaction information only needs to be consistent.
  • the conditions are not specifically limited.
  • authorizing the first block node to process the block data includes the following steps: authorizing the first block node to use a distributed cloud storage server to process the block data.
  • a distributed cloud storage server in order to solve the problem of consistency, termination and validity in a distributed system, a distributed cloud storage server is introduced.
  • consistency means that in a distributed system, any block node can be recognized by all other block nodes under the agreed protocol.
  • recognition means that the information presented by all block nodes to the outside world is consistent.
  • Terminability is giving consistent results in a finite amount of time.
  • Legality means that the request from the first block node to the second block node to authorize processing of the block data stored on the second block node must be made by a block node in the same blockchain.
  • the first block node is an authority block node with a first authority
  • authorizing the first block node to use a distributed cloud storage server to process block data includes the following steps: authorizing the first block node to use The distributed cloud storage server queries block data.
  • the first authority is a query authority that only has the query authority to query the block data stored on the second block node. Only when it is verified that the first block node has the first authority to query data, the user associated with the first block node is authorized to view the block data stored on the second block node.
  • the first block node is an authority block node with a second authority, and the second authority is higher than the first authority, and authorizing the first block node to use a distributed cloud storage server to process block data further includes: The following steps: authorize the first block node to use the distributed cloud storage server to query and download block data.
  • the second authority is a query and download authority for querying and downloading block data stored on the second block node. Only when it is verified that the first block node has the second authority to query and download data, the user associated with the second block node is authorized to view and download the block data stored on the second block node.
  • the block data stored on the second block node is queried, and the queried block data is sent to the first area block node, so that the user associated with the first block node can view and download and store the block data on the second block node.
  • a preset condition for authorizing processing of the block data stored on the second block node is obtained; in response to the request, the first block node is verified according to the preset condition and the first node information of the first block node.
  • a block node is an authority block node that has the authority to process the block data on the second block node;
  • the first block node has the authority to process the block data; otherwise, it refuses to authorize the first block node to process the block data. Therefore, by adopting the embodiment of the present application, since a preset condition for authorizing the processing of block data on any block node is configured, the current block node only has the block data processing authority if it meets the preset condition, thereby Improve the data security of the entire blockchain.
  • the following is an embodiment of an authorization processing apparatus for block node data of the present application, which can be used to execute an embodiment of an authorization processing method for block node data of the present application.
  • an authorization processing apparatus for block node data of the present application please refer to the embodiments of the authorization processing method for block node data of the present application.
  • FIG. 4 shows a schematic structural diagram of an apparatus for authorizing processing of block node data provided by an exemplary embodiment of the present application.
  • the authorization processing device for the block node data can be implemented as all or a part of the terminal through software, hardware or a combination of the two.
  • the authorization processing apparatus for block node data includes a receiving unit 402 , an obtaining unit 404 , a verification unit 406 and an authorization unit 408 .
  • the receiving unit 402 is configured to receive a request from the first block node to the second block node for authorization to process the block data stored on the second block node, where the request carries the first block node The first node information of ;
  • an obtaining unit 404 configured to obtain a preset condition for authorizing the processing of the block data stored on the second block node
  • the verification unit 406 is configured to, in response to the request of the receiving unit 402, verify whether the first block node is a preset condition obtained by the obtaining unit 404 and the first node information of the first block node carried in the request of the receiving unit 402. Authority block nodes that have the authority to process block data on the second block node;
  • the authorization unit 408 is configured to authorize the first block node to process the block data if the verification unit 406 verifies that the first block node is an authority block node according to the preset conditions and the first node information; otherwise, refuse to authorize the first block node A block node processes block data.
  • the first node information of the first block node includes at least one of the following items: first version number information of the first block node, first IP address information of the first block node, and first block node information.
  • the preset conditions include at least one of the following: the second version number information authorized to process the block data, the second IP address information authorized to process the block data, the second business scenario information authorized to process the block data, the authorization The second time limit information for processing the block data and the second transaction information associated with the transaction authorizing the processing of the block data.
