WO2020007209A1 - 数据存储方法、数据校验方法、装置、设备及介质 - Google Patents

数据存储方法、数据校验方法、装置、设备及介质 Download PDF

Info

Publication number
WO2020007209A1
WO2020007209A1 PCT/CN2019/092410 CN2019092410W WO2020007209A1 WO 2020007209 A1 WO2020007209 A1 WO 2020007209A1 CN 2019092410 W CN2019092410 W CN 2019092410W WO 2020007209 A1 WO2020007209 A1 WO 2020007209A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
node
target
audit information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2019/092410
Other languages
English (en)
French (fr)
Inventor
汪东艳
李茂材
郭锐
屠海涛
李波
王宗友
张建俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to EP19830218.4A priority Critical patent/EP3745342A1/en
Priority to JP2020562577A priority patent/JP7066096B2/ja
Publication of WO2020007209A1 publication Critical patent/WO2020007209A1/zh
Priority to US16/991,977 priority patent/US11914730B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms
    • G06F3/0649Lifecycle management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • the present application relates to the field of network technologies, and in particular, to a data storage method, a data verification method, a device, a device, and a storage medium.
  • the embodiments of the present application provide a data storage method, a data verification method, a device, a device, and a storage medium.
  • a data storage method executed by a first node in a data storage system includes:
  • the dimension is information for measuring any aspect of the target object from generation to existence
  • the first data and the second data of the target are stored in the first node.
  • a data verification method is performed by any second node of a data storage system, and a plurality of second nodes in the data storage system are configured with a consensus mechanism, and the method includes:
  • a data storage device includes:
  • a first data acquisition module configured to acquire first data of a target object
  • a second data acquisition module configured to acquire second data of the target object, the first data and the second data are data of different dimensions; the dimension is used to measure whether the target object is generated to exist Any aspect of the period; and
  • a storage module configured to store the first data and the second data of the target object in the first node.
  • a data verification device includes:
  • a receiving module configured to receive audit information of a first node, where the audit information is used to indicate data that has been stored by the first node;
  • a verification module configured to verify the audit information based on the target audit information of at least one target first node
  • the verification module is further configured to determine that the audit information consensus passes when the received verification pass notification satisfies a consensus pass condition.
  • a computer device comprising a processor and a memory, the memory storing at least one instruction, the instruction being loaded and executed by the processor to implement an operation performed by the data storage method; or The instructions are loaded and executed by the processor to implement the operations performed by the data verification method described above.
  • a computer-readable storage medium having at least one instruction stored therein, said instruction being loaded and executed by said processor to implement an operation performed by said data storage method; or said instruction being executed by said processor Load and execute to implement the operations performed by the data verification method described above.
  • a data storage system the system includes a plurality of first nodes and a plurality of second nodes, and the plurality of second nodes in the data storage system are configured with a consensus mechanism,
  • Each first node of the plurality of first nodes is configured to obtain first data of a target object, and obtain second data of the target object, and the first data and the second data are of different dimensions.
  • Data the dimension is information used to measure any aspect of the target object from generation to existence; storing the first data and the second data of the target object in the first node Acquiring audit information of the first node, where the audit information is used to indicate data stored by the first node; broadcasting the audit information of the first node to a plurality of second nodes of the data storage system;
  • Each second node of the plurality of second nodes is configured to receive audit information of the first node, where the audit information is used to indicate data stored by the first node; based on at least one target first
  • the target audit information of the node verifies the audit information; when the verification is passed, a verification pass notification is broadcast in the data storage system; when the received verification pass notification meets the consensus pass condition, the determination is made Audit information was passed by consensus.
  • FIG. 1 is a schematic structural diagram of a data storage system according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of a computer device according to an embodiment of the present application.
  • FIG. 3 is a flowchart of a data storage method according to an embodiment of the present application.
  • FIG. 4 is a flowchart of a data verification method according to an embodiment of the present application.
  • FIG. 5 is a schematic diagram of a data association network in a data verification process according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of an implementation process involved in different stages of production and distribution of dairy products and different links in each stage according to an embodiment of the present application
  • FIG. 7 is a schematic structural diagram of a data storage device according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a data verification device according to an embodiment of the present application.
  • FIG. 1 is a schematic structural diagram of a data storage system according to an embodiment of the present application.
  • the system includes a plurality of first nodes 101 and a plurality of second nodes 102;
  • Each first node in the plurality of first nodes is configured to obtain first data of a target object, and obtain second data of the target object, where the first data and the second data are data of different dimensions;
  • the first data of the object and the second data are stored in the first node, and the audit information of the first node is obtained, and the audit information is used to indicate the data stored by the first node;
  • the second node broadcasts the audit information of the first node;
  • the plurality of second nodes are configured to receive audit information of the first node, where the audit information is used to indicate data stored by the first node; and verify the audit information based on target audit information of at least one target first node.
  • a verification pass notification is broadcast in the data storage system; when the received verification pass notification satisfies the consensus pass condition, the audit information consensus passes.
  • the plurality of first nodes 101 may be nodes of different operating entities, which are used to store data related to the production and transactions of the corresponding operating entities.
  • Each first node 101 may store its own data in a database or block manner. Data, the database method is to establish an index for each data, and store the data to the corresponding storage space based on the index, while the block method refers to the data stored on the first node, each data has a certain association , Can take the same form of block in the blockchain to ensure that the data cannot be tampered with.
  • the plurality of first nodes 101 may constitute a basic data layer of a data storage system, and may also provide data query functions for corresponding operating entities, in order to trace transactions with other nodes and their own production activities.
  • first nodes 101 may communicate with each other to perform transactions.
  • the first node 1 may perform transactions with the first node 2 so as to correspond to the first node 2 through the account of the first node 1.
  • To complete the transaction with the first node 2 by performing processes such as transfer, product delivery, and information exchange.
  • the completion of the transaction may refer to the completion of an online transaction.
  • related offline transportation may also be involved, which is not limited in the embodiment of the present application.
  • the first node may also be an agent node of an operating entity, which is used to represent one or more operating entities for online transactions and data storage.
  • the first node represents one or more operating entities, In this case, data can be stored separately for different business entities, and data privacy can be guaranteed by setting keys and other means.
  • the plurality of second nodes 102 may be used to verify data generated by the plurality of first nodes during production and trading, and to indicate the authenticity of the data of the first node based on the transaction results. It should be noted that the multiple second nodes 102 can deploy the same blockchain, that is, the multiple second nodes 102 can follow the same set of consensus mechanisms, and the data of the first node 101 can be verified separately.
  • the consensus mechanism based on the verification results of multiple second nodes 102, to perform consensus, if the verification results meet the consensus pass conditions (for example, the number of second nodes that pass the verification exceeds 2/3 of the total), Then the plurality of second nodes 102 reach a consensus to determine the authenticity of the data of the first node 101, and when the verification result does not meet the consensus passing conditions, the plurality of second nodes 101 fail to reach a consensus and determine the first node 101's The data is not authentic. It should be noted that the embodiment of the present application does not limit which consensus mechanism is specifically adopted.
  • the plurality of first nodes 101 constitute a basic data layer of a data storage system, and are used for data storage of respective nodes, and the plurality of second nodes 102 constitute an audit layer of the data storage system, and are used for a plurality of first nodes.
  • the node 101 provides a verification service.
  • Each first node 101 may have a certain data isolation. For example, the transaction data of the first node 1 is not visible to the first node 2, and the first node 1 may send a carry to the second node. Transaction request for account information.
  • each first node 101 is transparent or relatively transparent to the plurality of second nodes 102, that is, the second node 102 can obtain the data or feature values of the data stored by the first node 101 (for example, hash value), the embodiment of this application will detail its specific acquisition and other processes later.
  • the first node or the second node may be provided as any kind of computer equipment.
  • FIG. 2 is a schematic diagram of a computer equipment provided by an embodiment of the present application.
  • the computer equipment 200 may be generated due to different configurations or performances.
  • the relatively large difference may include one or more processors (central processing units) 201 and one or more memories 202, wherein the memory 202 stores at least one instruction, and the at least one instruction is
  • the processor 201 loads and executes to implement the data storage method or data verification method provided by each of the following embodiments.
  • the computer device may also have components such as a wired or wireless network interface, a keyboard, and an input-output interface for input and output.
  • the computer device may also include other components for implementing the functions of the device, and details are not described herein.
  • FIG. 3 is a flowchart of a data storage method according to an embodiment of the present application.
  • the data storage method may be applied to any first node as shown in FIG. 1. Referring to FIG. 3, the method includes:
  • the target may be any product capable of offline or online transactions or circulation.
  • the target object may be a tangible product, and the tangible product may be obtained based on manual production or machine production.
  • the tangible product may be food, daily necessities, household items, home appliances, and the like, which are not specifically limited in the embodiments of the present application.
  • the target may also be a bill product, that is, a product expressed in the form of a bill, for example, the target may be a financial product such as a stock, a bond, a fund share, or the like.
  • the target object may also be a virtual product, that is, a product expressed in the form of electronic data, which may correspond to a certain actual currency value or virtual currency value. The currency value may not be fixed, and It floats according to market rules.
  • the virtual product can be a financial product, such as an online fund product, an online stock product, and so on.
  • the first data may refer to data of one dimension of the target object, and the dimension refers to information used to measure any aspect of the target object during generation to its duration.
  • the dimensions may include time dimensions, transaction dimensions, environmental protection dimensions, and so on.
  • the time dimension may include the elapsed time of the target, the time remaining after the target disappears, the time remaining after the target clears or expires, and so on.
  • the transaction dimension may include the parties to the transaction, the transaction amount, the transaction time, etc. of the associated transaction behavior of the target during the period from generation to existence.
  • the environmental protection dimension can include the emission or generation of hazardous substances, such as carbon emissions, formaldehyde generation, and industrial waste generation.
  • the second data may refer to data of a different dimension from the first data.
  • the first data is data of a time dimension
  • the second data may be a transaction dimension or an environmental protection dimension.
  • the first node may store relevant data of production or transaction of the node, and the data may include information of any kind of transaction that occurs in the production stage or circulation stage of the target corresponding to the node.
  • the first node may store the first data and the second data correspondingly, which is convenient for querying.
  • the first node may store the first data and the second data in a data item or a related data item in the database of the first node, and may also store the first data and the second data in a block.
  • the first data and the second data may be stored in different blocks, respectively, and identified with the same data identifier for easy query.
  • the first node may perform cross-comparison based on the acquired data of at least two dimensions before storing, and when the acquired data of at least two dimensions match, perform step S303 Store steps. Because the data of each dimension should conform to a certain functional relationship, the data of at least two dimensions can be cross-matched based on the functional relationship between the dimensions. When the comparison result is matched, it can be stored. If the result of the comparison is a mismatch, no storage step is performed. For example, there should be a certain functional relationship between the life cycle and carbon emissions. For example, when the life cycle is reduced by 2 days, its carbon emissions should increase by 10 units. If the above multidimensional data does not satisfy the functional relationship, it means that The data is incorrect, and the comparison result is mismatch.
  • the above-mentioned cross-comparison may be directed to any dimension data provided in the embodiments of the present application, that is, when the first data and the second data are obtained, the first data and the second data are based on the first data and the second data.
  • Perform comparison when the first data, the second data, and the third data are obtained, the comparison is based on the first data, the second data, and the third data.
  • the obtained data also includes other data
  • the above comparison is only a simple example of a specific comparison process.
  • Embodiments of the present application may also perform other comparison processes based on multi-dimensional data, which is not limited in the embodiment of the present application.
  • various stages and links of the target object from the production stage to the circulation stage can be recorded from multiple angles, and the online data and the real production and life can be achieved.
  • the closely related purpose makes the online data have practical significance and is no longer just a simple expression of some virtual currencies.
  • data of multiple dimensions recorded by the first node corresponding to each stage are related to each other, and not only can each stage and each link be verified with each other, but also the data of multiple dimensions They can also verify each other, forming a streaming, seamless data chain, and since the data of each first node is stored on the node itself, the data security is improved.
  • the target it can include multiple stages from production to circulation, which can be divided according to actual needs.
  • it can include the raw material production stage, the target production stage, the transportation stage, and the sales stage.
  • the sales stage may also include different stages according to different sales methods.
  • the e-commerce sales method it may include the e-commerce phase, the warehousing phase, the logistics phase, and the consumer phase.
  • the method may include an on-shelf phase and a consumer phase, and any virtual product may be used as an example, which may include a design phase, a trial operation phase or a pre-sale phase, an official release phase, and the like.
  • the first data of the target includes the life cycle margin of the target at the current stage
  • the second data of the target includes the target at the current stage Transaction data
  • the life cycle refers to the period of time from the original state of a target to the generation of the target, to the expiration of the target, or the use of the target or the exhaustion of the target.
  • a shelf life For example, for food, it can be expressed as a shelf life. Taking milk as an example, the shelf life can be 30 days.
  • the shelf life can be 30 days.
  • the effective period For a virtual product, it can be expressed as an effective period.
  • the effective period can be expressed as the effective period of use rights. For example, the validity period of a premium member is 1 month.
  • the life cycle balance refers to the remaining life cycle of the target at the current point in time.
  • the life cycle is 30 days, and if 10 days of circulation have passed, the life cycle balance is 20 days.
  • certain consumption may occur, which will affect the use or existence of the target. Therefore, in order to record this impact, the life cycle balance of the target can be obtained.
  • life cycle margins for each stage of the target, there may be corresponding life cycle margins. Of course, it may also have corresponding life cycle margins at certain stages of the target. Characteristics to determine. For example, for some target materials with raw materials, they already have corresponding life cycle margins in the production stage of the raw materials, and in subsequent stages, their life cycle margins are the lives of the raw materials in the production stage. The cycle margin is decremented, and for some targets without raw materials, the concept of a life cycle can only appear at a certain stage, which is not limited in the embodiments of the present application. From the above description, it can be known that if the phase corresponding to the first node is the initial phase of the life cycle, the value of the life cycle margin is equal to the length of the life cycle.
  • the life cycle margin may be expressed in any time granularity, and the specific time granularity used may be set according to the type of the target. In some embodiments, the life cycle margin may further include the value of the life cycle margin and the start time of the life cycle, so as to provide an intuitive point in time to further indicate the sustainability or usability of the target object.
  • the life cycle margin of the target at the current stage is the difference between the life cycle margin of the previous stage and the time consuming of the current stage.
  • the process of obtaining the life cycle margin of the target in the current stage may include: obtaining the life cycle margin of the previous stage and the time consuming of the current stage, and then obtaining the life cycle margin of the previous stage and the current stage.
  • the time-consuming difference is used as the life cycle margin of the current stage.
  • the life cycle margin sent by the first node corresponding to the previous stage of the target can be obtained, and the life cycle margin can correspond to the previous stage. Obtained when the transaction between the first nodes is completed and sent by the first node corresponding to the previous phase to the first node in the current phase.
  • the first node corresponding to the previous phase can also Send the signature data obtained by using the private key to sign the life cycle margin and the public key of the first node corresponding to the previous stage.
  • the transaction data of the target at the current stage includes transaction data of the target at various stages of the current stage, and the transaction data of the target at the current stage also includes the target at the current stage.