  • the verification unit 406 is specifically configured to: in the first version number information and the second version number information, the first IP address information and the second IP address information, the first service scenario information and the second service scenario information, the first When the time validity period information and the second time validity period information, and the first transaction information and the second transaction information are consistent, it is verified that the first block node is a permission block node.
  • the authorizing unit 408 is configured to: authorize the first block node to process the block data by using a distributed cloud storage server.
  • the first block node is an authority block node with a first authority
  • the authorizing unit 408 is specifically configured to: authorize the first block node to use a distributed cloud storage server to query block data.
  • the first block node is an authority block node with a second authority, and the second authority is higher than the first authority, and the authorization unit 408 is further specifically configured to: authorize the first block node to query by using a distributed cloud storage server. and download block data.
  • the authorization processing apparatus for block node data provided by the above-mentioned embodiment executes the authorization processing method for block node data
  • only the division of the above-mentioned functional modules is used as an example.
  • the above-mentioned function distribution is completed by different function modules, that is, the internal structure of the device is divided into different function modules, so as to complete all or part of the functions described above.
  • the authorization processing device for block node data provided in the above-mentioned embodiments and the embodiment of the authorization processing method for block node data belong to the same concept, and the embodiment of the implementation process is detailed in the embodiment of the authorization processing method for block node data, which is not repeated here. Repeat.
  • the obtaining unit is configured to obtain preset conditions for authorizing processing of the block data stored on the second block node;
  • the verification unit is configured to respond to the request, according to the preset conditions obtained by the obtaining unit and
  • the first node information of the first block node carried in the request received by the receiving unit verifies whether the first block node is an authority block node that has the authority to process the block data on the second block node;
  • the conditions and the first node information verify that the first block node is an authority block node, then the authorization unit is used to authorize the first block node to have the authority to process the block data; otherwise, the authorization unit is used to refuse to authorize the first area Block nodes process block data.
  • the current block node since a preset condition for authorizing the processing of block data on any block node is configured, the current block node only has the block data processing authority if it meets the preset condition, thereby Improve the data security of the entire blockchain.
  • a computer device in one embodiment, includes a memory, a processor, and a computer program stored on the memory and executable on the processor.
  • the processor executes the computer program, the processor implements the following steps: receiving a first region A request from the block node to the second block node to authorize processing of the block data stored on the second block node, and the request carries the first node information of the first block node; The preset conditions of the block data on the second block node; in response to the request, verify whether the first block node has the ability to process the second block node according to the preset conditions and the first node information of the first block node.
  • the authority block node of the block data authority if it is verified that the first block node is the authority block node according to the preset conditions and the first node information, the first block node is authorized to process the block data; otherwise, the authorization is rejected
  • the first block node processes block data.
  • a storage medium stores computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of: receiving a first region A request from the block node to the second block node to authorize processing of the block data stored on the second block node, and the request carries the first node information of the first block node; The preset conditions of the block data on the second block node; in response to the request, verify whether the first block node has the ability to process the second block node according to the preset conditions and the first node information of the first block node.
  • the authority block node of the block data authority if it is verified that the first block node is the authority block node according to the preset conditions and the first node information, the first block node is authorized to process the block data; otherwise, the authorization is rejected
  • the first block node processes block data.
  • the computer-readable storage medium may be non-volatile or volatile.
  • the realization of all or part of the processes in the methods of the above embodiments can be accomplished by instructing relevant hardware through a computer program, and the computer program can be stored in a computer-readable storage medium, and the program is During execution, it may include the processes of the embodiments of the above-mentioned methods.
  • the aforementioned storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), or a random access memory (Random Access Memory, RAM) or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本申请公开了一种区块节点数据的授权处理方法、装置、计算机设备和存储介质。所述方法包括:获取用于授权处理存储于第二区块节点上的区块数据的预设条件;响应于请求,根据预设条件和第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;若根据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权第一区块节点具有处理区块数据的权限;否则,则拒绝授权第一区块节点处理区块数据。因此,采用本申请实施例,由于配置了用于授权处理任意一个区块节点上的区块数据的预设条件,当前区块节点只有符合该预设条件,才具有区块数据处理权限,从而提高了整个区块链的数据安全。