  • the first node will record the transaction information of the transactions that occur in each link at each stage of the current stage. For example, during the transport link, the fee EX transferred from account 1 of the first node to account 2 of the node responsible for transportation business And, it also obtains the signature data provided by the counterparty in each link after accepting the transaction.
  • the signature data can be obtained by the first node of the counterparty using the private key to sign the transaction information.
  • the signature data can be Sig_ (EX (account 1 to account 2)).
  • the counterparty may also return the public key of the counterparty when returning the signature data in order to verify the counterparty and the signature data.
  • the first data of the target includes a resource consumption margin of the target at the current stage
  • the second data of the target includes a transaction of the target at the current stage. data.
  • resource consumption refers to the consumption of some limited resources from the original state to the generation of the target, to the expiration of the target, or the end of the target's life or the exhaustion of the target.
  • resource consumption refers to the consumption of some limited resources from the original state to the generation of the target, to the expiration of the target, or the end of the target's life or the exhaustion of the target.
  • incidental substances caused by the consumption of resources by industrial production activities.
  • it can be the emission of incidental substances such as carbon emissions or formaldehyde emissions.
  • the resource consumption margin of the target at the current stage is the difference between the resource consumption margin of the previous stage and the resource consumption of the current stage.
  • the process of acquiring the resource consumption margin of the target at the current stage may include: the first node acquires the resource consumption margin of the previous stage and the resource consumption of the current stage, and then acquires the resource consumption margin of the previous stage and The difference between the resource consumption in the current stage is used as the resource consumption margin in the current stage.
  • the resource consumption margin sent by the first node corresponding to the previous stage of the target can be obtained, and the resource consumption margin can correspond to the previous stage. Obtained when the transaction between the first nodes is completed and sent by the first node corresponding to the previous stage to the first node.
  • the first node corresponding to the previous stage can also send a private message.
  • the resource consumption amount of the current stage is a sum of the resource consumption amounts of the target object in each link of the current stage.
  • the first node will record the transaction information of the transactions occurring at each stage and the resource consumption based on the exchange. For example, during the transportation stage, account 1 of the first node is responsible for the transportation business. The node 2 ’s account is transferred to EX, and the counterparty of each link is also obtained based on the carbon emission CC provided by the exchange. Accordingly, the obtained signature data is based on transaction information and resource consumption. Signed signature data.
  • the dimensions of the third data may be different from those of the first data and the second data.
  • the generation of the third data may be related to the generation of the second data.
  • the second data may be the transaction data of the target at the current stage, which is generated based on the input or expenditure behavior of the target generation or circulation process, and the third The data is also generated based on the input or expenditure behavior of the generation or circulation process of the target object. As the second data is generated, the corresponding third data can be generated.
  • the second data does not necessarily have associated third data, and the third data must be generated due to the generation of the second data.
  • the third data must be generated due to the generation of the second data. For example, when any spending behavior occurs, both parties to the transaction will conduct The capital transaction was completed, and the corresponding resource consumption dimension transaction was completed (for example, the carbon emissions of the seller were transferred to the buyer due to the transaction).
  • the first node when performing data storage, may store the first data, the second data, and the third data in one block, and may also store the first data, the second data, and the third data separately. To different blocks, and use the same data identification to identify, for easy query. Of course, it is also possible to store the second data and the third data in one block, and store the first data in another block, and use the same data identifier for identification, which is not limited in this embodiment of the present application.
  • the third data of the target includes: a resource consumption margin of the target at the current stage.
  • the first data may be the life cycle margin of the current stage
  • the second data may be the transaction data of the current stage
  • the third data may be the resource consumption margin of the target in the current stage
  • the resource consumption margin is carbon Emission balance.
  • the above-mentioned step of obtaining the audit information of the first node may be performed, that is, after performing steps S301 and S301, At S302, the above steps of obtaining and broadcasting the audit information are performed, and thus, upon receiving a consensus confirmation notification, executing the first data and the second data of the target object to the first node is further performed. step.
  • the first node may further have a resource pool for temporarily storing data, that is, when the first data and the second data are obtained, the first A data and the second data are stored in the resource pool of the first node; when a consensus confirmation notification sent by any second node is received, the first data and the second data stored in the resource pool are stored The data is stored in a preset storage space of the first node.
  • the audit information includes data stored by the first node; or, the audit information includes data stored by the first node within a preset time period.
  • the audit information may be the data stored by the first node itself, rather than the feature value, so that the second node can obtain the original data of the transaction, which greatly improves the verification accuracy of the second node.
  • the audit information is signature data obtained by the first node signing data stored by the first node by using the private key of the first node.
  • the signature can make the second node know the source node of the audit information.
  • the audit information further includes a public key of the first node. The public key can be used by the second node for verification based on the public key and the signature data, to determine that the audit information does indeed come from the first node, and then perform specific verification processes based on the feature values or other data obtained after decompressing the signature data. .
  • the audit information further includes context signature data obtained by the first node using a private key to sign context information at the current stage, and the context information includes at least one of a time stamp, a geographic address information, and a network address information.
  • the context information can provide information such as the occurrence time and the occurrence environment corresponding to the data to be audited, and can ensure the traceability of the data.
  • FIG. 4 is a flowchart of a data verification method provided by an embodiment of the present application
  • FIG. 5 is a schematic diagram of a data association network in a data verification process provided by an embodiment of the present application. As shown in FIG.
  • the data verification method includes: S401, a plurality of second nodes receive audit information of the first node; S402, each second node obtains at least one target uploaded by the first node according to the audit information Audit information; S403, each second node compares the target audit information of the at least one target first node with the audit information; S404, when there is a match, the second node determines that the audit information passes verification, and The verification pass notification is broadcast to the plurality of second nodes; S405, the plurality of second nodes perform a consensus process, and when the received verification pass notification satisfies a consensus pass condition, it is determined that the audit information consensus passes.
  • the second node receives audit information of the first node, where the audit information is used to indicate that the first node has stored data; and the audit is performed based on target audit information of at least one target first node.
  • the information is verified; when the verification is passed, the second node broadcasts a verification pass notification in the data storage system; when the received verification pass notification meets the consensus pass condition, it is determined that the first audit information consensus pass .
  • the second node may also send a consensus confirmation notification to the first node.
  • the stored data may be the first data and the second data, or the first data, the second data, and the third data, or the second data and the third data.
  • first data and the third data may also be There is a combination of the first data and the third data, which is not limited in the embodiment of the present application.
  • the first node includes the target first node, and the target first node is one of the plurality of first nodes.
  • the target first node may refer to one or more nodes associated with the current production activities of the first node.
  • the target first node may be the first node's An upstream node, or the target first node may be a node that participates in a certain production link (that is, a certain production factor) of the first node (for example, it may correspond to a company that provides transportation services for the first node) First node). Therefore, the target audit information corresponding to the target node is used to indicate data that has been stored by each target first node that conducts transactions with the first node.
  • the audit layer provides a verification function for each first node in the data storage system. Since multiple second nodes in the audit layer can obtain the audit information of each first node, it is possible to Through the cross-comparison of audit information, the authenticity and accuracy of the data to be stored are determined. While ensuring the security of the data, the authenticity and accuracy of the data are guaranteed.
  • the second node may perform cross-comparison according to the multi-dimensional data in the audit information provided by the first node itself, and when the multi-dimensional data conforms to a preset functional relationship, it is determined that the audit information verification passes. Therefore, the at least one target first node may also be the first node itself, and the target audit information of the at least one target first node may also be the audit information of the first node itself.
  • verifying the audit information by the second node based on the target audit information of the at least one target first node includes: obtaining, by the second node, the at least one target first node based on the audit information.
  • Uploaded target audit information may refer to audit information uploaded by each target first node after a transaction with the first node; the second node combines the target audit information of the at least one target first node with the target audit information. The audit information is compared, and when the target audit information of the at least one target first node matches the audit information, it is determined that the audit information verification passes.
  • the obtaining, by the second node, the target audit information uploaded by the at least one target according to the audit information includes: obtaining, by the second node, a public key in at least one piece of signature data in the audit information; the second The node uses the first node corresponding to the obtained public key as the at least one target first node; and obtains, according to the public key, audit information including the first node corresponding to the public key, as the at least one Target audit information of the target first node.
  • the target audit information and audit information are not the original stored by the node.
  • the comparison process may include: first, decompressing the signature based on the public key of each node to obtain the target characteristic value of at least one target first node and the first node's Characteristic value, and then determining whether the characteristic value of the at least one target first node is included in the characteristic value of the first node, and if it is included, it means that the transaction corresponds one-to-one, and the transaction content corresponds one-to-one, and the at least one is determined
  • the target audit information of the target first node matches the audit information, and when it is matched, it is determined that the audit information is verified to pass.
  • the audit information may be data stored by the signed first node, and the second node may perform cross-comparison based on the multi-dimensional data in the audit information provided by each different node. In the case of a functional relationship, it is determined that the target audit information of the at least one target first node matches the audit information, and when it is matched, it is determined that the audit information passes verification.
  • the at least one target first node is a counterparty to the transaction indicated by the audit information.
  • the at least one target first node includes: the at least one target first node includes: a node corresponding to each production factor of the current stage and the target object on the current stage Nodes corresponding to a stage.
  • the method further includes: the first node provides a barcode on the produced product at any stage, and the address pointed to by the barcode is used to provide the latest first data or the latest third data of the target object. At least one.
  • the barcode can be in the form of one-dimensional code, two-dimensional code, etc.
  • the barcode can point to the address of a certain network resource, and the data stored in the address can be updated according to the first data of the current stage of the target object, so that each Each time the code is scanned, at least one of the latest first data of the target, the second data of the first node, and the latest third data can be obtained, so as to form a pointer to the data in the data storage system through the barcode, which will be true Products are associated with online data corresponding to the products.
  • the second data related to transaction privacy may not be provided, but if it is an audit-oriented barcode, the second data of the target object may also be provided in the address pointed to by the barcode.
  • transaction data of the first node in the raw milk production process can be provided, and specific data provided can be set according to actual needs, which is not limited in the embodiment of the present application.
  • the data stored at the address may be updated by the first node.
  • the first data may be updated to the address.
  • the content contained in the address may include an update timestamp.
  • the first node may compare the update timestamp with the timestamp of the first data to be uploaded. If the timestamp of the first data to be uploaded is later than the update timestamp , The first data is uploaded to cover the first data already on the address, and if the time stamp of the first data to be uploaded is not later than the update time stamp, the first data is not uploaded.
  • the above update may also be performed by the second node.
  • the specific execution process may be that the second node receives the audit information of the first node and uploads it after the consensus is passed to ensure that the first data stored in the address is authentic and reliable. .
  • the address of the network resource may be in the form of a Uniform Resource Identifier (URI).
  • URI Uniform Resource Identifier
  • the life cycle margin For example, taking dairy product production and the first data is the life cycle margin as an example, you can print or paste a QR code on the packaging of raw milk when it leaves the factory.
  • the QR code is generated based on the target URI. After scanning, you can jump to the target URI and see that the life cycle margin of the raw milk is 15 days. Or, if the target URI is used to store the carbon emission balance, the carbon emission balance of the raw milk can also be viewed through the target URI.
  • the barcode can also provide the network addresses of multiple second nodes, and the terminal can send the scanned data to multiple second nodes for verification.
  • the verification passes, it can return a notification of the information verification pass, so that Users can know that the data is true and accurate, and can also ensure that the transaction is true and reliable.
  • analysis can be performed according to different stages involved in different target objects, and the production factors of each stage are decomposed to form a data chain diagram.
  • Corresponding resource consumption indicators can be formulated for each stage, and according to each production factor
  • the characteristics of the company determine the time consumption, transaction amount, and resource consumption for the three types of data, and the above three types of data are streamed at each stage, following the true relationship between the data in economic life. For example, there is a certain relationship between UCXO (Unspent Carbon Transaction Output) and UTXO (Unspent Transaction Output) (Unspent Transaction Output) and UCLO (Unspent Life Cycle Output). Consumption and value consumption will inevitably lead to equivalent resource consumption.
  • UCLO has a certain relationship between UCXO and UTXO. Resource consumption and value consumption are also necessarily equivalent to life cycle consumption. This potential connection makes data They are closely connected to form a seamless data link across each first node, which cannot be tampered with and has actual data value.
  • each first node is associated with each production factor to form a seamless data link layer
  • the basic data layer is also associated with the audit layer, which can form a two-tier data chain layer.
  • the structure while ensuring the authenticity of the data, guarantees the anti-tampering characteristics of the data, which greatly improves the security of the data.
  • the entire process can include: raw milk (A)-dairy production (B)-transportation (C)-e-commerce (D )-Warehousing (E)-logistics (F)-consumer (G).
  • A raw milk
  • B -dairy production
  • C transportation
  • E Warehousing
  • F logistics
  • G logistics
  • the entire process can include: raw milk (A)-dairy production (B)-transportation (C)-e-commerce (D )-Warehousing (E)-logistics (F)-consumer (G).
  • the production factors corresponding to the different links involved may include: A.HP human resources, A.PL production lines, A.PA packaging plants, A.VE transport vehicles, A.EN power plants, and A.WA water plant, etc.
  • the node corresponding to the operating entity in the raw milk phase is represented by the first node A
  • the first node in the dairy production stage is represented by the first node B
  • the following process can be performed:
  • the first node A paid the expenses EX (A.HP), EX (A.PL), EX (A.PA), EX (A.VE) to each production factor in each step of producing raw milk. , EX (A.EN), EX (A.WA), after the transaction is successful, the first node A obtains the following signature data and stores it in the first node A:
  • HP accepts the transaction HASH signature of Sig_EX (HP2A), Sig_CC (HP2A), HP's public key Pubkey (HP);
  • PL accepts A's transaction HASH signature Sig_EX (PL2A), Sig_CC (PL2A), PL's public key Pubkey (PL);
  • PA accepts transaction HASH signatures of Sig_EX (PA2A), Sig_CC (PA2A), PA's public key Pubkey (PA);
  • VE accepts A's transaction HASH signature Sig_EX (VE2A), Sig_CC (VE2A), VE's public key Pubkey (VE);
  • Pubkey refers to the public key of the node
  • Sig_EX refers to the signature data of EX paid by node i to node j
  • Sig_CC refers to the transfer from node i to node i to node j.
  • CC signature data. The above signature data indicates that when the first node A conducts a capital transaction, the corresponding carbon emission transaction is also completed.
  • the first node A obtains the carbon emission balance of the raw milk phase according to the carbon emission index and the carbon emission consumption of the phase, and stores the carbon emission balance in the first node A.
  • the specific calculation method of carbon emission balance can be as follows:
  • UCXO (A) UCXO (Req) –CC (A.HP) –CC (A.PL)-CC (A.PA)-CC (A.VE)-CC (A.EN)-CC (A.WA ).
  • UCXO (A) is the carbon emission balance of the raw milk stage
  • UCXO (Req) is the carbon emission balance indicator of the entire process.
  • this indicator can be decomposed into the carbon emission quota of each economic link according to the total carbon emissions determined by international conferences or industry standards
  • CC (A.HP) is the carbon emission consumption of human resources in the A link. The value is equal to CC (HP2A).
  • CC (A.PL) is the carbon emission consumption of the A line for the production line. Its value is equal to CC (PL2A).
  • CC (A.PA) is the carbon of the A link for the packaging plant.
  • Emission consumption its value is equal to CC (PA2A)
  • CC (A.VE) is the carbon emission consumption of the A link for the transport vehicle