Description

区块节点数据的授权处理方法、装置、设备及存储介质
本申请要求于2020年12月22日提交国家知识产权局、申请号为202011529928.0,发明名称为“区块节点数据的授权处理方法、装置和计算机设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及区块存储技术领域,特别涉及区块节点数据的授权处理方法、装置、设备及存储介质。
背景技术
目前的区块链技术,能够允许处于该区块链上的其余区块节点查看存储于当前区块节点上的数据,即:各个区块节点之间能够共享数据。发明人发现,由于处于同一区块链上的任意一个区块可以随意查看和下载存储其它区块上的数据,这样,可能造成存储于某一节点中的数据被窃取,从而造成数据泄露。
针对现有处于同一区块链上的各个区块之间能够共享数据,随意查询和下载的问题,如何提高区块链数据的安全性,是待解决的技术问题。
发明内容
基于此,有必要针对现有区块链数据的安全性所存在的问题,提供一种区块节点数据的授权处理方法、装置、计算机设备和存储介质。
第一方面,本申请实施例提供了一种区块节点数据的授权处理方法,所述方法包括:
接收第一区块节点向第二区块节点发出的授权处理存储于所述第二区块节点上的区块数据的请求,所述请求中携带有所述第一区块节点的第一节点信息;
获取用于授权处理存储于所述第二区块节点上的所述区块数据的预设条件;
响应于所述请求,根据所述预设条件和所述第一区块节点的所述第一节点信息验证所述第一区块节点是否为具有处理所述第二区块节点上的所述区块数据权限的权限区块节点;若根据所述预设条件和所述第一节点信息验证出所述第一区块节点为所述权限区块节点,则授权所述第一区块节点具有处理所述区块数据的权限;否则,则拒绝授权所述第一区块节点处理所述区块数据。
第二方面,本申请实施例提供了一种区块节点数据的授权处理装置,所述装置包括:
接收单元,用于接收第一区块节点向第二区块节点发出的授权处理存储于所述第二区块节点上的区块数据的请求,所述请求中携带有所述第一区块节点的第一节点信息;
获取单元,用于获取用于授权处理存储于所述第二区块节点上的所述区块数据的预设条件;
验证单元,用于响应于所述接收单元的所述请求,根据所述获取单元获取的所述预设条件和所述接收单元的所述请求中携带的所述第一区块节点的所述第一节点信息验证所述第一区块节点是否为具有处理所述第二区块节点上的所述区块数据权限的权限区块节点;
授权单元,用于若所述验证单元根据所述预设条件和所述第一节点信息验证出所述第一区块节点为所述权限区块节点,则授权所述第一区块节点处理所述区块数据;否则,则拒绝授权所述第一区块节点处理所述区块数据。
第三方面,本申请实施例提供一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行上述的方法步骤。
第四方面,本申请实施例提供一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行上述的方法步骤。
本申请实施例提供的技术方案可以包括以下有益效果:
在本申请实施例中,获取用于授权处理存储于第二区块节点上的区块数据的预设条件;响应于请求,根据预设条件和第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;若根据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权第一区块节点具有处理区块数据的权限;否则,则拒绝授权第一区块节点处理区块数据。因此,采用本申请实施例,由于配置了用于授权处理任意一个区块节点上的区块数据的预设条件,当前区块节点只有符合该预设条件,才具有区块数据处理权限,从而提高了整个区块链的数据安全。应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本申请的实施例,并与说明书一起用于解释本申请的原理。
图1为一个实施例中提供的一种区块节点数据的授权处理方法的实施环境图;
图2为一个实施例中计算机设备的内部结构框图;
图3是本公开实施例提供的一种区块节点数据的授权处理方法的流程示意图;
图4是本公开实施例提供的一种区块节点数据的授权处理装置的结构示意图。
具体实施方式
以下描述和附图充分地示出本申请的具体实施方案,以使本领域的技术人员能够实践它们。
应当明确,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。
下面结合附图详细说明本公开的可选实施例。
图1为一个实施例中提供的一种区块节点数据的授权处理方法的实施环境图,如图1所示,在该实施环境中,包括计算机设备110以及终端120。
需要说明的是,终端120以及计算机设备110可为智能手机、平板电脑、笔记本电脑、台式计算机等,但并不局限于此。计算机设备110以及终端110可以通过蓝牙、USB(Universal Serial Bus,通用串行总线)或者其他通讯连接方式进行连接,本申请在此不做限制。
图2为一个实施例中计算机设备的内部结构示意图。如图2所示,该计算机设备包括通过***总线连接的处理器、非易失性存储介质、存储器和网络接口。其中,该计算机设备的非易失性存储介质存储有操作***、数据库和计算机可读 指令,数据库中可存储有控件信息序列,该计算机可读指令被处理器执行时,可使得处理器实现一种区块节点数据的授权处理方法。该计算机设备的处理器用于提供计算和控制能力,支撑整个计算机设备的运行。该计算机设备的存储器中可存储有计算机可读指令,该计算机可读指令被处理器执行时,可使得处理器执行一种区块节点数据的授权处理方法。该计算机设备的网络接口用于与终端连接通信。本领域技术人员可以理解,图2中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
如图3所示,本公开实施例提供一种区块节点数据的授权处理方法,该区块节点数据的授权处理方法应用于服务器端,具体包括以下方法步骤:
S302:接收第一区块节点向第二区块节点发出的授权处理存储于第二区块节点上的区块数据的请求,请求中携带有第一区块节点的第一节点信息;
在本申请实施例中,第一区块节点的第一节点信息至少包括以下一项:第一区块节点的第一版本号信息、第一区块节点的第一IP地址信息、第一区块节点的第一业务场景信息、第一区块节点的第一时间有效期信息和第一区块节点的与交易相关联的第一交易信息。