  • CC (VE2A) is the carbon emission consumption of the A link for the transport vehicle
  • CC (A.EN) is the A link
  • the amount of carbon emissions used in power plants is the same as CC (EN2A)
  • CC (A.WA) is the amount of carbon emissions consumed by water plants in section A.
  • the value is equal to CC (WA2A).
  • UCXO (A) may be a carbon emission balance normalized to a single product.
  • the first node A conducts transactions with the first node B.
  • the payment paid by the manufacturer B to the raw milk supplier A for the purchase of raw milk can be used for the transaction EX (B2A).
  • the first node A can Send the life cycle surplus ULCO (A) of the output raw milk to the first node B, and obtain the following signature data and store it in the first node A:
  • B accepts the transaction HASH signature of raw milk from A: Sig_ULCO (A2B), Sig_EX (BtoA), Sig_CC (BtoA), and B's public key Pubkey (B);
  • Sig_ULCO (itoj) refers to the ULCO signature data of the object provided by node j to i.
  • the first node A may perform cross-comparison based on the acquired data of at least two dimensions, and when the acquired data of at least two dimensions match , And then perform the storage step.
  • the first node A obtains audit information, and broadcasts the audit information of the first node to a plurality of second nodes of the data storage system.
  • the first node A generates a hash value of the data based on the stored data, and then signs the hash value based on the private key of the first node A to obtain signature data.
  • the data includes The expenditure and carbon emissions balance of each production factor in each stage of the phase corresponding to the first node A are included.
  • the audit information may include the following:
  • VE2A Sig_EX
  • VE2A Sig_CC
  • Pubkey VE
  • the audit information may also include the public key Pubkey (A) of the first node A, or may also include the first node A using the private key to sign the current stage context information.
  • Context signature data the context information includes at least one of a time stamp, geographic address information, and network address information.
  • the context signature data can be represented by Sig (loc, timestamp, ip), where loc is geographic address information, timestamp is timestamp, and ip is network address information.
  • the audit information including signature data is used as an example for description, and the signature data is obtained by signing the stored signature data of the first node A based on the private key of the first node A.
  • the audit information may also include the stored data of the first node A, that is, the transaction information of the first node A in each link, so that multiple second nodes use the original data of the actual transaction. Perform more intuitive verification.
  • the consensus process may refer to that each second node obtains the target audit information sent after the transaction between the production element and the first node A is successful based on the public key of each production element carried in the audit information, and is based on each production element.
  • the target audit information of the first node verifies the audit information of the first node. If the audit information is consistent, the second node passes the audit information verification of the first node A, and broadcasts a verification pass notification to other second nodes. When the verification pass notification received by any second node meets the consensus pass conditions, it is determined that the consensus passes.
  • the process of verifying the audit information of the first node based on the audit information of each production factor may include: obtaining the target audit uploaded by the at least one target first node according to the audit information.
  • the target audit information refers to the audit information uploaded by each target first node after a transaction with the first node; and compares the target audit information of the at least one target first node with the audit information. When they are consistent, it is determined that the audit information verification is passed.
  • obtaining the target audit information uploaded by the at least one target first node according to the audit information includes: obtaining a public key in at least one piece of signature data in the audit information; corresponding to the obtained public key Obtaining the first node of the at least one target first node according to the public key of the first node, obtaining audit information of the at least one target first node including audit information of the public key of the first node, Target audit information of the at least one target first node.
  • the audit information includes: Sig_EX (PL2A), Sig_CC (PL2A), and if the transaction True and accurate, for the first node PL, the audit information should include: Sig_EX (PL2A), Sig_CC (PL2A).
  • the audit information is consistent, it means that the transaction really exists and the transaction content is accurate.
  • the second node may determine that the verification is passed.
  • the consensus fails, it indicates that the data stored by the first node A does not match the real data, and there may be data fraud at the first node. Therefore, the second node may distort the data of the first node A. The event is logged for subsequent processing.
  • the business entity corresponding to the first node may be marked as a dishonest business entity, or other processing may be performed to achieve the role of punishment and publicity. This application does not do which specific method is adopted. limited.
  • each first node records relevant information of the transactions performed by the nodes, such as the two parties to the transaction, the transaction amount, the transaction location, and the transaction time, which are not described in this embodiment of the present application.
  • the production factors corresponding to the different links involved in the assumption can include: B.HP human resources, B.PL production lines, B.PA packaging plants, B.VE transport vehicles, B.EN power plants, and B.WA
  • B.HP human resources B.PL production lines
  • B.PA packaging plants B.VE transport vehicles
  • B.EN power plants B.WA
  • B.WA B.WA
  • a water plant where the first node of the dairy product production stage is represented by the first node B, the following process can be performed:
  • the first node B conducts a transaction with the first node A.
  • the life cycle balance of the dairy product obtained is ULCO (B).
  • the validity period of the dairy product is 6 months
  • the obtained carbon emission balance is UCXO ( A).
  • HP accepts B's transaction HASH signatures Sig_EX (HP2B), Sig_CC (HP2B), HP's public key Pubkey (HP);
  • PL accepts B's transaction HASH signature Sig_EX (PL2B), Sig_CC (PL2B), PL's public key Pubkey (PL);
  • PA accepts B's transaction HASH signature Sig_EX (PA2B), Sig_CC (PA2B), PA's public key Pubkey (PA);
  • VE accepts B's transaction HASH signatures Sig_EX (VE2B), Sig_CC (VE2B), VE's public key Pubkey (VE);
  • UCXO (B) UCXO (A) –CC (B.HP) –CC (B.PL) –CC (B.PA)-CC (B .VE) –CC (B.EN) –CC (B.WA).
  • CC (B.HP) is the carbon emission consumption for manpower in stage B
  • CC (B.PL) is the carbon emission consumption for production line in stage B
  • CC (B.PA) is stage B for packaging Plant's carbon emission consumption
  • CC (B.VE) is the carbon emission consumption for transport vehicles in stage B
  • CC (B.EN) is the carbon emission consumption for power plants in stage B
  • CC (B.WA) It is the carbon emission consumption for the water plant in stage B.
  • the numerical relationship between the carbon emission consumption and the numerical relationship at the raw milk stage is the same, and will not be repeated here.
  • UCXO (B) may be a carbon emission balance normalized to a single product.
  • UTXO (B) UTXO (Cap) -ex (B.HP)-ex (B.PL)-ex (B.PA)-ex (B.VE)-ex ( B.EN) –ex (B.WA);
  • UTXO is an unused transaction output of a dairy production plant, for example, it can correspond to an investment in a dairy plant.
  • the first node B conducts a transaction with the first node C, and outputs ULCO (B) to the first node C so that after the production is completed, the transportation is completed by the B.VE transport vehicle. Accordingly, the first node B will record the :
  • C accepts transaction HASH signatures from B's dairy products: Sig_ULCO (B2C), Sig_EX (BtoC), Sig_CC (BtoC), and C's public key Pubkey (C).
  • the first node B can transact with the first node C at any time before transportation, and the payment paid by the e-commerce C to the manufacturer B for the purchase of dairy products can be used transaction EX (D2B), and Information about the transaction is stored.
  • the first node B obtains the audit information, and broadcasts the audit information of the first node to a plurality of second nodes of the data storage system.
  • the audit information may include the following:
  • Sig_EX (VE2B), Sig_CC (VE2B), Pubkey (VE),
  • ULCO (F) is the life cycle balance of dairy products when dairy products reach consumers through process D.
  • dairy products it also includes a final stage, which is consumer G.
  • consumer G it can also have a personal carbon emissions allowance rating index UCXO (Ind).
  • UCXO personal carbon emissions allowance rating index
  • this index can be based on The G20's total carbon emissions targets are allocated to individuals.
  • the dairy product packaging in the embodiment of the present application may be marked with a QR code or the like.
  • the consumer can scan the code to obtain the UCLO (F) of the dairy product, that is, the remaining validity period.
  • the UCLO (F) is compared with the shelf life of the dairy product to determine whether the dairy product has expired.
  • UCXO UCXO
  • consumers can also obtain the UCXO (F) corresponding to the above consumer stage G, that is, the remaining carbon emission balance UCXO of this dairy product. Consumers' own UCXOs are affected when purchasing products with different remaining carbon emissions balances.
  • the consumer ’s own carbon emissions balance is UCXO (ind) + (UCXO (G) -UCXO (ave)), where UCXO (ave) is a preset average balance.
  • UCXO (ave) is a preset average balance.
  • consumer stage G also involves the storage of data.
  • the specific principle is the same as the above process, and will not be repeated here.
  • FIG. 7 is a schematic structural diagram of a data storage device according to an embodiment of the present application, which is applied to a first node in a data storage system.
  • the device includes:
  • a first data acquisition module 701 is configured to acquire first data of a target object.
  • a second data acquisition module 702 is configured to acquire second data of the target object, where the first data and the second data are data of different dimensions; the dimension is used to measure any aspect of the target object from generation to existence Information.
  • the storage module 703 is configured to store the first data and the second data of the target object in the first node.
  • the first data of the target includes the life cycle balance of the target at the current stage
  • the second data of the target includes the transaction data of the target at the current stage
  • the life cycle margin of the target at the current stage is the difference between the life cycle margin of the previous stage and the time consuming of the current stage.
  • the time consumption of the current stage is set according to the characteristics of the current stage.
  • the transaction data of the target at the current stage includes transaction data of the target at various stages of the current stage.
  • the transaction data of the target at the current stage further includes signature data of the transaction data of the target at various stages of the current stage.
  • the first data of the target includes a resource consumption margin of the target at the current stage
  • the second data of the target includes a transaction of the target at the current stage. data.
  • the apparatus further includes:
  • a third data acquisition module is configured to acquire third data of the target, the third data being associated with the first data and the second data.
  • the storage module is further configured to store the third data of the target object in the first node when the first data and the second data of the target object are stored in the first node.
  • the third data of the target includes: a resource consumption margin of the target at the current stage.
  • the resource consumption margin of the target at the current stage is the difference between the resource consumption margin of the previous stage and the resource consumption of the current stage.
  • the resource consumption amount of the current stage is a sum of the resource consumption amounts of the target object in each link of the current stage.
  • the resource consumption margin is a carbon emission margin.
  • the apparatus further includes:
  • An audit information acquisition module is configured to acquire audit information of the first node, where the audit information is used to indicate data stored by the first node.
  • a sending module configured to broadcast the audit information of the first node to a plurality of second nodes of the data storage system.
  • the audit information includes data stored by the first node.
  • the audit information includes data stored by the first node within a preset time period.
  • the audit information includes a characteristic value of data stored by the first node.
  • the audit information includes a characteristic value of data stored by the first node within a preset time period.
  • the feature value is a hash value.
  • the audit information includes signature data
  • the signature data is obtained by the first node signing data stored by the first node by using the private key of the first node.
  • the audit information further includes a public key of the first node.
  • the audit information further includes context signature data obtained by the first node using a private key to sign context information at the current stage, where the context information includes time stamps, geographic address information, and network address information. At least one.
  • the storage module is configured to store the first data and the second data of the target object in a resource pool of the first node; when a consensus acknowledgement sent by any second node is received When notifying, the first data and the second data stored in the resource pool are stored in a preset storage space of the first node.
  • the storage module is configured to store the first data and the second data of the target object in the first node when a consensus confirmation notification sent by any second node is received.
  • the apparatus further includes a comparison module for performing cross comparison based on the acquired data of at least two dimensions; when the comparison module determines that the acquired data of at least two dimensions match When triggered, the storage module is triggered to execute the storage step.
  • the apparatus further includes:
  • a barcode module configured to provide a barcode on a product produced at any stage, and the address pointed to by the barcode is used to provide at least one of the latest first data, the latest second data, and the latest third data of the target object .
  • the barcode further provides network addresses of a plurality of second nodes, and the scanning terminal sends the scanned data to the plurality of second nodes for verification.
  • FIG. 8 is a schematic structural diagram of a data verification device according to an embodiment of the present application, which is applied to any second node of a data storage system, and multiple second nodes in the data storage system are configured with a consensus mechanism.
  • Figure 8. The device includes:
  • the receiving module 801 is configured to receive audit information of a first node, where the audit information is used to indicate data that has been stored by the first node.
  • the verification module 802 is configured to verify the audit information based on the target audit information of at least one target first node.
  • the sending module 803 is configured to broadcast a verification pass notification in the data storage system when the verification passes.
  • the verification module 802 is further configured to determine that the audit information consensus passes when the received verification verification notification meets a consensus pass condition.
  • the sending module 802 is further configured to send a consensus confirmation notification to the first node when the audit information consensus is passed.
  • the target audit information is used to indicate data that has been stored by each target first node that conducts transactions with the first node.
  • the verification module 802 is configured to:
  • the verification module 802 is configured to: obtain a public key in at least one piece of signature data in the audit information; and use the first node corresponding to the obtained public key as the at least one target A node; obtaining, according to the public key, audit information including a first node corresponding to the public key, as target audit information of the at least one target first node.
  • the at least one target first node is a counterparty to the transaction indicated by the audit information.
  • the at least one target first node includes a node corresponding to each production factor in the current stage and a node corresponding to the target in a previous stage of the current stage.
  • a data storage system includes multiple first nodes and multiple second nodes, and multiple second nodes in the data storage system are configured with a consensus mechanism
  • Each first node of the plurality of first nodes is configured to obtain first data of a target object; obtain second data of the target object, the first data and the second data are data of different dimensions; Storing the first data and the second data of the target in the first node, and obtaining audit information of the first node, where the audit information is used to indicate the data stored by the first node Broadcasting the audit information of the first node to a plurality of second nodes of the data storage system;
  • Each second node of the plurality of second nodes is configured to receive audit information of the first node, where the audit information is used to indicate data stored by the first node; based on at least one target first
  • the target audit information of the node verifies the audit information; when the verification passes, a verification pass notification is broadcast in the data storage system; when the received verification pass notification meets the consensus pass condition, the audit Information consensus passed.
  • a computer device in some embodiments, includes a processor and a memory.
  • the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the steps of the data storage method.
  • the steps of the data storage method here may be the steps in the data storage method of each of the above embodiments.
  • a computer-readable storage medium is provided. At least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement the steps of the foregoing data storage method.
  • the steps of the data storage method here may be the steps in the data storage method of each of the above embodiments.
  • a computer device in some embodiments, includes a processor and a memory.
  • the memory stores at least one instruction, and the instruction is loaded and executed by the processor to implement the steps of the data verification method.
  • the steps of the data verification method here may be the steps in the data verification method of each of the above embodiments.
  • a computer-readable storage medium is provided. At least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement the steps of the foregoing data verification method.
  • the steps of the data verification method may be the steps in the data verification method of the foregoing embodiments.
  • a data storage system includes multiple first nodes and multiple second nodes.
  • the multiple second nodes in the data storage system are configured with a consensus mechanism, where:
  • Each first node of the plurality of first nodes is used to obtain the first data of the target object; to obtain the second data of the target object, the first data and the second data are data of different dimensions; the dimension is used to measure the target Information about any aspect of the object during its generation to existence; storing the first data and the second data of the target object in the first node, obtaining audit information of the first node, and the audit information is used to indicate the first node's stored information Data; broadcasting audit information of the first node to a plurality of second nodes of the data storage system.
  • Each second node of the plurality of second nodes is configured to receive the audit information of the first node, and the audit information is used to indicate the data stored by the first node; the audit information is based on the target audit information of at least one target first node. Perform verification; when the verification passes, broadcast the verification pass notification in the data storage system; when the received verification pass notification meets the consensus pass conditions, determine that the audit information consensus passes.
  • a computer-readable storage medium such as a memory including instructions, and the foregoing instructions may be executed by a processor in a terminal to implement any one of the methods of the foregoing embodiments.
  • the computer-readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
  • the program may be stored in a computer-readable storage medium.
  • the storage medium mentioned may be a read-only memory, a magnetic disk or an optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种数据存储方法,包括:获取目标物的第一数据;获取所述目标物的第二数据,所述第一数据和所述第二数据为不同维度的数据;所述维度是用于衡量所述目标物在生成到存续期间的任一方面的信息;及将所述目标物的所述第一数据和所述第二数据存储至所述第一节点中。