上述罗列了常见的第一区块节点的第一节点信息,在不同的应用场景中,第一区块节点的第一节点信息还可以包括其它内容,在此不再赘述。
在本申请实施例中,第一区块节点可以为与第二区块节点相邻的区块节点,也可以为与第二区块节点间隔预设距离的区块节点,在此,对间隔的预设距离并不做具体限制。此外,第一区块节点和第二区块节点往往为处于同一区块链中的区块节点。
在第一区块节点初次连接到第二区块节点时,会被要求按照握手协议来确定状态,在握手之后开始请求peer节点的地址数据及区块数据。
在各个区块节点之间采用了P2P网络协议,P2P网络协议是所有区块链中的底层模块,负责交易数据的网络传输和广播、节点发现和维护。
在区块链的各个区块节点之间进行通信所采用的P2P交互协议具有自己的指令集合,指令体现在消息头的命令域中,这些命令为上层提供了节点发现、节点获取、区块头获取和区块获取的各项功能。
在一种可能的实现方式中,响应于上述步骤接收到的请求,采用分布式探查路由分析方法分析存储于第二区块节点上的区块数据。
在本申请实施例中,该请求可以为查看存储于第二区块节点上的区块数据的请求,或者,该请求也可以为查看并下载存储于第二区块节点上的区块数据的请求。
采用的分布式探查路由分析方法分析存储于第二区块节点上的区块数据的过程涉及到的算法为经典的分布式一致性算法,该算法包括Raft算法、Paxos算法。Raft算法是一种强Leader型的一致性算法,它无法抵御节点恶意篡改数据的攻击。Paxos算法较复杂,能够提供适用于不同场合的一致性算法。除此之外,还包括具有拜占庭容错的一致性算法,例如,PBFT(Practical Byzantine Fault Tolerance,实用拜占庭容错算法)。PBFT是一种状态机制,要求所有节点共同维护一个状态,并采取一致的行动。PBFT适用于联盟链等对性能具有较高要求的场合,超级账本项目中的Fabric框架默认采用的就是PBET的修改版本。
在本申请实施例中,处于同一区块链中的各个区块节点之间进行数据传输的 方法采用泛洪算法,该算法的机制为:交易从某个区块节点产生,接着广播到临近区块节点,再从临近区块节点进行进一步地传播,直至传播至整个区块链中的各个区块节点。
在一种可能的实现方式中,在采用分布式探查路由分析方法分析存储于第二区块节点上的区块数据之前,本申请实施例提供的授权处理方法还包括:进行区块节点的发现。区块节点发现是任意一个区块节点接入区块链P2P网络的第一步。区块节点的发现可分为初始区块节点的发现和启动后区块节点的发现。
初始区块节点的发现:初始区块节点发现一共可以由两种方式实现:第一种实现方式为DNS seed,又称DNS种子节点。DNS是中心化域名查询服务。通过nc命令尝试连接域名下某个主机的端口,在连接成功,可以得到运行结构。第二种实现方式是代码中硬编码的一些地址,这些地址为硬编码种子节点。当DNS种子节点全部失效时,全节点会尝试连接硬编码种子节点。
在本申请实施例中,在初始区块节点发现之后,本申请实施例提供的区块节点数据的授权处理方法还包括以下步骤:启动后区块节点的发现。
在区块链网络中,一个区块节点可以将自己维护的对等区块节点列表发送给临近区块节点。因此,在初始区块节点发现之后,当前区块节点需要向初始区块节点索要列表,即:将初始区块节点的区块节点列表复制给当前区块节点。
在每次需要发送协议消息的时候,会花费固定的时间尝试和已存的区块节点列表中的区块节点建立连接,只要在任何一个区块节点在超时之前可以连接上,就不用通过DNS种子区块节点获取地址。
在本申请实施例中,第一区块节点和第二区块节点之间进行数据访问和传输的过程,会涉及到区块节点交互协议。一旦区块节点建立连接,区块节点之间的交互便会遵循一些特定的命令,这些命令往往写在消息的头部,消息体中写的则是消息内容。命令包括请求命令和数据交互命令。区块节点连接完成后,要做的第一件事情是握手操作。在该操作中,提供一些简要信息,比如,先交换一下版本号,看看是否兼容。
握手完毕之后,无论交互什么信息,都是需要保持长连接状态。为了保持区块节点之间保持长连接的心跳,在区块链上有PING/PONG这两种类型的消息。
命令一般分为控制命令和数据传输命令两种,比如区块链网络中的getaddr命令用于获取对方的可用区块节点列表,inv命令则提供了数据传输。消息体中会包含一个数据向量。
在一种可能的实现方式中,本申请实施例提供的区块节点数据的授权处理方法还包括以下步骤:在第一区块节点和第二区块节点之间进行同步区块。同步区块的方式包括两种,一种为:HeaderFirst,这种方式会先同步区块头,同步完成后再从其它区块节点获得区块体,这样,不仅能够实现好的交互过程,还能够减轻网络负担;另外一种为:BlockFirst,这种方式要求从其他区块节点获取的区块必须是完整的。
S304:获取用于授权处理存储于第二区块节点上的区块数据的预设条件;在本申请实施例中,预设条件至少包括以下一项:授权处理区块数据的第二版本号信息、授权处理区块数据的第二IP地址信息、授权处理区块数据的第二业务场景信息、授权处理区块数据的第二时间有限期信息和授权处理区块数据的与交易相关联的第二交易信息。
S306:响应于请求,根据预设条件和第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;若根 据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权第一区块节点具有处理区块数据的权限;否则,则拒绝授权第一区块节点处理区块数据。
在本申请实施例中,根据预设条件和第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点包括以下步骤:
在第一版本号信息和第二版本号信息、第一IP地址信息和第二IP地址信息、第一业务场景信息和第二业务场景信息、第一时间有效期信息和第二时间有效期信息、以及第一交易信息和第二交易信息均一致的情况下,验证第一区块节点为权限区块节点。