Description

数据存储方法、数据校验方法、装置、设备及介质
本申请要求于2018年07月5日提交中国专利局,申请号为201810731377.2、发明名称为“数据存储方法、数据校验方法、装置、设备及介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及网络技术领域,特别涉及一种数据存储方法、数据校验方法、装置、设备及存储介质。
背景技术
随着区块链技术的发展,越来越多的业务开始应用区块链作为存储媒介,以实现数据的存储和共享,然而,区块链技术在应用过程中,仅仅能够保证链上数据的可追溯,并不能保证链上数据一定是真实的,也即是,链上数据跟实际的生产生活没有联系,因此,该技术具有很大的局限性,无法辅助真实生产。
发明内容
本申请实施例提供了一种数据存储方法、数据校验方法、装置、设备及存储介质。
一种数据存储方法,由数据存储系统中的第一节点执行,所述方法包括:
获取目标物的第一数据;
获取所述目标物的第二数据,所述第一数据和所述第二数据为不同维度的数据;所述维度是用于衡量所述目标物在生成到存续期间的任一方面的信息;及
将所述目标物的所述第一数据和所述第二数据存储至所述第一节点中。
一种数据校验方法,由数据存储系统的任一第二节点执行,所述数据存储系统中的多个第二节点配置有共识机制,所述方法包括:
接收第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据;
基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验;
当校验通过时,在所述数据存储系统中广播校验通过通知;及
当接收到的校验通过通知满足共识通过条件时,确定所述审计信息共识通过。
一种数据存储装置,所述装置包括:
第一数据获取模块,用于获取目标物的第一数据;
第二数据获取模块,用于获取所述目标物的第二数据,所述第一数据和所述第二数据为不同维度的数据;所述维度是用于衡量所述目标物在生成到存续期间的任一方面的信息;及
存储模块,用于将所述目标物的所述第一数据和所述第二数据存储至所述第一节点中。
一种数据校验装置,所述装置包括:
接收模块,用于接收第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据;
校验模块,用于基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验;
发送模块,用于当校验通过时,在数据存储系统中广播校验通过通知;及
所述校验模块还用于当接收到的校验通过通知满足共识通过条件时,确定所述审计信息共识通过。
一种计算机设备,所述计算机设备包括处理器和存储器,所述存储器中存储有至少一条指令,所述指令由所述处理器加载并执行以实现上述数据存储方法所执行的操作;或所述指令由所述处理器加载并执行以实现上述数据 校验方法所执行的操作。
一种计算机可读存储介质,所述存储介质中存储有至少一条指令,所述指令由所述处理器加载并执行以实现上述数据存储方法所执行的操作;或所述指令由所述处理器加载并执行以实现上述数据校验方法所执行的操作。
一种数据存储系统,所述系统包括多个第一节点和多个第二节点,所述数据存储系统中的多个第二节点配置有共识机制,
所述多个第一节点中的每个第一节点,用于获取目标物的第一数据;获取所述目标物的第二数据,所述第一数据和所述第二数据为不同维度的数据;所述维度是用于衡量所述目标物在生成到存续期间的任一方面的信息;将所述目标物的所述第一数据和所述第二数据存储至所述第一节点中,获取所述第一节点的审计信息,所述审计信息用于指示所述第一节点所存储的数据;向所述数据存储系统的多个第二节点广播所述第一节点的审计信息;
所述多个第二节点中的每个第二节点,用于接收所述第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据;基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验;当校验通过时,在所述数据存储系统中广播校验通过通知;当接收到的校验通过通知满足共识通过条件时,确定所述审计信息共识通过。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征、目的和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种数据存储系统的结构示意图;
图2是本申请实施例提供的一种计算机设备的示意图;
图3是本申请实施例提供的一种数据存储方法的流程图;
图4是本申请实施例提供的一种数据校验方法的流程图;
图5是本申请实施例提供的一种数据校验过程中的数据关联网络示意图;
图6是本申请实施例提供的一种乳制品从生产到流通中不同阶段以及各个阶段的不同环节中所涉及的实施过程的示意图;
图7是本申请实施例提供的一种数据存储装置的结构示意图;
图8是本申请实施例提供的一种数据校验装置的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
图1是本申请实施例提供的一种数据存储系统的结构示意图。该系统包括多个第一节点101以及多个第二节点102;
该多个第一节点中的每个第一节点,用于获取目标物的第一数据;获取该目标物的第二数据,该第一数据和第二数据为不同维度的数据;将该目标物的第一数据和该第二数据存储至该第一节点中,获取该第一节点的审计信息,该审计信息用于指示该第一节点所存储的数据;向该数据存储系统的多个第二节点广播该第一节点的审计信息;
该多个第二节点用于接收该第一节点的审计信息,该审计信息用于指示该第一节点已存储的数据;基于至少一个目标第一节点的目标审计信息对该审计信息进行校验;当校验通过时,在该数据存储系统中广播校验通过通知;当接收到的校验通过通知满足共识通过条件,该审计信息共识通过。
其中,该多个第一节点101可以分别为不同经营实体的节点,用于存储与对应的经营实体的生产、交易相关的数据,各个第一节点101可以采用数据库或区块的方式存储自身的数据,数据库的方式即是为各个数据建立索引,并基于索引将数据存储至对应存储空间,而区块的方式是指对于第一节点上 所存储的数据,每条数据之间有一定的关联,可以采取同理于区块链中的区块形式,以保证数据的不可篡改性。上述多个第一节点101可以构成数据存储系统的基础数据层,还可以分别为对应经营实体提供数据查询功能,以便追溯与其他节点之间的交易和自身的生产活动。具体地,多个第一节点101之间可以进行通信,以便进行交易,例如,第一节点1可以与第一节点2进行交易,从而通过该第一节点1的账户向该第一节点2对应的账户进行转账、产品交付、信息互通等过程,从而完成与第一节点2的交易。当然,该交易的完成可以是指线上交易完成,在实际交易过程中,还可能涉及相关的线下运输等,本申请实施例对此不做限定。另外,需要说明的是,该第一节点还可以是经营实体的代理节点,用以代理一个或多个经营实体进行线上交易以及数据存储等,当该第一节点代理一个或多个经营实体时,可以为不同经营实体分别进行数据存储,并可以通过设置密钥等手段,来保证各个经营实体的数据隐私性。
多个第二节点102可以用于对多个第一节点在生产、交易过程中所产生的数据进行校验,并基于交易结果指示第一节点的数据真实性。需要说明的是,该多个第二节点102可以部署同一条区块链,也即是,该多个第二节点102可以遵循同一套共识机制,可以分别对第一节点101的数据进行校验,并基于共识机制,基于多个第二节点102的校验结果,来进行共识,如果校验结果符合共识通过条件(例如,校验通过的第二节点个数超过总数的2/3),则该多个第二节点102达成共识,确定第一节点101的数据真实性,而当校验结果不符合共识通过条件,则该多个第二节点101未达成共识,确定第一节点101的数据不具有真实性。需要说明的是,本申请实施例对具体采用哪种共识机制不做限定。
上述多个第一节点101构成了数据存储系统的基础数据层,用于进行各自节点的数据存储,而该多个第二节点102构成该数据存储系统的审计层,用于为多个第一节点101提供验证服务,各个第一节点101之间可以具有一定的数据隔离性,例如,第一节点1的交易数据对于第一节点2不可见,而 第一节点1可以向第二节点发送携带账户信息的交易请求。而各个第一节点101的数据对于该多个第二节点102来说是透明或相对透明的,也即是,第二节点102可以获取到第一节点101所存储的数据或数据的特征值(例如哈希值),本申请实施例在后续会对其具体获取等过程进行详述。
其中,该第一节点或第二节点可以被提供为任一种计算机设备,例如,图2是本申请实施例提供的一种计算机设备的示意图,该计算机设备200可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上处理器(central processing units,CPU)201和一个或一个以上的存储器202,其中,所述存储器202中存储有至少一条指令,所述至少一条指令由所述处理器201加载并执行以实现下述各个实施例提供的数据存储方法或数据校验方法。当然,该计算机设备还可以具有有线或无线网络接口、键盘以及输入输出接口等部件,以便进行输入输出,该计算机设备还可以包括其他用于实现设备功能的部件,在此不做赘述。
图3是本申请实施例提供的一种数据存储方法的流程图。该数据存储方法可以应用于如图1的任一个第一节点,参见图3,该方法包括:
S301、获取目标物的第一数据。
其中,目标物可以是任一种能够进行线下或线上交易或流通的产品。该目标物可以为一种有形产品,该有形产品可以基于手工生产或机器生产获得,例如,该有形产品可以为食品、日化用品、家居用品、家电等等,本申请实施例不做具体限定。该目标物还可以为票据类产品,也即是,以票据形式来表示的产品,例如,该目标物可以为股票、债券、基金份额等金融产品。当然,该目标物还可以为虚拟产品,也即是,可以为一种采用电子数据形式表示的产品,其可以对应于一定的实际货币价值或虚拟货币价值,该货币价值可以不是固定的,而是根据市场规律进行浮动,例如,该虚拟产品可以为金融产品,如线上基金产品、线上股票产品等等。
该第一数据可以是指该目标物的一个维度的数据,该维度是指用于衡量目标物在生成到其存续期间的任一方面的信息。例如,维度可以包括时间维 度、交易维度、环保维度等等。其中,时间维度上可以包括目标物的已存续时间、目标物距离消亡所剩余的时间、目标物距离其结算或者到期所剩余的时间等等。交易维度可以包括目标物在生成到存续期间的所关联的交易行为的交易双方、交易金额、交易时间等等。而环保维度可以包括有害物质排放或生成情况,例如碳排放情况、甲醛产生情况、工业废料产生情况等等。
S302、获取该目标物的第二数据,该第一数据和第二数据为不同维度的数据;维度是用于衡量目标物在生成到存续期间的任一方面的信息。
其中,该第二数据可以是指与第一数据不同维度的数据。例如,第一数据为时间维度的数据,则第二数据可以为交易维度或环保维度。
S303、将该目标物的第一数据和该第二数据存储至第一节点中。
第一节点可以存储有该节点的生产或交易的相关数据,该数据可以包括该节点所对应的目标物的生产阶段或流通阶段所发生的任一种交易的信息。
需要说明的是,在进行数据存储时,第一节点可以将第一数据和第二数据进行对应存储,便于查询。例如,第一节点可以将第一数据和第二数据存储在第一节点的数据库的一条数据项中或相关数据项中,还可以将第一数据和第二数据存储在一个区块中,也可以将第一数据和第二数据分别存储至不同区块,并用相同的数据标识来进行标识,以便于查询。
在一些实施例中,第一节点可以在存储之前,基于已获取到的至少两个维度的数据进行交叉比对,当所述已获取到的至少两个维度的数据匹配时,执行步骤S303的存储步骤。由于各个维度的数据之间应符合一定函数关系,因此,可以基于该维度之间的函数关系,来对至少两个维度的数据进行交叉比对,当比对结果为匹配时,则可以存储,如果比对结果为不匹配,则不执行存储步骤。例如,生命周期、碳排放之间应具有一定的函数关系,例如,当生命周期减少2天,则其碳排放应增加10个单位,而如果上述多维数据之间不满足该函数关系,则说明数据有误,其比对结果为不匹配。
需要说明的是,上述交叉比对可以是针对本申请实施例所提供的任意维度数据,也即是,当所获取到的为第一数据、第二数据时,则基于第一数据 和第二数据进行比对;当获取到的为第一数据、第二数据和第三数据时,则基于第一数据、第二数据和第三数据进行比对,同理,所获取到的还包括其他数据时,遵循上述原则执行比对过程。当然,上述比对仅仅是对具体比对过程的一个简单示例,本申请实施例还可以基于多维数据进行其他比对过程,本申请实施例对此不作限定。
本申请实施例主要通过获取目标物的不同维度的数据,可以从多个角度来对目标物从生产阶段到流通阶段的各个阶段和各个环节进行记录,能够达到将线上数据与真实的生产生活紧密关联的目的,使得线上数据具有实际意义,不再仅是一些虚拟货币的简单表达。进一步地,在本申请的各个实施例中,各个阶段所对应的第一节点所记录的多个维度的数据彼此相关,不仅各个阶段和各个环节均可以互为验证,且多个维度的数据之间也可以互为验证,构成一个流式的、无缝的数据链,且由于各个第一节点的数据均存储在节点自身上,提高了数据的安全性。
对于目标物来说,其从生产到流通可以包括多个阶段,该多个阶段可以根据实际需求划分,以食品来说,可以包括原材料生产阶段、目标物的生产阶段、运输阶段、销售阶段等。其中,销售阶段根据销售方式不同,还可以包括不同的阶段,例如,如果采用电商销售的方式,则可以包括电商阶段、仓储阶段、物流阶段以及消费者阶段,而如果采用直营销售的方式,则可以包括上架阶段以及消费者阶段,又以任一种虚拟产品为例,可以包括设计阶段、试运行阶段或预售阶段、正式发布阶段等等。
基于图3所示的实施例,在一些实施例中,该目标物的第一数据包括该目标物在当前阶段的生命周期余量,该目标物的第二数据包括该目标物在该当前阶段的交易数据。
其中,生命周期是指一个目标物从原始状态到目标物生成、再到目标物的存续期满或目标物达到使用期限或目标物耗尽之间的时间段。例如,对于食品来说,其可以表现为保质期,以牛奶为例,其保质期可以为30天,对于一种虚拟产品来说,可以表现为生效期,以金融产品为例,其生效期可以为 60天,以软件产品为例,其生效期可以表示为使用权限的生效期,例如,高级会员的有效期为1个月,对于一种电子产品来说,可以表现为报废期限或使用次数,例如一台洗衣机,其报废期限可以为5年或是使用10000次。基于上述对生命周期的介绍,可以获知生命周期余量即是指当前时间点该目标物的生命周期的剩余量。例如,对于上述食品来说,其生命周期为30天,而此时如果已经经过了10天的流通,则其生命周期余量为20天。在目标物的各个阶段中,均可能发生一定消耗,会对该目标物的使用或存续造成影响,因此,为了对这种影响进行记录,则可以获取目标物的生命周期余量。
在一些实施例中,对于目标物的各个阶段,均可以具有对应的生命周期余量,当然,也可以在目标物的某些阶段,才具有对应的生命周期余量,具体可以根据目标物的特性来确定。例如,对于一些具有原材料的目标物,则其在原材料的生产阶段,即已经具有对应的生命周期余量,而在后续的各个阶段中,其生命周期余量均是在原材料的生产阶段的生命周期余量的基础上进行递减,而对于一些不具有原材料的目标物来说,则可以在其某个阶段才出现生命周期的概念,本申请实施例对此不做限定。通过上述描述,可以获知,如果该第一节点所对应的阶段为生命周期的起始阶段,则该生命周期余量的数值等于生命周期的长度。
在一些实施例中,该生命周期余量可以采用任一种时间粒度来表达,其具体所采用的时间粒度可以根据目标物的类型不同设置。在一些实施例中,该生命周期余量还可以包括生命周期余量的数值以及生命周期的起始时间,以便提供一个直观的时间点,来进一步表示该目标物的可存续或可使用情况。
在一些实施例中,该目标物在当前阶段的生命周期余量为上一阶段的生命周期余量与该当前阶段的耗时的差值。
其中,目标物在当前阶段的生命周期余量的获取过程可以包括:获取上一阶段的生命周期余量以及该当前阶段的耗时,再获取上一阶段的生命周期余量以及该当前阶段的耗时的差值,作为当前阶段的生命周期余量。
对于第一节点来说,在开始当前阶段的处理前,可以获取到该目标物的 上一阶段对应的第一节点所发送的生命周期余量,该生命周期余量可以在与上一阶段对应的第一节点之间的交易完成时获取,由上一阶段对应的第一节点发送至该当前阶段的第一节点,在发送生命周期余量时,该上一阶段对应的第一节点还可以发送采用私钥对生命周期余量进行签名得到的签名数据以及该上一阶段对应的第一节点的公钥。
在一些实施例中,该当前阶段的耗时可以根据该当前阶段的特性设置。各个阶段可以与不同的投入活动或支出活动的环节相关联,例如人力资源、生产、包装、运输、供电以及供水等,各个环节可能对应于不同的耗时,因此,不同阶段的耗时可以不同,需要对各个阶段所关联的环节的耗时进行分析,以确定该阶段的耗时。当然,在一些实施例中,可以根据经验来设置各个阶段的耗时,也可以基于对各个阶段的历史处理耗时的分析,来设置各个阶段的耗时,当然,还可以根据各个阶段所关联的各个环节的历史处理耗时的分析,来设置各个阶段的耗时,以达到对生命周期余量更加精准的计算的目的。在一些实施例中,各个阶段的耗时还可以实时统计,以便根据真实数据来获取更为真实的生命周期余量。
在一些实施例中,该目标物在该当前阶段的交易数据包括该目标物在该当前阶段的各个环节的交易数据,目标物在所述当前阶段的交易数据还包括所述目标物在所述当前阶段的各个环节的交易数据的签名数据。该第一节点在当前阶段的各个环节,会记录各个环节所发生的交易的交易信息,例如,在运输环节,该第一节点的账户1向承担运输业务的节点的账户2转入的费用EX,并且,还会获取到各个环节的交易对方在接受交易后所提供的签名数据,该签名数据可以是该交易对方的第一节点对交易信息采用私钥进行签名得到,例如,该签名数据可以为Sig_(EX(账户1to账户2))。可选地,交易对方还可以在返回签名数据时,也返回交易对方的公钥,以便对交易对方以及签名数据进行验证。
在一些实施例中,所述目标物的第一数据包括所述目标物在所述当前阶段的资源消耗余量,所述目标物的第二数据包括所述目标物在所述当前阶段 的交易数据。
对于目标物来说,在目标物的各个阶段中,均可能发生一定资源消耗,会对环境造成影响,因此,为了限制这种影响,则需要对这种数据进行记录。
其中,资源消耗是指一个目标物从原始状态到目标物生成、再到目标物的存续期满或目标物达到使用期限或目标物耗尽之间对一些限定资源的消耗情况。例如,对于工业产品来说,其可以表现为工业生产活动消耗资源导致的附带物质的排放量等,例如可以是碳排放量或甲醛排放量等等的生产附带物质的排放量等。