上述罗列了一种应用场景下验证第一区块节点是否为权限区块节点过程。由于在上述验证过程中,验证第一区块节点为权限区块节点所采用的预设条件比较多,预设条件为:在第一版本号信息和第二版本号信息、第一IP地址信息和第二IP地址信息、第一业务场景信息和第二业务场景信息、第一时间有效期信息和第二时间有效期信息、以及第一交易信息和第二交易信息均一致的情况下,才能够验证第一区块节点为权限区块节点,这样,能够保证第二区块节点所处的区块链的数据安全级别高,有效地提高了区块链的数据安全性。
在本申请实施例中,权限区块节点为与第二区块节点处于同一区块链中、且能够对存储于第二区块节点上的区块数据进行处理的区块节点,具体处理过程包括:仅能够查看存储于第二区块节点上的区块数据,或者,不仅能够查看存储于第二区块节点上的区块数据,还能够下载存储于第二区块节点上的区块数据。
在不同的应用场景中,可以根据不同应用场景下对区块链数据安全性的不同要求,配置不同的预设条件。
具体地,在对区块链数据安全性要求不高的应用场景,只需第一版本号信息和第二版本号信息、第一IP地址信息和第二IP地址信息、第一业务场景信息和第二业务场景信息、第一时间有效期信息和第二时间有效期信息、以及第一交易信息和第二交易信息中的任意一项一致即可,在此,对不同应用场景所需配置的预设条件不做具体限制。
在一种可能的实现方式中,授权第一区块节点处理区块数据包括以下步骤:授权第一区块节点采用分布式云存储服务器处理区块数据。
在本申请实施例中,为了解决在分布式***中的一致性问题、可终止性问题和合法性问题,引入了分布式云存储服务器。其中,一致性是指,在分布式***中,任意区块节点能够在约定的协议下被其他所有区块节点所认可。其中,认可是指所有区块节点对外呈现的信息一致。可终止性为在有限的时间内给出一致性结果。合法性是指第一区块节点向第二区块节点发出的授权处理存储于第二区块节点上的区块数据的请求须是处于同一区块链内的区块节点提出的。
在本申请实施例中,第一区块节点为具有第一权限的权限区块节点,授权第一区块节点采用分布式云存储服务器处理区块数据包括以下步骤:授权第一区块节点采用分布式云存储服务器查询区块数据。
在本申请实施例中,第一权限为仅具有查询存储于第二区块节点上的区块数据的查询权限。只有在验证出第一区块节点具有查询数据的第一权限时,才授权与第一区块节点关联的用户查看存储于第二区块节点上的区块数据。
在本申请实施例中,第一区块节点为具有第二权限的权限区块节点,第二权限高于第一权限,授权第一区块节点采用分布式云存储服务器处理区块数据还包括以下步骤:授权第一区块节点采用分布式云存储服务器查询和下载区块数据。
在本申请实施例中,第二权限为具有查询和下载存储于第二区块节点上的区块数据的查询及下载权限。只有在验证出第一区块节点具有查询及下载数据的第二权限时,才授权与第二区块节点关联的用户查看及下载存储于第二区块节点上的区块数据。
具体地,在确定出第一区块节点为具有第二权限的权限区块节点时,查询存储于第二区块节点上的区块数据,并将查询到的区块数据发送至第一区块节点,以使得与第一区块节点关联的用户查看及下载存储第二区块节点上的区块数据。
在本公开实施例中,获取用于授权处理存储于第二区块节点上的区块数据的预设条件;响应于请求,根据预设条件和第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;若根据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权第一区块节点具有处理区块数据的权限;否则,则拒绝授权第一区块节点处理区块数据。因此,采用本申请实施例,由于配置了用于授权处理任意一个区块节点上的区块数据的预设条件,当前区块节点只有符合该预设条件,才具有区块数据处理权限,从而提高了整个区块链的数据安全。
下述为本申请区块节点数据的授权处理装置实施例,可以用于执行本申请区块节点数据的授权处理方法实施例。对于本申请区块节点数据的授权处理装置实施例中未披露的细节,请参照本申请区块节点数据的授权处理方法实施例。
请参见图4,其示出了本申请一个示例性实施例提供的区块节点数据的授权处理装置的结构示意图。该区块节点数据的授权处理装置可以通过软件、硬件或者两者的结合实现成为终端的全部或一部分。该区块节点数据的授权处理装置包括接收单元402、获取单元404、验证单元406和授权单元408。
具体而言,接收单元402,用于接收第一区块节点向第二区块节点发出的授权处理存储于第二区块节点上的区块数据的请求,请求中携带有第一区块节点的第一节点信息;
获取单元404,用于获取用于授权处理存储于第二区块节点上的区块数据的预设条件;
验证单元406,用于响应于接收单元402的请求,根据获取单元404获取的预设条件和接收单元402的请求中携带的第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;
授权单元408,用于若验证单元406根据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权第一区块节点处理区块数据;否则,则拒绝授权第一区块节点处理区块数据。
可选的,第一区块节点的第一节点信息至少包括以下一项:第一区块节点的第一版本号信息、第一区块节点的第一IP地址信息、第一区块节点的第一业务场景信息、第一区块节点的第一时间有效期信息和第一区块节点的与交易相关联的第一交易信息。
可选的,预设条件至少包括以下一项:授权处理区块数据的第二版本号信息、授权处理区块数据的第二IP地址信息、授权处理区块数据的第二业务场景信息、授权处理区块数据的第二时间有限期信息和授权处理区块数据的与交易相关联的第二交易信息。
可选的,验证单元406具体用于:在第一版本号信息和第二版本号信息、第一IP地址信息和第二IP地址信息、第一业务场景信息和第二业务场景信息、第一时间有效期信息和第二时间有效期信息、以及第一交易信息和第二交易信息均一 致的情况下,验证第一区块节点为权限区块节点。
可选的,授权单元408用于:授权第一区块节点采用分布式云存储服务器处理区块数据。
可选的,第一区块节点为具有第一权限的权限区块节点,授权单元408具体用于:授权第一区块节点采用分布式云存储服务器查询区块数据。
可选的,第一区块节点为具有第二权限的权限区块节点,第二权限高于第一权限,授权单元408还具体用于:授权第一区块节点采用分布式云存储服务器查询和下载区块数据。