在一些实施例中,该目标物在该当前阶段的资源消耗余量为上一阶段的资源消耗余量与该当前阶段的资源消耗量的差值。
其中,目标物在当前阶段的资源消耗余量的获取过程可以包括:第一节点获取上一阶段的资源消耗余量以及该当前阶段的资源消耗量,再获取上一阶段的资源消耗余量以及该当前阶段的资源消耗量的差值,作为当前阶段的资源消耗余量。
对于第一节点来说,在开始当前阶段的处理前,可以获取到该目标物的上一阶段对应的第一节点所发送的资源消耗余量,该资源消耗余量可以在与上一阶段对应的第一节点之间的交易完成时获取,由上一阶段对应的第一节点发送至该第一节点,在发送资源消耗余量时,该上一阶段对应的第一节点还可以发送采用私钥对资源消耗余量进行签名得到的签名数据以及该上一阶段对应的第一节点的公钥。
在一些实施例中,该当前阶段的资源消耗量为该目标物在该当前阶段的各个环节的资源消耗量的和值。该第一节点在当前阶段的各个环节,会记录各个环节所发生的交易的交易信息以及基于交易所获取到的资源消耗量,例如,在运输环节,该第一节点的账户1向承担运输业务的节点的账户2转入的EX,并且,还会获取到各个环节的交易对方基于交易所提供的碳排放量CC,相应地,所获取到的签名数据则是基于交易信息和资源消耗量进行签名得到的签名数据。
需要说明的一点是,上述资源消耗余量可以为归一化到单件目标物的资源消耗余量,例如,对于碳排放余量来说,该碳排放余量可以为归一化到单件产品的碳排放余量。需要说明的又一点是,对于任一种目标物来说,可以设置其资源消耗指标,以根据资源消耗指标来指导实际生成,例如,针对碳排放量来说,可以基于国际会议所制定的碳排放量上限来设置。
在一些实施例中,该方法还包括:第一节点获取该目标物的第三数据,该第三数据和该第二数据相关联;当将该目标物的第一数据和该第二数据存储至第一节点中时,将该目标物的第三数据存储至该第一节点中。
其中,第三数据的维度可以与第一数据和第二数据均不相同。第三数据的产生可以与第二数据的产生相关联,第二数据可以是目标物在当前阶段的交易数据,是基于针对目标物的生成或流通过程的投入或支出行为产生的,而第三数据也是基于目标物的生成或流通过程的投入或支出行为产生的,随着第二数据的产生,可以产生相应的第三数据。
在此需要说明的是,第二数据并不必然具有关联的第三数据,而第三数据必然是由于第二数据的产生而产生,如,当任一笔支出行为发生时,交易双方即进行了资金交易,也完成了相应的资源消耗维度的交易(例如,卖出方的碳排放量由于该交易而转移到了买入方)。
需要说明的是,在进行数据存储时,第一节点可以将第一数据、第二数据和第三数据存储在一个区块中,也可以将第一数据、第二数据和第三数据分别存储至不同区块,并用相同的数据标识来进行标识,以便于查询。当然,还可以将第二数据和第三数据存储在一个区块,而将第一数据存储在另一区块,并用相同的数据标识来进行标识,本申请实施例对此不做限定。
在一些实施例中,该目标物的第三数据包括:该目标物在该当前阶段的资源消耗余量。例如,第一数据可以为当前阶段的生命周期余量,第二数据为当前阶段的交易数据,第三数据可以为目标物在该当前阶段的资源消耗余量,所述资源消耗余量为碳排放余量。
在一些实施例中,第一节点还可以获取所述第一节点的审计信息,所述 审计信息用于指示所述第一节点所存储的数据;向所述数据存储系统的多个第二节点广播所述第一节点的审计信息。
需要说明的是,对于第一节点来说,可以在还未进行第一数据和第二数据的存储时,执行上述获取第一节点的审计信息的步骤,也即是,在执行完步骤S301和S302时,执行上述审计信息的获取和广播步骤,由此,在接收到共识确认通知时,再执行将所述目标物的第一数据和所述第二数据存储至所述第一节点中的步骤。
在一些实施例中,对于第一节点来说,还可以具有用于暂时存储数据的资源池,也即是,在获取到第一数据和第二数据时,可以先将所述目标物的第一数据和所述第二数据存储至所述第一节点的资源池中;当接收到任一第二节点发送的共识确认通知时,将所述资源池中所存储的第一数据和第二数据存储至所述第一节点的预设存储空间中。
在一些实施例中,所述审计信息包括所述第一节点所存储的数据;或,所述审计信息包括所述第一节点在预设时间段内所存储的数据。在该种实现方式中,审计信息可以是第一节点所存储的数据本身,而不是特征值,使得第二节点可以得到交易的原始数据,大大提高了第二节点的验证精度。
在一些实施例中,所述审计信息包括所述第一节点所存储的数据的特征值;或,所述审计信息包括所述第一节点在预设时间段内所存储的数据的特征值。其中,该预设时间段内所存储的数据可以是第一节点在至少一次生产过程中获取到的数据,而不仅仅是某一次生产过程中获取到的数据,以避免生产规模较大生产频率较高时所造成的过度频繁的数据发送。
其中,特征值可以为哈希值,或是任一种基于不可逆算法进行计算得到的特征值。
一些实施例中,该审计信息为签名数据,该签名数据由该第一节点采用该第一节点的私钥对第一节点所存储的数据进行签名得到。该签名可以使得第二节点获知该审计信息的来源节点。在一些实施例中,该审计信息还包括该第一节点的公钥。该公钥可以供第二节点基于公钥和签名数据进行校验, 确定该审计信息确实来自于该第一节点,再基于签名数据解压后得到的特征值或其他数据,来进行具体校验过程。
在一些实施例中,该审计信息还包括该第一节点采用私钥对当前阶段的上下文信息进行签名得到的上下文签名数据,该上下文信息包括时间戳、地理地址信息以及网络地址信息中至少一项。上下文信息可以提供该待审计的数据对应的发生时间和发生环境等信息,可以保证数据的可追溯性。
对于审计层的第二节点来说,可以有如图4和图5的数据交互。图4为本申请实施例所提供的一种数据校验方法的流程图;图5为本申请实施例所提供的一种数据校验过程中的数据关联网络示意图。如图4所示,该数据校验方法包括:S401,多个第二节点接收第一节点的审计信息;S402,每个第二节点根据审计信息,获取至少一个目标第一节点所上传的目标审计信息;S403,每个第二节点将所述至少一个目标第一节点的目标审计信息与该审计信息进行比对;S404,当匹配时,该第二节点确定该审计信息校验通过,并向该多个第二节点广播校验通过通知;S405,多个第二节点进行共识过程,当接收到的校验通过通知满足共识通过条件时,确定审计信息共识通过。
参考图4和图5,第二节点接收第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据;基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验;当校验通过时,第二节点在所述数据存储系统中广播校验通过通知;当接收到的校验通过通知满足共识通过条件时,确定所述第一审计信息共识通过。当所述审计信息共识通过时,第二节点还可以向所述第一节点发送共识确认通知。
其中,上述已存储的数据可以为第一数据和第二数据,或第一数据、第二数据和第三数据,或,第二数据和第三数据,当然,根据不同的数据需求,还可以有第一数据和第三数据的组合,本申请实施例对此不做限定。
所述第一节点包含所述目标第一节点,所述目标第一节点是所述多个第一节点中的一个节点。目标第一节点可以是指一个或多个与该第一节点当前的生产活动相关联的节点,例如,该目标第一节点可以为某种目标物的生产 或流通过程中在该第一节点的上游节点,或者,该目标第一节点可以为参与该第一节点的某一个生产环节(也即是某个生产要素)的节点(例如,可以是为该第一节点提供运输服务的公司对应的第一节点)。因此,所述目标节点对应的所述目标审计信息用于指示与所述第一节点进行交易的各个目标第一节点已存储的数据。
在本申请的各个实施例中,由审计层为数据存储系统中的各个第一节点提供校验功能,由于审计层的多个第二节点能够获取到各个第一节点的审计信息,因此,可以通过审计信息的交叉比对,确定待存储数据的真实性和准确性,在保证数据安全性的同时,保证了数据的真实性和准确性。
在一些实施例中,第二节点可以根据第一节点自身所提供的审计信息中的多维数据进行交叉比对,当多维数据符合预设函数关系时,则确定该审计信息校验通过。因此,至少一个目标第一节点也可以是所述第一节点自身,至少一个目标第一节点的目标审计信息也可以是所述第一节点自身的审计信息。
在一些实施例中,上述第二节点基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验包括:第二节点根据所述审计信息,获取所述至少一个目标第一节点所上传的目标审计信息,该目标审计信息可以是指各个目标第一节点在与该第一节点进行交易后上传的审计信息;第二节点将所述至少一个目标第一节点的目标审计信息与该审计信息进行比对,当所述至少一个目标第一节点的目标审计信息与该审计信息匹配时,确定该审计信息校验通过。
其中,所述第二节点根据所述审计信息,获取所述至少一个目标第一节点所上传的目标审计信息包括:第二节点获取所述审计信息中至少一条签名数据内的公钥;第二节点将获取到的公钥所对应的第一节点作为所述至少一个目标第一节点;根据所述公钥,获取包含所述公钥所对应的第一节点的审计信息,作为所述至少一个目标第一节点的目标审计信息。
其中,第二节点将所述至少一个目标第一节点的目标审计信息与第一节 点的审计信息进行比对的过程中,在一些实施例中,目标审计信息及审计信息不是节点所存储的原始数据,而是数据的特征值的签名,则该比对过程可以包括:首先,基于各个节点的公钥对签名分别进行解压,得到至少一个目标第一节点的目标特征值与该第一节点的特征值,然后,判断该第一节点的特征值中是否包括上述至少一个目标第一节点的目标特征值,如果包括,则说明交易一一对应,且交易内容一一对应,确定所述至少一个目标第一节点的目标审计信息与该审计信息匹配,在匹配时,确定该审计信息校验通过。
在一些实施例中,审计信息可以是经过签名的第一节点所存储的数据,则第二节点可以根据各个不同节点所提供的审计信息中的多维数据进行交叉比对,当多维数据符合预设函数关系时,则确定所述至少一个目标第一节点的目标审计信息与该审计信息匹配,在匹配时,确定该审计信息校验通过。
在一些实施例中,所述至少一个目标第一节点为所述审计信息所指示的交易的交易对方。
在一些实施例中,所述至少一个目标第一节点包括:所述至少一个目标第一节点包括:所述当前阶段的各个生产要素所对应的节点和所述目标物在所述当前阶段的上一阶段所对应的节点。
在一些实施例中,该方法还包括:第一节点在任一阶段的出产产品上提供条形码,所述条形码所指向的地址用于提供所述目标物最新的第一数据或最新的第三数据中至少一项。该条形码可以为一维码、二维码等形式,条形码可以指向某一网络资源的地址,该地址中所存储的数据可以根据目标物目前所处的阶段的第一数据进行更新,以使得每次扫码均可以得到该目标物最新的第一数据、第一节点的第二数据和最新的第三数据中的至少一项,从而通过条形码来形成对数据存储系统中数据的指针,将真实产品和产品所对应的线上数据关联起来。对于面向用户的条形码来说,可以不提供涉及交易隐私的第二数据,但是,如果是面向审计工作的条形码来说,则在该条形码所指向的地址中还可以提供目标物的第二数据。例如,可以提供原料乳生产过 程中第一节点的交易数据等,具体提供哪些数据可以根据实际需求设置,本申请实施例对此不作限定。
需要说明的是,对该地址所存储的数据进行更新可以由第一节点进行,以第一数据的更新为例,当任一第一节点完成交易时,可以将第一数据更新至该地址,当然,该地址包含的内容可以包括更新时间戳,第一节点可以根据更新时间戳和待上传的第一数据的时间戳进行对比,如果待上传的第一数据的时间戳晚于该更新时间戳,则上传第一数据,覆盖该地址上已有的第一数据,如果待上传的第一数据的时间戳不晚于该更新时间戳,则不上传第一数据。另外,上述更新还可以由第二节点进行,其具体执行过程可以是在第二节点接收到第一节点的审计信息,并共识通过后上传,以保证该地址中所存储的第一数据真实可靠。
其中,该网络资源的地址可以采用统一资源标识符(Uniform Resource Identifier,URI)形式。
例如,以乳制品生产、且第一数据为生命周期余量为例,可以在原料乳出厂时在其包装上印刷或粘贴二维码,该二维码基于目标URI生成,则当用户使用终端进行扫描后,可以跳转到该目标URI,查看到该原料乳的生命周期余量为15天。或者,如果该目标URI用于存储碳排放余量,则还可以通过该目标URI,查看到该原料乳的碳排放余量。
当然,该条形码还可以提供多个第二节点的网络地址,该终端可以将扫描得到的数据发送至多个第二节点进行校验,当校验通过时,则可以返回信息校验通过通知,使得用户可以获知该数据真实准确,也可以保障交易真实可靠。
对于本申请的实施来说,可以根据不同目标物所涉及的不同阶段进行分析,分解各个阶段的生产要素,以形成数据链图,可以为各个阶段制定对应的资源消耗指标,并根据各个生产要素的特性,为其确定耗时、交易金额以及资源消耗量等,且上述三种数据在各个阶段采用了流式表达,遵循数据之 间在经济生活中的真实关联。例如,UCXO(Unspent Carbon Transaction Output,碳排放余量)与UTXO(Unspent Transaction Output,未使用交易输出)和UCLO(Unspent Life Cycle Output,生命周期余量)之间具有一定的关联关系,生命周期的消耗以及价值消耗必然带来对等的资源消耗,UCLO又与UCXO和UTXO之间具有一定的关联关系,资源消耗以及价值消耗,也必然和生命周期的消耗对等,这样的潜在联系,使得数据之间紧密相连,形成跨各个第一节点的无缝的数据链,无法篡改,具有实际的数据价值。
进一步地,该各个第一节点所构成的基础数据层与各个生产要素关联,形成无缝的数据链层,且,该基础数据层还与审计层之间关联,可以形成双层数据链层的结构,在保证数据真实性的同时,保障数据的防篡改特性,大大提高了数据的安全性。
参见图6,以一种乳制品从生产到流通中不同阶段以及各个阶段的不同环节中所涉及的实施过程、所涉及到的资源消耗以碳排放为例进行说明:
首先,对下述具体说明过程中出现的一些名词进行介绍:
CC:Carbon Cost,碳排放消耗量
ULCO:Unspent Life Cycle Output,生命周期余量
EX:expense,费用。
然后,对乳制品的各个阶段进行介绍:对于一种乳制品来说,其整个过程可以包含:原料乳(A)——乳制品生产(B)——运输(C)——电商(D)——仓储(E)——物流(F)——消费者(G)。基于上述生产到流通的流程,原料乳在生产完成之后,可以经过运输,进入乳制品生产阶段,在乳制品生产完成后,可以经过运输,到达电商阶段,在电商阶段进行发布后,则可以进入仓储阶段,而当乳制品被订购,则可以进入物流阶段,并在物流阶段完成后,进入消费者阶段。
在原料乳阶段A中,假设所涉及到的不同环节所对应的生产要素可以包括:A.HP人力资源、A.PL生产线、A.PA包装厂、A.VE运输车、A.EN电厂以及A.WA水厂等,将原料乳阶段的经营实体所对应的节点用第一节点A表 示,将乳制品生产阶段的第一节点以第一节点B表示,则可以有如下过程:
1、第一节点A在生产原料乳的各个环节中,分别向各个生产要素支付了费用EX(A.HP)、EX(A.PL)、EX(A.PA)、EX(A.VE)、EX(A.EN)、EX(A.WA),在交易成功后,该第一节点A获取到以下签名数据,并存储在该第一节点A中:
HP接受A的交易HASH签名Sig_EX(HP2A),Sig_CC(HP2A),HP的公钥Pubkey(HP);
PL接受A的交易HASH签名Sig_EX(PL2A),Sig_CC(PL2A),PL的公钥Pubkey(PL);
PA接受A的交易HASH签名Sig_EX(PA2A),Sig_CC(PA2A),PA的公钥Pubkey(PA);
VE接受A的交易HASH签名Sig_EX(VE2A),Sig_CC(VE2A),VE的公钥Pubkey(VE);
EN接受A的交易HASH签名Sig_EX(EN2A),Sig_CC(EN2A),EN的公钥Pubkey(EN);
WA接受A的交易HASH签名Sig_EX(WA2A),Sig_CC(WA2A),WA的公钥Pubkey(WA);
其中,Pubkey()是指节点的公钥,Sig_EX(itoj)是指节点i对节点j向节点i支付的EX的签名数据,Sig_CC(itoj))是指节点i对节点i向节点j转移的CC的签名数据,上述签名数据表示在第一节点A进行资金交易时,也完成相应的碳排放交易。
2、第一节点A根据碳排放量指标和该阶段的碳排放消耗量,得到原料乳阶段的碳排放余量,并存储在该第一节点A中。
其中,碳排放余量的具体计算方式可以如下:
UCXO(A)=UCXO(Req)–CC(A.HP)–CC(A.PL)–CC(A.PA)–CC(A.VE)–CC(A.EN)–CC(A.WA)。
其中,UCXO(A)是该原料乳阶段的碳排放余量,UCXO(Req)是整个流程碳排放余量指标。例如,这个指标可以根据国际会议或行业标准等确定的碳排放总量,分解到每个经济环节的碳排放额度;CC(A.HP)是A环节用于人力资源的碳排放消耗量,其数值与CC(HP2A)相等,CC(A.PL)是A环节用于生产线的碳排放消耗量,其数值与CC(PL2A)相等,CC(A.PA)是A环节用于包装厂的碳排放消耗量,其数值与CC(PA2A)相等,CC(A.VE)是A环节用于运输车的碳排放消耗量,其数值与CC(VE2A)相等,CC(A.EN)是A环节用于电厂的碳排放消耗量,其数值与CC(EN2A)相等,CC(A.WA)是A环节用于水厂的碳排放消耗量,其数值与CC(WA2A)相等。
可选地,UCXO(A)可以是归一化到单件产品的碳排放余量。
3、第一节点A与第一节点B进行交易,由生产厂家B支付给原料乳供应商A用于购买原料乳的款项可用交易EX(B2A),在交易成功后,该第一节点A可以将输出的原料乳的生命周期余量ULCO(A)发送给第一节点B,并获取到以下签名数据,并存储在该第一节点A中:
B接受来自A的原料乳的交易HASH签名:Sig_ULCO(A2B)、Sig_EX(BtoA)、Sig_CC(BtoA)和B的公钥Pubkey(B);
其中,Sig_ULCO(itoj)是指节点j对i向j提供的目标物的ULCO的签名数据。
在上述1、2和3的任意过程中,该第一节点A均可以基于已获取到的至少两个维度的数据进行交叉比对,当所述已获取到的至少两个维度的数据匹配时,再执行存储步骤。
4、第一节点A获取审计信息,向该数据存储系统的多个第二节点广播该第一节点的审计信息。
具体地,该第一节点A基于已存储的数据,生成该数据的哈希(HASH)值,再基于第一节点A的私钥对该哈希值进行签名,得到签名数据,该数据中包括了第一节点A对应的阶段中各个环节针对各个生产要素的支出和碳排 放余量,例如,该审计信息可以包括如下内容:
Sig((Sig_EX(HP2A),Sig_CC(HP2A),Pubkey(HP),
Sig_EX(PL2A),Sig_CC(PL2A),Pubkey(PL),
Sig_EX(PA2A),Sig_CC(PA2A),Pubkey(PA),
Sig_EX(VE2A),Sig_CC(VE2A),Pubkey(VE),
Sig_EX(EN2A),Sig_CC(EN2A),Pubkey(EN),
Sig_EX(WA2A),Sig_CC(WA2A),Pubkey(WA),
Sig_ULCO(A2B),Pubkey(B))
可选地,除了上述的内容,该审计信息还可以包括第一节点A的公钥Pubkey(A),或者,还可以包括该第一节点A采用私钥对当前阶段的上下文信息进行签名得到的上下文签名数据,该上下文信息包括时间戳、地理地址信息以及网络地址信息中至少一项。该上下文签名数据可以用Sig(loc,timestamp,ip)表示,其中,loc为地理地址信息,timestamp为时间戳,ip为网络地址信息。
在本示例中,仅以该审计信息包括的是签名数据为例进行说明,且该签名数据是基于第一节点A的私钥对第一节点A已存储的签名数据进行签名得到的,在另一实施例中,该审计信息还可以是包括第一节点A的已存储的数据,也即是,包括第一节点A在各个环节的交易信息,以便多个第二节点利用实际交易的原始数据进行更加直观的校验。
5、多个第二节点接收审计信息后进行共识,当共识通过时,确定该第一节点A本次存储的数据真实准确。
该共识过程可以是指各个第二节点基于审计信息中所携带的各个生产要素的公钥,获取该生产要素与该第一节点A进行交易成功后所发送的目标审计信息,并基于各个生产要素的目标审计信息对该第一节点的审计信息进行校验,如果审计信息一致,则该第二节点对第一节点A的审计信息校验通过,并向其他第二节点广播校验通过通知,而任一个第二节点接收到的校验通过通知符合共识通过条件,则确定共识通过。
在一些实施例中,上述基于各个生产要素的审计信息对该第一节点的审计信息进行校验的过程可以包括:根据所述审计信息,获取所述至少一个目标第一节点所上传的目标审计信息,该目标审计信息是指各个目标第一节点在与该第一节点进行交易后上传的审计信息;将所述至少一个目标第一节点的目标审计信息与该审计信息进行比对,当比对一致时,确定该审计信息校验通过。其中,所述根据所述审计信息,获取所述至少一个目标第一节点所上传的目标审计信息包括:获取所述审计信息中至少一条签名数据内的公钥;将获取到的公钥所对应的第一节点作为所述至少一个目标第一节点;根据所述第一节点的公钥,获取所述至少一个目标第一节点的审计信息中包含所述第一节点的公钥的审计信息,作为所述至少一个目标第一节点的目标审计信息。
例如,以第一节点A与生产元素PL对应的第一节点PL之间的交易为例,对于第一节点A来说,其审计信息包括:Sig_EX(PL2A),Sig_CC(PL2A),而如果交易真实准确,则对于第一节点PL来说,其审计信息应包括:Sig_EX(PL2A),Sig_CC(PL2A),通过比对,如果审计信息均一致,则说明该交易真实存在且交易内容准确无误,当第一节点A和所有生产元素之间的审计信息均经过上述同理的比对,确认一致后,则该第二节点可以确定校验通过。对于该示例来说,仅以对某一个生产要素的审计信息进行了对比为例,实际上,在第二节点进行校验时,会根据各个生产要素以及上游第一节点所上传的审计信息对该审计信息进行校验,其具体过程与上述示例同理,在此不做赘述。
6、多个第二节点接收审计信息后进行共识,当共识未通过时,确定该第一节点A本次存储的数据存在问题。
具体地,当共识未通过时,说明该第一节点A所存储的数据与真实数据不符,在可能第一节点存在数据造假等情况,因此,第二节点可以对该第一节点A的数据失真事件进行记录,以便后续进行处理。当数据失真事件的发生次数满足一定条件,则可以将第一节点对应的经营实体标记为失信经营实 体,或进行其他处理,以达到惩戒以及公示的作用,本申请对具体采用哪种方式不做限定。
需要说明的是,各个第一节点均会对节点进行的交易的相关信息进行记录,例如交易双方、交易金额、交易地点以及交易时间等,本申请实施例对此不做赘述。
在生产阶段B假设所涉及到的不同环节所对应的生产要素可以包括:B.HP人力资源、B.PL生产线、B.PA包装厂、B.VE运输车、B.EN电厂以及B.WA水厂,将乳制品生产阶段的第一节点以第一节点B表示,则可以有如下过程:
1、第一节点B与第一节点A进行交易,获取到的乳制品的生命周期余量是ULCO(B),例如,乳制品的有效期6个月,获取到的碳排放余量为UCXO(A)。
2、在生产原料乳的各个环节中,分别向各个生产要素支付了费用EX(B.HP),EX(B.PL),EX(B.PA),EX(B.VE),EX(B.EN),EX(B.WA),在交易成功后,该第一节点B获取到以下签名数据,并存储在该第一节点B中:
HP接受B的交易HASH签名Sig_EX(HP2B),Sig_CC(HP2B),HP的公钥Pubkey(HP);
PL接受B的交易HASH签名Sig_EX(PL2B),Sig_CC(PL2B),PL的公钥Pubkey(PL);
PA接受B的交易HASH签名Sig_EX(PA2B),Sig_CC(PA2B),PA的公钥Pubkey(PA);
VE接受B的交易HASH签名Sig_EX(VE2B),Sig_CC(VE2B),VE的公钥Pubkey(VE);
EN接受B的交易HASH签名Sig_EX(EN2B),Sig_CC(EN2B),EN的公钥Pubkey(EN);
WA接受B的交易HASH签名Sig_EX(WA2B),Sig_CC(WA2B),WA的公钥 Pubkey(WA);
在交易成功后,还可以获取到本阶段的碳排放余量UCXO(B)=UCXO(A)–CC(B.HP)–CC(B.PL)–CC(B.PA)–CC(B.VE)–CC(B.EN)–CC(B.WA)。
其中,CC(B.HP)是B阶段用于人力的碳排放消耗量,CC(B.PL)是B阶段用于生产线的碳排放消耗量,CC(B.PA)是B阶段用于包装厂的碳排放消耗量,CC(B.VE)是B阶段用于运输车的碳排放消耗量,CC(B.EN)是B阶段用于电厂的碳排放消耗量,CC(B.WA)是B阶段用于水厂的碳排放消耗量。上述碳排放消耗量的数值关系与上述原料乳阶段的数值关系同理,在此不做赘述。可选地,UCXO(B)可以是归一化到单件产品的碳排放余量。
乳制品生产阶段的未使用资金余量UTXO(B)=UTXO(Cap)-ex(B.HP)–ex(B.PL)–ex(B.PA)–ex(B.VE)–ex(B.EN)–ex(B.WA);
其中,UTXO(Cap)是乳制品生产工厂的未使用交易输出,例如,可对应对乳制品工厂的投资。
3、第一节点B与第一节点C进行交易,并向第一节点C输出ULCO(B),以便生产完成之后,通过B.VE运输车完成运输,相应地,第一节点B会在记录:
C接受来自B的乳制品的交易HASH签名:Sig_ULCO(B2C)、Sig_EX(BtoC)、Sig_CC(BtoC)和C的公钥Pubkey(C)。
需要说明的是,第一节点B可以在运输之前的任一时刻与第一节点C进行交易,由电商C支付给生产厂家B用于购买乳制品的款项可用交易EX(D2B),并对该交易的相关信息进行存储。
4、第一节点B获取审计信息,向该数据存储系统的多个第二节点广播该第一节点的审计信息。例如,该审计信息可以包括如下内容:
Sig((Sig_EX(HP2B),Sig_CC(HP2B),Pubkey(HP),
Sig_EX(PL2B),Sig_CC(PL2B),Pubkey(PL),
Sig_EX(PA2B),Sig_CC(PA2B),Pubkey(PA),
Sig_EX(VE2B),Sig_CC(VE2B),Pubkey(VE),
Sig_EX(EN2B),Sig_CC(EN2B),Pubkey(EN),
Sig_EX(WA2B),Sig_CC(WA2B),Pubkey(WA),
Sig_ULCO(B2C),Pubkey(C))
可选地,审计信息所包括的其他信息与上一阶段同理,在此不做赘述。同样,对于乳制品的各个阶段均可以有上述同理的记账过程,在此不做赘述。
ULCO(F)为乳制品经由过程物流D到达消费者时,乳制品的生命周期余量。
而对于乳制品来说,其还包括一个最终阶段,也即是消费者G,对于消费者G来说,也可以具有个人碳排放余量额定指标UCXO(Ind),例如,该指标可以为基于G20关于全球碳排放的总指标分配到个人的额度。更进一步地,本申请实施例中的乳制品包装上可标记二维码等标记,在消费阶段G,消费者可通过扫码,可获取该乳制品的UCLO(F),即剩余有效期,将该UCLO(F)与乳制品的保质期比较,判断该乳制品是否过期。当然,基于二维码对应地址所存储的数据的不同,消费者还可以也可以获取上面的消费者阶段G对应的UCXO(F),即本乳制品的剩余碳排放余量UCXO,消费者在购买不同剩余碳排放余量的商品时,消费者自身的UCXO受到影响。在该阶段中,可以对UCXO(Ind)与UCXO(F)比较,判断消费者的碳消耗是否超标,从而基于超标与否,来对该消费者的碳消耗余量额定指标进行调整,例如,如果该消费者的碳消耗在预设时间段内未超标,则可以将其碳消耗余量额定指标提高,以达到奖励的目的。
例如,消费者自身的碳排放余量为UCXO(ind)+(UCXO(G)-UCXO(ave)),其中,UCXO(ave)为预设平均余量,当消费者消耗的商品碳排放余量高于业界平均水平时,将其自身的碳排放余量增加;当消费者消耗的商品碳排放余量低于于业界平均水平时,其自身的碳排放余量减少。
当然,该消费者阶段G也涉及到对数据的存储,其具体原理与上述过程同理,在此不做赘述。
图7是本申请实施例提供的一种数据存储装置的结构示意图,应用于数据存储系统中的第一节点,参见图7,所述装置包括:
第一数据获取模块701,用于获取目标物的第一数据。
第二数据获取模块702,用于获取所述目标物的第二数据,所述第一数据和第二数据为不同维度的数据;维度是用于衡量目标物在生成到存续期间的任一方面的信息。
存储模块703,用于将所述目标物的第一数据和所述第二数据存储至所述第一节点中。
在一些实施例中,所述目标物的第一数据包括所述目标物在当前阶段的生命周期余量,所述目标物的第二数据包括所述目标物在所述当前阶段的交易数据。
在一些实施例中,所述目标物在当前阶段的生命周期余量为上一阶段的生命周期余量与所述当前阶段的耗时的差值。
在一些实施例中,所述当前阶段的耗时根据所述当前阶段的特性设置。
在一些实施例中,所述目标物在所述当前阶段的交易数据包括所述目标物在所述当前阶段的各个环节的交易数据。
在一些实施例中,所述目标物在所述当前阶段的交易数据还包括所述目标物在所述当前阶段的各个环节的交易数据的签名数据
在一些实施例中,所述目标物的第一数据包括所述目标物在所述当前阶段的资源消耗余量,所述目标物的第二数据包括所述目标物在所述当前阶段的交易数据。
在一些实施例中,所述装置还包括:
第三数据获取模块,用于获取所述目标物的第三数据,所述第三数据与所述第一数据和所述第二数据相关联。
所述存储模块,还用于当将所述目标物的第一数据和所述第二数据存储至第一节点中时,将所述目标物的第三数据存储至所述第一节点中。
在一些实施例中,所述目标物的第三数据包括:所述目标物在所述当前 阶段的资源消耗余量。
在一些实施例中,所述目标物在所述当前阶段的资源消耗余量为上一阶段的资源消耗余量与所述当前阶段的资源消耗量的差值。
在一些实施例中,所述当前阶段的资源消耗量为所述目标物在所述当前阶段的各个环节的资源消耗量的和值。
在一些实施例中,所述资源消耗余量为碳排放余量。
在一些实施例中,所述装置还包括:
审计信息获取模块,用于获取所述第一节点的审计信息,所述审计信息用于指示所述第一节点所存储的数据。
发送模块,用于向所述数据存储系统的多个第二节点广播所述第一节点的审计信息。
在一些实施例中,所述审计信息包括所述第一节点所存储的数据。
在一些实施例中,所述审计信息包括所述第一节点在预设时间段内所存储的数据。
在一些实施例中,所述审计信息包括所述第一节点所存储的数据的特征值。
在一些实施例中,所述审计信息包括所述第一节点在预设时间段内所存储的数据的特征值。
在一些实施例中,特征值为哈希值。
在一些实施例中,所述审计信息包括签名数据,所述签名数据由所述第一节点采用所述第一节点的私钥对所述第一节点所存储的数据进行签名得到。
在一些实施例中,所述审计信息还包括所述第一节点的公钥。
在一些实施例中,所述审计信息还包括所述第一节点采用私钥对当前阶段的上下文信息进行签名得到的上下文签名数据,所述上下文信息包括时间戳、地理地址信息以及网络地址信息中至少一项。
在一些实施例中,该存储模块用于将所述目标物的第一数据和所述第二 数据存储至所述第一节点的资源池中;当接收到任一第二节点发送的共识确认通知时,将所述资源池中所存储的第一数据和第二数据存储至所述第一节点的预设存储空间中。
在一些实施例中,该存储模块用于当接收到任一第二节点发送的共识确认通知时,将所述目标物的第一数据和所述第二数据存储至所述第一节点中。
在一些实施例中,该装置还包括比对模块,用于基于已获取到的至少两个维度的数据进行交叉比对;当比对模块确定所述已获取到的至少两个维度的数据匹配时,触发该存储模块执行存储步骤。
在一些实施例中,所述装置还包括:
条形码模块,用于在任一阶段的出产产品上提供条形码,所述条形码所指向的地址用于提供所述目标物最新的第一数据、最新的第二数据和最新的第三数据中至少一项。
在一些实施例中,所述条形码还提供多个第二节点的网络地址,用于扫描终端将扫描得到的数据发送至所述多个第二节点进行校验。
图8是本申请实施例提供的一种数据校验装置的结构示意图,应用于数据存储系统的任一第二节点上,所述数据存储系统中的多个第二节点配置有共识机制,参见图8,该装置包括:
接收模块801,用于接收第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据。
校验模块802,用于基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验。
发送模块803,用于当校验通过时,在所述数据存储系统中广播校验通过通知。
所述校验模块802还用于当接收到的校验通过通知满足共识通过条件时,确定所述审计信息共识通过。
在一些实施例中,发送模块802还用于当所述审计信息共识通过时,向所述第一节点发送共识确认通知。所述目标审计信息用于指示与所述第一节点进行交易的各个目标第一节点已存储的数据。
在一些实施例中,校验模块802,用于:
根据所述审计信息,获取所述至少一个目标第一节点所上传的目标审计信息,将所述至少一个目标第一节点的目标审计信息与该审计信息进行比对,当所述至少一个目标第一节点的目标审计信息与所述审计信息匹配时,确定所述审计信息校验通过。
在一些实施例中,所述校验模块802,用于:获取所述审计信息中至少一条签名数据内的公钥;将获取到的公钥所对应的第一节点作为所述至少一个目标第一节点;根据所述公钥,获取包含所述公钥所对应的第一节点的审计信息,作为所述至少一个目标第一节点的目标审计信息。
在一些实施例中,所述至少一个目标第一节点为所述审计信息所指示的交易的交易对方。
在一些实施例中,所述至少一个目标第一节点包括:所述当前阶段的各个生产要素所对应的节点和所述目标物在所述当前阶段的上一阶段所对应的节点。
在一些实施例中,提供了一种数据存储系统,所述系统包括多个第一节点和多个第二节点,所述数据存储系统中的多个第二节点配置有共识机制,
所述多个第一节点中的每个第一节点,用于获取目标物的第一数据;获取所述目标物的第二数据,所述第一数据和第二数据为不同维度的数据;将所述目标物的第一数据和所述第二数据存储至所述第一节点中,获取所述第一节点的审计信息,所述审计信息用于指示所述第一节点所存储的数据;向所述数据存储系统的多个第二节点广播所述第一节点的审计信息;
所述多个第二节点中的每个第二节点,用于接收所述第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据;基于至少一个目标 第一节点的目标审计信息对所述审计信息进行校验;当校验通过时,在所述数据存储系统中广播校验通过通知;当接收到的校验通过通知满足共识通过条件时,所述审计信息共识通过。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
在一些实施例中,提供了一种计算机设备,计算机设备包括处理器和存储器,存储器中存储有至少一条指令,指令由处理器加载并执行以实现上述数据存储方法的步骤。此处数据存储方法的步骤可以是上述各个实施例的数据存储方法中的步骤。
在一些实施例中,提供了一种计算机可读存储介质、存储介质中存储有至少一条指令,指令由处理器加载并执行以实现上述数据存储方法的步骤。此处数据存储方法的步骤可以是上述各个实施例的数据存储方法中的步骤。
在一些实施例中,提供了一种计算机设备,计算机设备包括处理器和存储器,存储器中存储有至少一条指令,指令由处理器加载并执行以实现上述数据校验方法的步骤。此处数据校验方法的步骤可以是上述各个实施例的数据校验方法中的步骤。
在一些实施例中,提供了一种计算机可读存储介质、存储介质中存储有至少一条指令,指令由处理器加载并执行以实现上述数据校验方法的步骤。此处数据校验法的步骤可以是上述各个实施例的数据校验方法中的步骤。
在一些实施例中,提供了一种数据存储系统,系统包括多个第一节点和多个第二节点,数据存储系统中的多个第二节点配置有共识机制,其中:
多个第一节点中的每个第一节点,用于获取目标物的第一数据;获取目标物的第二数据,第一数据和第二数据为不同维度的数据;维度是用于衡量目标物在生成到存续期间的任一方面的信息;将目标物的第一数据和第二数 据存储至第一节点中,获取第一节点的审计信息,审计信息用于指示第一节点所存储的数据;向数据存储系统的多个第二节点广播第一节点的审计信息。
多个第二节点中的每个第二节点,用于接收第一节点的审计信息,审计信息用于指示第一节点已存储的数据;基于至少一个目标第一节点的目标审计信息对审计信息进行校验;当校验通过时,在数据存储系统中广播校验通过通知;当接收到的校验通过通知满足共识通过条件时,确定审计信息共识通过。
在示例性实施例中,还提供了一种计算机可读存储介质,例如包括指令的存储器,上述指令可由终端中的处理器执行以完成上述实施例的任一种方法。例如,所述计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的较佳实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (21)

  1. 一种数据存储方法,由数据存储系统中的第一节点执行,所述方法包括:
    获取目标物的第一数据;
    获取所述目标物的第二数据,所述第一数据和所述第二数据为不同维度的数据;所述维度是用于衡量所述目标物在生成到存续期间的任一方面的信息;及
    将所述目标物的所述第一数据和所述第二数据存储至所述第一节点中。
  2. 根据权利要求1所述的方法,其特征在于,所述目标物的第一数据包括所述目标物在当前阶段的生命周期余量,所述目标物的第二数据包括所述目标物在所述当前阶段的交易数据。
  3. 根据权利要求1所述的方法,其特征在于,所述目标物的第一数据包括所述目标物在当前阶段的资源消耗余量,所述目标物的第二数据包括所述目标物在所述当前阶段的交易数据。
  4. 根据权利要求1至3任一项所述的方法,其特征在于,所述方法还包括:
    获取所述目标物的第三数据,所述第三数据与所述第一数据和所述第二数据相关联;及
    当将所述目标物的所述第一数据和所述第二数据存储至第一节点中时,将所述目标物的所述第三数据存储至所述第一节点中。
  5. 根据权利要求4所述的方法,其特征在于,所述目标物的第三数据包括:所述目标物在当前阶段的资源消耗余量。
  6. 根据权利要求3所述的方法,其特征在于,所述资源消耗余量为碳排放余量。
  7. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    获取所述第一节点的审计信息,所述审计信息用于指示所述第一节点所存储的数据;及
    向所述数据存储系统的多个第二节点广播所述第一节点的审计信息。
  8. 根据权利要求7所述的方法,其特征在于,所述审计信息包括所述第一节点在预设时间段内所存储的数据。
  9. 根据权利要求7所述的方法,其特征在于,所述审计信息还包括所述第一节点采用私钥对当前阶段的上下文信息进行签名得到的上下文签名数据,所述上下文信息包括时间戳、地理地址信息以及网络地址信息中至少一项。
  10. 根据权利要求7所述的方法,其特征在于,所述将所述目标物的所述第一数据和所述第二数据存储至所述第一节点中包括:
    将所述目标物的所述第一数据和所述第二数据存储至所述第一节点的资源池中;及
    当接收到任一第二节点发送的共识确认通知时,将所述资源池中所存储的所述第一数据和所述第二数据存储至所述第一节点的预设存储空间中。
  11. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    基于已获取到的至少两个维度的数据进行交叉比对,当所述已获取到的至少两个维度的数据匹配时,执行存储步骤。
  12. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    在任一阶段的出产产品上提供条形码,所述条形码所指向的地址用于提供所述目标物最新的第一数据、最新的第二数据和最新的第三数据中至少一项。
  13. 根据权利要求12所述的方法,其特征在于,所述条形码还提供多个第二节点的网络地址,用于扫描终端将扫描得到的数据发送至所述第二节点进行校验。
  14. 一种数据校验方法,其特征在于,由数据存储系统的任一第二节点执行,所述数据存储系统中的多个第二节点配置有共识机制,所述方法包括:
    接收第一节点的审计信息,所述审计信息用于指示所述第一节点已存储 的数据;
    基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验;
    当校验通过时,在所述数据存储系统中广播校验通过通知;及
    当接收到的校验通过通知满足共识通过条件时,确定所述审计信息共识通过。
  15. 根据权利要求14所述的方法,其特征在于,所述目标审计信息用于指示与所述第一节点进行交易的各个目标第一节点已存储的数据;
    所述方法还包括:当所述审计信息共识通过时,向所述第一节点发送共识确认通知。
  16. 根据权利要求14所述的方法,其特征在于,所述基于至少一个目标第一节点的目标审计信息对所述审计信息进行校验包括:
    根据所述审计信息,获取所述至少一个目标第一节点所上传的目标审计信息;及
    将所述至少一个目标第一节点的目标审计信息与所述审计信息进行比对,当所述至少一个目标第一节点的目标审计信息与所述审计信息匹配时,确定所述审计信息校验通过。
  17. 一种数据存储装置,其特征在于,所述装置包括:
    第一数据获取模块,用于获取目标物的第一数据;
    第二数据获取模块,用于获取所述目标物的第二数据,所述第一数据和所述第二数据为不同维度的数据;所述维度是用于衡量所述目标物在生成到存续期间的任一方面的信息;及
    存储模块,用于将所述目标物的所述第一数据和所述第二数据存储至第一节点中。
  18. 一种数据校验装置,其特征在于,所述装置包括:
    接收模块,用于接收第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据;
    校验模块,用于基于至少一个目标第一节点的目标审计信息对所述审计 信息进行校验;
    发送模块,用于当校验通过时,在数据存储系统中广播校验通过通知;及
    所述校验模块还用于当接收到的校验通过通知满足共识通过条件时,确定所述审计信息共识通过。
  19. 一种计算机设备,其特征在于,所述计算机设备包括处理器和存储器,所述存储器中存储有至少一条指令,所述指令由所述处理器加载并执行以实现如权利要求1至权利要求13任一项所述的数据存储方法;或所述指令由所述处理器加载并执行以实现如权利要求14至权利要求16任一项所述的数据校验方法。
  20. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有至少一条指令,所述指令由所述处理器加载并执行以实现如权利要求1至权利要求13任一项所述的数据存储方法;或所述指令由所述处理器加载并执行以实现如权利要求14至权利要求16任一项所述的数据校验方法。
  21. 一种数据存储系统,其特征在于,所述系统包括多个第一节点和多个第二节点,所述数据存储系统中的多个第二节点配置有共识机制,
    所述多个第一节点中的每个第一节点,用于获取目标物的第一数据;获取所述目标物的第二数据,所述第一数据和所述第二数据为不同维度的数据;所述维度是用于衡量所述目标物在生成到存续期间的任一方面的信息;将所述目标物的所述第一数据和所述第二数据存储至所述第一节点中,获取所述第一节点的审计信息,所述审计信息用于指示所述第一节点所存储的数据;向所述数据存储系统的多个第二节点广播所述第一节点的审计信息;
    所述多个第二节点中的每个第二节点,用于接收所述第一节点的审计信息,所述审计信息用于指示所述第一节点已存储的数据;基于至少一个目标 第一节点的目标审计信息对所述审计信息进行校验;当校验通过时,在所述数据存储系统中广播校验通过通知;当接收到的校验通过通知满足共识通过条件时,确定所述审计信息共识通过。
PCT/CN2019/092410 2018-07-05 2019-06-21 数据存储方法、数据校验方法、装置、设备及介质 Ceased WO2020007209A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP19830218.4A EP3745342A1 (en) 2018-07-05 2019-06-21 Data storage method, apparatus and device, data verification method, apparatus and device, and medium
JP2020562577A JP7066096B2 (ja) 2018-07-05 2019-06-21 データ記憶方法、データ検証方法、装置、機器及びコンピュータプログラム
US16/991,977 US11914730B2 (en) 2018-07-05 2020-08-12 Data storage method, apparatus and device, data verification method, apparatus and device, and medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810731377.2 2018-07-05
CN201810731377.2A CN110750811B (zh) 2018-07-05 2018-07-05 数据存储方法、数据校验方法、装置、设备及介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/991,977 Continuation US11914730B2 (en) 2018-07-05 2020-08-12 Data storage method, apparatus and device, data verification method, apparatus and device, and medium