需要说明的是,上述实施例提供的区块节点数据的授权处理装置在执行区块节点数据的授权处理方法时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的区块节点数据的授权处理装置与区块节点数据的授权处理方法实施例属于同一构思,其体现实现过程详见区块节点数据的授权处理方法实施例,这里不再赘述。
在本公开实施例中,获取单元用于获取用于授权处理存储于第二区块节点上的区块数据的预设条件;验证单元用于响应于请求,根据获取单元获取的预设条件和接收单元接收到的请求中携带的第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;若根据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权单元用于授权第一区块节点具有处理区块数据的权限;否则,则授权单元用于拒绝授权第一区块节点处理区块数据。因此,采用本申请实施例,由于配置了用于授权处理任意一个区块节点上的区块数据的预设条件,当前区块节点只有符合该预设条件,才具有区块数据处理权限,从而提高了整个区块链的数据安全。
在一个实施例中,提出了一种计算机设备,计算机设备包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行计算机程序时实现以下步骤:接收第一区块节点向第二区块节点发出的授权处理存储于第二区块节点上的区块数据的请求,请求中携带有第一区块节点的第一节点信息;获取用于授权处理存储于第二区块节点上的区块数据的预设条件;响应于请求,根据预设条件和第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;若根据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权第一区块节点处理区块数据;否则,则拒绝授权第一区块节点处理区块数据。
在一个实施例中,提出了一种存储有计算机可读指令的存储介质,该计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:接收第一区块节点向第二区块节点发出的授权处理存储于第二区块节点上的区块数据的请求,请求中携带有第一区块节点的第一节点信息;获取用于授权处理存储于第二区块节点上的区块数据的预设条件;响应于请求,根据预设条件和第一区块节点的第一节点信息验证第一区块节点是否为具有处理第二区块节点上的区块数据权限的权限区块节点;若根据预设条件和第一节点信息验证出第一区块节点为权限区块节点,则授权第一区块节点处理区块数据;否则,则拒绝授权第一区块节点处理区块数据。
所述计算机可读存储介质可以是非易失性的,也可以是易失性的。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是 可以通过计算机程序来指令相关的硬件来完成,该计算机程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,前述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random Access Memory,RAM)等。
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对本申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种区块节点数据的授权处理方法,其中,所述方法包括:
    接收第一区块节点向第二区块节点发出的授权处理存储于所述第二区块节点上的区块数据的请求,所述请求中携带有所述第一区块节点的第一节点信息;
    获取用于授权处理存储于所述第二区块节点上的所述区块数据的预设条件;
    响应于所述请求,根据所述预设条件和所述第一区块节点的所述第一节点信息验证所述第一区块节点是否为具有处理所述第二区块节点上的所述区块数据权限的权限区块节点;若根据所述预设条件和所述第一节点信息验证出所述第一区块节点为所述权限区块节点,则授权所述第一区块节点处理所述区块数据;否则,则拒绝授权所述第一区块节点处理所述区块数据。
  2. 根据权利要求1所述的方法,其中,所述第一区块节点的所述第一节点信息至少包括以下一项:
    所述第一区块节点的第一版本号信息、所述第一区块节点的第一IP地址信息、所述第一区块节点的第一业务场景信息、所述第一区块节点的第一时间有效期信息和所述第一区块节点的与交易相关联的第一交易信息。
  3. 根据权利要求2所述的方法,其中,所述预设条件至少包括以下一项:
    授权处理所述区块数据的第二版本号信息、授权处理所述区块数据的第二IP地址信息、授权处理所述区块数据的第二业务场景信息、授权处理所述区块数据的第二时间有限期信息和授权处理所述区块数据的与交易相关联的第二交易信息。
  4. 根据权利要求3所述的方法,其中,所述根据所述预设条件和所述第一区块节点的所述第一节点信息验证所述第一区块节点是否为具有处理所述第二区块节点上的所述区块数据权限的权限区块节点包括:
    在所述第一版本号信息和所述第二版本号信息、所述第一IP地址信息和所述第二IP地址信息、所述第一业务场景信息和所述第二业务场景信息、所述第一时间有效期信息和所述第二时间有效期信息、以及所述第一交易信息和所述第二交易信息均一致的情况下,验证所述第一区块节点为所述权限区块节点。
  5. 根据权利要求1所述的方法,其中,所述授权所述第一区块节点处理所述区块数据包括:
    授权所述第一区块节点采用分布式云存储服务器处理所述区块数据。
  6. 根据权利要求5所述的方法,其中,所述第一区块节点为具有第一权限的权限区块节点,所述授权所述第一区块节点采用分布式云存储服务器处理所述区块数据包括:
    授权所述第一区块节点采用分布式云存储服务器查询所述区块数据。
  7. 根据权利要求6所述的方法,其中,所述第一区块节点为具有第二权限的权限区块节点,所述第二权限高于所述第一权限,所述授权所述第一区块节点采用分布式云存储服务器处理所述区块数据还包括:
    授权所述第一区块节点采用分布式云存储服务器查询和下载所述区块数据。
  8. 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行以下步骤,包括:
    接收第一区块节点向第二区块节点发出的授权处理存储于所述第二区块节点上的区块数据的请求,所述请求中携带有所述第一区块节点的第一节点信息;
    获取用于授权处理存储于所述第二区块节点上的所述区块数据的预设条件;
    响应于所述请求,根据所述预设条件和所述第一区块节点的所述第一节点信息验证所述第一区块节点是否为具有处理所述第二区块节点上的所述区块数据权限的权限区块节点;若根据所述预设条件和所述第一节点信息验证出所述第一区块节点为所述权限区块节点,则授权所述第一区块节点处理所述区块数据;否则,则拒绝授权所述第一区块节点处理所述区块数据。
  9. 根据权利要求8所述的设备,其中,所述第一区块节点的所述第一节点信息至少包括以下一项:
    所述第一区块节点的第一版本号信息、所述第一区块节点的第一IP地址信息、所述第一区块节点的第一业务场景信息、所述第一区块节点的第一时间有效期信息和所述第一区块节点的与交易相关联的第一交易信息。
  10. 根据权利要求8所述的设备,其中,所述预设条件至少包括以下一项:
    授权处理所述区块数据的第二版本号信息、授权处理所述区块数据的第二IP地址信息、授权处理所述区块数据的第二业务场景信息、授权处理所述区块数据的第二时间有限期信息和授权处理所述区块数据的与交易相关联的第二交易信息。
  11. 根据权利要求8所述的设备,其中,所述计算机可读指令被所述处理器执行时,使得所述处理器还执行以下步骤,包括:
    在所述第一版本号信息和所述第二版本号信息、所述第一IP地址信息和所述第二IP地址信息、所述第一业务场景信息和所述第二业务场景信息、所述第一时间有效期信息和所述第二时间有效期信息、以及所述第一交易信息和所述第二交易信息均一致的情况下,验证所述第一区块节点为所述权限区块节点。
  12. 根据权利要求8所述的设备,其中,所述计算机可读指令被所述处理器执行时,使得所述处理器还执行以下步骤,包括:
    授权所述第一区块节点采用分布式云存储服务器处理所述区块数据。
  13. 根据权利要求8所述的设备,其中,所述计算机可读指令被所述处理器执行时,使得所述处理器还执行以下步骤,包括:
    授权所述第一区块节点采用分布式云存储服务器查询所述区块数据。
  14. 一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤,包括:
    接收第一区块节点向第二区块节点发出的授权处理存储于所述第二区块节点上的区块数据的请求,所述请求中携带有所述第一区块节点的第一节点信息;
    获取用于授权处理存储于所述第二区块节点上的所述区块数据的预设条件;
    响应于所述请求,根据所述预设条件和所述第一区块节点的所述第一节点信息验证所述第一区块节点是否为具有处理所述第二区块节点上的所述区块数据权限的权限区块节点;若根据所述预设条件和所述第一节点信息验证出所述第一区块节点为所述权限区块节点,则授权所述第一区块节点处理所述区块数据;否则,则拒绝授权所述第一区块节点处理所述区块数据。
  15. 根据权利要求14所述的存储介质,其中,所述第一区块节点的所述第一节点信息至少包括以下一项:
    所述第一区块节点的第一版本号信息、所述第一区块节点的第一IP地址信息、所述第一区块节点的第一业务场景信息、所述第一区块节点的第一时间有效期信息和所述第一区块节点的与交易相关联的第一交易信息。
  16. 根据权利要求15所述的存储介质,其中,所述预设条件至少包括以下一项:
    授权处理所述区块数据的第二版本号信息、授权处理所述区块数据的第二IP 地址信息、授权处理所述区块数据的第二业务场景信息、授权处理所述区块数据的第二时间有限期信息和授权处理所述区块数据的与交易相关联的第二交易信息。
  17. 根据权利要求16所述的存储介质,其中,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器还执行以下步骤,包括:
    在所述第一版本号信息和所述第二版本号信息、所述第一IP地址信息和所述第二IP地址信息、所述第一业务场景信息和所述第二业务场景信息、所述第一时间有效期信息和所述第二时间有效期信息、以及所述第一交易信息和所述第二交易信息均一致的情况下,验证所述第一区块节点为所述权限区块节点。
  18. 根据权利要求14所述的存储介质,其中,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器还执行以下步骤,包括:
    授权所述第一区块节点采用分布式云存储服务器处理所述区块数据。
  19. 根据权利要求18所述的存储介质,其中,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器还执行以下步骤,包括:
    授权所述第一区块节点采用分布式云存储服务器查询所述区块数据。
  20. 一种区块节点数据的授权处理装置,其中,所述装置包括:
    接收单元,用于接收第一区块节点向第二区块节点发出的授权处理存储于所述第二区块节点上的区块数据的请求,所述请求中携带有所述第一区块节点的第一节点信息;
    获取单元,用于获取用于授权处理存储于所述第二区块节点上的所述区块数据的预设条件;
    验证单元,用于响应于所述接收单元的所述请求,根据所述获取单元获取的所述预设条件和所述接收单元的所述请求中携带的所述第一区块节点的所述第一节点信息验证所述第一区块节点是否为具有处理所述第二区块节点上的所述区块数据权限的权限区块节点;
    授权单元,用于若所述验证单元根据所述预设条件和所述第一节点信息验证出所述第一区块节点为所述权限区块节点,则授权所述第一区块节点处理所述区块数据;否则,则拒绝授权所述第一区块节点处理所述区块数据。
PCT/CN2021/097327 2020-12-22 2021-05-31 区块节点数据的授权处理方法、装置、设备及存储介质 WO2022134473A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011529928.0 2020-12-22
CN202011529928.0A CN112702337A (zh) 2020-12-22 2020-12-22 一种区块节点数据的授权处理方法、装置和计算机设备

Publications (1)

Publication Number Publication Date
WO2022134473A1 true WO2022134473A1 (zh) 2022-06-30

Family

ID=75510531

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/097327 WO2022134473A1 (zh) 2020-12-22 2021-05-31 区块节点数据的授权处理方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN112702337A (zh)
WO (1) WO2022134473A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277145A (zh) * 2022-07-20 2022-11-01 北京志凌海纳科技有限公司 分布式存储访问授权管理方法、***、设备和可读介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702337A (zh) * 2020-12-22 2021-04-23 平安科技(深圳)有限公司 一种区块节点数据的授权处理方法、装置和计算机设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418795A (zh) * 2018-01-30 2018-08-17 百度在线网络技术(北京)有限公司 跨区块链的数据访问方法、装置、***及计算机可读介质
CN109639753A (zh) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 一种基于区块链的数据共享方法及***
CN110166411A (zh) * 2018-02-13 2019-08-23 华为技术有限公司 一种数据传输方法、装置和网络节点
CN110263025A (zh) * 2019-05-21 2019-09-20 平安普惠企业管理有限公司 基于联盟链的数据清算方法、电子设备及计算机存储介质
US10445698B2 (en) * 2016-06-30 2019-10-15 Clause, Inc. System and method for forming, storing, managing, and executing contracts
CN112702337A (zh) * 2020-12-22 2021-04-23 平安科技(深圳)有限公司 一种区块节点数据的授权处理方法、装置和计算机设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106778343A (zh) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 一种基于区块链的涉及隐私数据的数据共享方法
CN109670333B (zh) * 2018-12-12 2019-11-08 杭州基尔区块链科技有限公司 一种去中心化芯片研发交易数据存储方法及***
CN110060162B (zh) * 2019-03-29 2023-10-27 创新先进技术有限公司 基于区块链的数据授权、查询方法和装置
CN111881472B (zh) * 2020-07-22 2024-04-26 云账户技术(天津)有限公司 一种数据访问控制方法、***及权限管理***、介质
CN111737758B (zh) * 2020-08-07 2021-01-12 百度在线网络技术(北京)有限公司 区块链网络的权限管理方法、装置、设备以及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10445698B2 (en) * 2016-06-30 2019-10-15 Clause, Inc. System and method for forming, storing, managing, and executing contracts
CN108418795A (zh) * 2018-01-30 2018-08-17 百度在线网络技术(北京)有限公司 跨区块链的数据访问方法、装置、***及计算机可读介质
CN110166411A (zh) * 2018-02-13 2019-08-23 华为技术有限公司 一种数据传输方法、装置和网络节点
CN109639753A (zh) * 2018-10-26 2019-04-16 众安信息技术服务有限公司 一种基于区块链的数据共享方法及***
CN110263025A (zh) * 2019-05-21 2019-09-20 平安普惠企业管理有限公司 基于联盟链的数据清算方法、电子设备及计算机存储介质
CN112702337A (zh) * 2020-12-22 2021-04-23 平安科技(深圳)有限公司 一种区块节点数据的授权处理方法、装置和计算机设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277145A (zh) * 2022-07-20 2022-11-01 北京志凌海纳科技有限公司 分布式存储访问授权管理方法、***、设备和可读介质

Also Published As

Publication number Publication date
CN112702337A (zh) 2021-04-23

Similar Documents

Publication Publication Date Title
WO2022105498A1 (zh) 一种基于区块链网络的数据处理方法、装置、计算机设备以及计算机可读存储介质
US11444783B2 (en) Methods and apparatuses for processing transactions based on blockchain integrated station
US11032252B2 (en) Distributed authentication between network nodes
US20210328814A1 (en) Blockchain integrated stations and automatic blockchain construction methods and apparatuses
US11451404B2 (en) Blockchain integrated stations and automatic node adding methods and apparatuses
US11424942B2 (en) Blockchain integrated stations and automatic node adding methods and apparatuses
WO2022134473A1 (zh) 区块节点数据的授权处理方法、装置、设备及存储介质
US11783339B2 (en) Methods and apparatuses for transferring transaction based on blockchain integrated station
WO2022121538A1 (zh) 基于区块链的数据同步方法、***及相关设备
US11336660B2 (en) Methods and apparatuses for identifying replay transaction based on blockchain integrated station
US10721074B2 (en) Methods and apparatus to authenticate and differentiate virtually identical resources using session chaining
US11463553B2 (en) Methods and apparatuses for identifying to-be-filtered transaction based on blockchain integrated station
US11665234B2 (en) Methods and apparatuses for synchronizing data based on blockchain integrated station
US8958435B2 (en) Information management method and information processing device
WO2022134830A1 (zh) 区块节点数据的处理方法、装置、计算机设备和存储介质
CN112104607B (zh) 跨链通信的方法、装置、网络节点和存储介质
CN112104701B (zh) 一种跨链通信的方法、装置、网络节点和存储介质
CN114372245A (zh) 基于区块链的物联网终端认证方法、***、设备及介质
WO2021115554A1 (en) A service based interface for establishing distributed consensus
CN115168872B (zh) 基于去中心化信任的公有云下tee状态连续性保护方法
CN116132163B (zh) 使用dhcp协议实现设备限定局域网络围栏的方法
CN116132163A (zh) 使用dhcp协议实现设备限定局域网络围栏的方法
CN118118544A (zh) 一种业务服务通信方法、***
KR20220085375A (ko) 블록체인 기반 공개키 관리 방법
CN116192633A (zh) 远程证明的应用方法、装置、设备、***及存储介质

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21908484

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 21908484

Country of ref document: EP

Kind code of ref document: A1