Publications (1)

Publication Number Publication Date
WO2020007209A1 true WO2020007209A1 (zh) 2020-01-09

Family

ID=69059892

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/092410 Ceased WO2020007209A1 (zh) 2018-07-05 2019-06-21 数据存储方法、数据校验方法、装置、设备及介质

Country Status (5)

Country Link
US (1) US11914730B2 (zh)
EP (1) EP3745342A1 (zh)
JP (1) JP7066096B2 (zh)
CN (3) CN113408009B (zh)
WO (1) WO2020007209A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111832046A (zh) * 2020-07-02 2020-10-27 中通服创发科技有限责任公司 一种基于区块链技术的可信数据存证方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102337673B1 (ko) * 2020-07-16 2021-12-09 (주)휴먼스케이프 데이터 열람 검증 시스템 및 그 방법
CN113377805B (zh) * 2021-08-13 2021-11-12 腾讯科技(深圳)有限公司 数据查询方法、装置、电子设备及计算机可读存储介质
WO2023028608A1 (en) * 2021-08-27 2023-03-02 Vendia, Inc. Efficient and secure blockchains using cloud resource primitives
CN114493159B (zh) * 2021-12-31 2024-01-12 苏州浪潮智能科技有限公司 一种基于mes系统的节点位置校验方法和装置
US20230325841A1 (en) * 2022-04-07 2023-10-12 Gen Digital Inc. Systems and methods for detecting websites that perpetrate at least one of scams or frauds
CN115248691A (zh) * 2022-07-25 2022-10-28 中国银行股份有限公司 一种数据检查方法及装置
CN115619547A (zh) * 2022-09-06 2023-01-17 中国联合网络通信集团有限公司 交易方法、区块链网络、电子设备、计算机可读介质
CN118691385B (zh) * 2024-08-23 2024-12-24 中国电信股份有限公司 数据校验方法、装置与电子设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107506917A (zh) * 2017-08-16 2017-12-22 北京盛世博创信息技术有限公司 一种碳流通信息的跟踪方法及系统
CN107578337A (zh) * 2017-08-28 2018-01-12 杭州云象网络技术有限公司 一种基于区块链智能合约技术的智能投顾产品托管方法
WO2018013934A1 (en) * 2016-07-14 2018-01-18 Digital Asset Holdings Digital asset architecture

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003044662A (ja) * 2001-07-26 2003-02-14 Mitsubishi Electric Corp ホームサーバとこれを用いた在庫管理システム
JP2008243110A (ja) * 2007-03-29 2008-10-09 Hitachi Ltd 燃料環境影響物排出量評価システム
US20090157510A1 (en) * 2007-11-07 2009-06-18 Ken Pridmore Method of Tracking and Redeeming Consumer Carbon Emission Credits
US8427318B2 (en) * 2008-11-24 2013-04-23 International Business Machines Corporation Method and system for carbon value tracking and labeling
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods
WO2016112099A1 (en) * 2015-01-08 2016-07-14 Eos Climate, Inc. System and method for differentiating commodities based on environmental impact
US20170228731A1 (en) * 2016-02-09 2017-08-10 Fmr Llc Computationally Efficient Transfer Processing and Auditing Apparatuses, Methods and Systems
US11488147B2 (en) * 2015-07-14 2022-11-01 Fmr Llc Computationally efficient transfer processing and auditing apparatuses, methods and systems
CN105608588A (zh) * 2016-01-04 2016-05-25 布比(北京)网络技术有限公司 一种溯源记录处理的方法及装置
CN105975770A (zh) * 2016-04-29 2016-09-28 中国南方电网有限责任公司电网技术研究中心 跨省区碳交易机制下发电碳排放配额分配模型的构建方法
EP3455802A1 (en) * 2016-05-13 2019-03-20 De La Rue International Limited Methods and systems for processing assets
US10198325B2 (en) * 2016-05-24 2019-02-05 Mastercard International Incorporated Method and system for desynchronization recovery for permissioned blockchains using bloom filters
US10586210B2 (en) * 2016-11-30 2020-03-10 International Business Machines Corporation Blockchain checkpoints and certified checkpoints
CN107018125B (zh) * 2017-02-17 2019-08-09 阿里巴巴集团控股有限公司 一种区块链系统、数据存储方法及装置
US10755226B1 (en) * 2017-02-24 2020-08-25 EMC IP Holding Company LLC Information management system using blockchain functionalities
WO2018170504A1 (en) * 2017-03-17 2018-09-20 Labyrinth Research Llc Unified control of privacy-impacting devices
CN107124403A (zh) * 2017-04-14 2017-09-01 朱清明 区块链中共识区块的生成方法与计算设备
US11924322B2 (en) * 2017-05-16 2024-03-05 Arm Ltd. Blockchain for securing and/or managing IoT network-type infrastructure
CN107577694B (zh) * 2017-07-14 2020-04-24 创新先进技术有限公司 一种基于区块链的数据处理方法及设备
KR101871468B1 (ko) * 2017-08-02 2018-06-26 조진한 블록체인 기반의 농수축산물 통합 이력관리 시스템
CN107493340B (zh) * 2017-08-23 2020-02-11 广州市易彩乐网络科技有限公司 区块链网络中的数据分发校验方法、装置及系统
CN107911373B (zh) * 2017-11-24 2019-09-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 一种区块链权限管理方法及系统
CN108226390A (zh) * 2017-12-08 2018-06-29 赫普科技发展(北京)有限公司 一种区块链碳排放监测装置和监测系统
SG11202005806PA (en) * 2017-12-26 2020-07-29 Agency Science Tech & Res Tracing traffic in the internet
CN107944892A (zh) * 2017-12-28 2018-04-20 上海唯链信息科技有限公司 一种基于区块链技术的奶源追溯系统
CN108108487B (zh) * 2018-01-10 2019-11-22 杭州复杂美科技有限公司 一种区块链的共识方法
US11063745B1 (en) * 2018-02-13 2021-07-13 EMC IP Holding Company LLC Distributed ledger for multi-cloud service automation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018013934A1 (en) * 2016-07-14 2018-01-18 Digital Asset Holdings Digital asset architecture
CN107506917A (zh) * 2017-08-16 2017-12-22 北京盛世博创信息技术有限公司 一种碳流通信息的跟踪方法及系统
CN107578337A (zh) * 2017-08-28 2018-01-12 杭州云象网络技术有限公司 一种基于区块链智能合约技术的智能投顾产品托管方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3745342A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111832046A (zh) * 2020-07-02 2020-10-27 中通服创发科技有限责任公司 一种基于区块链技术的可信数据存证方法
CN111832046B (zh) * 2020-07-02 2024-02-23 中通服创发科技有限责任公司 一种基于区块链技术的可信数据存证方法

Also Published As

Publication number Publication date
EP3745342A4 (en) 2020-12-02
CN110750811A (zh) 2020-02-04
EP3745342A1 (en) 2020-12-02
CN113408008B (zh) 2022-12-30
CN113408009B (zh) 2022-12-06
CN113408009A (zh) 2021-09-17
JP7066096B2 (ja) 2022-05-13
US11914730B2 (en) 2024-02-27
US20200372167A1 (en) 2020-11-26
CN113408008A (zh) 2021-09-17
JP2021524084A (ja) 2021-09-09
CN110750811B (zh) 2021-05-25

Similar Documents

Publication Publication Date Title
WO2020007209A1 (zh) 数据存储方法、数据校验方法、装置、设备及介质
KR102199567B1 (ko) 블록체인 기반 예술품 거래 데이터 공유 서비스 제공 시스템
CN109544160B (zh) 一种基于区块链和智能合约的交易真实性验证方法及系统
Ha et al. DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace
CN109118219B (zh) 交易数据处理方法和装置
Shu et al. Blockchain-enhanced trading systems for construction industry to control carbon emissions
CN110599276B (zh) 票据报销方法、装置和设备及计算机存储介质
US20190378162A1 (en) Systems and methods for enforcing advertising standards and digital advertisement measurements
CN111311277B (zh) 一种基于区块链网络的票据处理方法、装置和相关设备
CN108701271A (zh) 一种维修设备的管理方法、系统及数据管理服务器
CN111260459B (zh) 基于区块链进行打包贷款的方法、计算机可读取的存储介质
CN108701270A (zh) 维修厂的管理方法、系统及数据管理服务器
CN110910010A (zh) 基于区块链技术的纺织品供应链实现方法、装置和设备
CN111445281B (zh) 基于区块链的积分监控方法、装置及计算机可读存储介质
CN115187318B (zh) 开票方法、开票装置、电子设备及存储介质
CN111489126B (zh) 基于区块链的跨境运输方法、装置及硬件设备
KR102265151B1 (ko) 수입통관 자동화를 위한 온라인 쇼핑몰 시스템 및 그것의 제어 방법
Zhang Internet of things supervision system and supply chain financial supervision methods based on blockchain technology
HK40051862A (zh) 数据处理方法、装置、设备及介质
HK40051862B (zh) 数据处理方法、装置、设备及介质
HK40051863A (zh) 数据处理方法、装置、设备及介质
HK40051863B (zh) 数据处理方法、装置、设备及介质
HK40020392B (zh) 数据存储方法、数据校验方法、装置、设备及介质
HK40020392A (zh) 数据存储方法、数据校验方法、装置、设备及介质
CN114693316A (zh) 合同处理方法、装置及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19830218

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019830218

Country of ref document: EP

Effective date: 20200824

ENP Entry into the national phase

Ref document number: 2020562577

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE