Log storage and reading method, device, equipment and medium based on block chain

文档序号:1478677 发布日期:2020-02-25 浏览:4次 中文

阅读说明:本技术 基于区块链的日志存储和读取方法、装置、设备及介质 (Log storage and reading method, device, equipment and medium based on block chain ) 是由 夏子钦 羊志敏 于 2019-10-12 设计创作,主要内容包括:本发明提供一种基于区块链的日志存储方法,包括:接收客户端上传的日志存储请求,该日志存储请求中携带待存储日志;获取所述待存储日志的日志摘要以及日志哈希值;根据待存储日志、日志摘要和日志哈希值生成安全校验信息;将安全校验信息返回给客户端,以便客户端根据安全校验信息验证待存储日志是否被篡改,并在验证待存储日志未被篡改时返回确认存储通知;接收到客户端返回的确认存储通知后,将待存储日志存储于客户端或云存储端;对日志摘要、日志哈希值和所述待存储日志的存储地址所拼接而成的数据进行数字签名,得到第二签名结果;将所述日志摘要、日志哈希值和第二签名结果存储于区块链服务端本地。本发明能够提高存储日志的安全性。(The invention provides a log storage method based on a block chain, which comprises the following steps: receiving a log storage request uploaded by a client, wherein the log storage request carries a log to be stored; acquiring a log abstract and a log hash value of the log to be stored; generating safety check information according to the log to be stored, the log abstract and the log hash value; returning the security check information to the client so that the client can verify whether the log to be stored is tampered according to the security check information, and returning a storage confirmation notice when the log to be stored is verified not to be tampered; after receiving a storage confirmation notification returned by the client, storing the log to be stored in the client or a cloud storage end; performing digital signature on data formed by splicing the log abstract, the log hash value and the storage address of the log to be stored to obtain a second signature result; and storing the log abstract, the log hash value and the second signature result locally at the block chain server. The invention can improve the safety of the stored log.)

1. A log storage method based on a block chain is suitable for a block chain server side and is characterized by comprising the following steps:

receiving a log storage request uploaded by a client, wherein the log storage request carries a log to be stored;

acquiring a log abstract and a log hash value of the log to be stored;

generating safety check information according to the log to be stored, the log abstract and the log hash value;

returning the security check information to the client so that the client can verify whether the log to be stored is tampered according to the security check information, and returning a storage confirmation notice when the log to be stored is verified not to be tampered;

after receiving a storage confirmation notification returned by the client, storing the log to be stored in the client or a cloud storage end;

performing digital signature on data formed by splicing the log abstract, the log hash value and the storage address of the log to be stored to obtain a second signature result;

and storing the log abstract, the log hash value and the second signature result locally at the block chain server.

2. The blockchain-based log storage method according to claim 1, wherein the step of generating the security check information according to the log to be stored, the log digest and the log hash value includes:

performing digital signature on the data formed by splicing the log to be stored, the log abstract and the log hash value according to a pre-generated server-side private key to obtain a first signature result;

encrypting the data formed by splicing the log to be stored, the log abstract, the log hash value and the first signature result by adopting a preset symmetric key to obtain a first encryption result;

encrypting the symmetric key by adopting a client public key which is pre-sent by the client to obtain a second encryption result;

and determining the first encryption result and the second encryption result as the security check information.

3. The blockchain-based log storage method according to claim 2, wherein the step of verifying, by the client, whether the log to be stored is tampered with according to the security check information and returning a verification result includes:

decrypting the second encryption result by adopting a preset client private key corresponding to the client public key to obtain the symmetric key;

decrypting the first encryption result by adopting the symmetric key to obtain the log to be stored, the log abstract, the log hash value and a first signature result;

verifying the first signature result by adopting a server public key corresponding to the server private key received in advance, and obtaining the log to be stored, the log abstract and the log hash value again;

and judging whether the log to be stored, the log abstract and the log hash value obtained by decrypting the first encryption result are consistent with the log to be stored, the log abstract and the log hash value obtained by verifying the first signature result, if so, carrying out hash operation on the log to be stored, judging whether the result of the hash operation is consistent with the log hash value, if so, judging that the log to be stored is not tampered, otherwise, judging that the log to be stored is tampered.

4. The method of claim 1, further comprising: before acquiring the log abstract and the log hash value of the log to be stored, desensitizing sensitive data in the log to be stored.

5. A log storage method based on a block chain is suitable for a client, and is characterized by comprising the following steps:

sending a log storage request to a block chain server, wherein the log storage request carries a log to be stored, so that the block chain server can obtain a log abstract and a log hash value of the log to be stored according to the log storage request, and then generate and return security check information according to the log to be stored, the log abstract and the log hash value;

verifying whether the log to be stored is tampered according to the safety verification information returned by the block chain server, returning a storage confirmation notification to the block chain server when the log to be stored is verified not to be tampered, so that the block chain server stores the log to be stored in a local client or a cloud storage end after receiving the storage confirmation notification, digitally signs data formed by splicing the log abstract, the log hash value and a storage address of the log to be stored, obtains a second signature result, and stores the log abstract, the log hash value and the second signature result in the block chain server.

6. A log reading method based on a block chain, which is suitable for a block chain server and is used for reading logs stored based on the method of the preceding claims 1-4, wherein the reading method comprises the following steps:

receiving a log query request sent by the client, wherein the log query request carries a preset identification field in a log to be queried;

and locally acquiring a log abstract, a log hash value and a second signature result corresponding to the preset identification field from the blockchain server and returning the log abstract, the log hash value and the second signature result to the client, so that the client can verify the second signature result to obtain the log abstract, the log hash value and a storage address in the second signature result, and then judging whether the log abstract and the log hash value locally acquired from the blockchain server are consistent with the log abstract and the log hash value in the second signature result, if so, acquiring the log to be queried from the client or the cloud storage end according to the acquired storage address.

7. A log reading method based on a block chain, which is suitable for a client and is used for reading logs stored based on the method of the preceding claim 5, wherein the reading method comprises the following steps:

sending a log query request to the blockchain server, wherein the log query request carries a preset identification field in a log to be queried, so that the blockchain server locally obtains a log abstract, a log hash value and a second signature result corresponding to the preset identification field from the blockchain server and returns the log abstract, the log hash value and the second signature result;

verifying the returned second signature result by using the server public key to obtain a log abstract, a log hash value and a storage address in the second signature result;

and judging whether the log abstract and the log hash value acquired locally from the blockchain server are consistent with the log abstract and the log hash value in the second signature result, if so, acquiring the log to be queried from a client locally or a cloud storage terminal according to the acquired storage address.

8. A block chain based log storage device, comprising:

the storage request receiving module is used for receiving a log storage request uploaded by a client, wherein the log storage request carries a log to be stored;

the log abstract acquiring module is used for acquiring a log abstract of the log to be stored;

the log hash value acquisition module is used for acquiring the log hash value of the log to be stored;

the verification information generation module is used for generating safety verification information according to the log to be stored, the log abstract and the log hash value;

a check information returning module, configured to return the security check information to the client, so that the client verifies whether the log to be stored is tampered according to the security check information, and returns a storage confirmation notification when it is verified that the log to be stored is not tampered;

the log storage module is used for storing the log to be stored in the client or the cloud storage terminal after receiving a storage confirmation notification returned by the client;

the log index signature module is used for carrying out digital signature on data formed by splicing the log abstract, the log hash value and the storage address of the log to be stored to obtain a second signature result;

and the log index storage module is used for storing the log abstract, the log hash value and the second signature result in the local block chain server.

9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the method of any one of claims 1 to 4, the method of claim 5, the method of claim 6 or the method of claim 7 are performed by the processor when the computer program is executed.

10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1 to 4, the method of claim 5, the method of claim 6 or the steps of the method of claim 7.

Technical Field

The present invention relates to a block chain technology, and in particular, to a method, an apparatus, a device, and a medium for storing and reading a log based on a block chain.

In the prior art, various user service usage record data generated in the service and application product operation process are usually stored in the form of logs, and usually, the logs are stored locally or at a cloud storage end and then protected by various security mechanisms. However, the existing security mechanism cannot effectively identify the log tampering problem, and no matter what environment the log is stored in, a vulnerability may exist, and the log is vulnerable to accidental damage and the threat of counterfeiting original data.

Disclosure of Invention

In view of the above-mentioned deficiencies of the prior art, the present invention provides a method, an apparatus, a device and a medium for storing and reading a log based on a block chain, so as to improve the security of the stored log.

In order to achieve the above object, the present invention provides a block chain based log storage method, which is suitable for a block chain server and includes the following steps:

receiving a log storage request uploaded by a client, wherein the log storage request carries a log to be stored;

acquiring a log abstract and a log hash value of the log to be stored;

generating safety check information according to the log to be stored, the log abstract and the log hash value;

returning the security check information to the client so that the client can verify whether the log to be stored is tampered according to the security check information, and returning a storage confirmation notice when the log to be stored is verified not to be tampered;

after receiving a storage confirmation notification returned by the client, storing the log to be stored in the client or a cloud storage end;

performing digital signature on data formed by splicing the log abstract, the log hash value and the storage address of the log to be stored to obtain a second signature result;

and storing the log abstract, the log hash value and the second signature result locally at the block chain server.

In an embodiment of the present invention, the step of generating the security check information according to the log to be stored, the log digest, and the log hash value includes:

performing digital signature on the data formed by splicing the log to be stored, the log abstract and the log hash value according to a pre-generated server-side private key to obtain a first signature result;

encrypting the data formed by splicing the log to be stored, the log abstract, the log hash value and the first signature result by adopting a preset symmetric key to obtain a first encryption result;

encrypting the symmetric key by adopting a client public key which is pre-sent by the client to obtain a second encryption result;

and determining the first encryption result and the second encryption result as the security check information.

In an embodiment of the present invention, the step of the client verifying whether the log to be stored is tampered with and returning a verification result according to the security check information includes:

decrypting the second encryption result by adopting a preset client private key corresponding to the client public key to obtain the symmetric key;

decrypting the first encryption result by adopting the symmetric key to obtain the log to be stored, the log abstract, the log hash value and a first signature result;

verifying the first signature result by adopting a server public key corresponding to the server private key received in advance, and obtaining the log to be stored, the log abstract and the log hash value again;

and judging whether the log to be stored, the log abstract and the log hash value obtained by decrypting the first encryption result are consistent with the log to be stored, the log abstract and the log hash value obtained by verifying the first signature result, if so, carrying out hash operation on the log to be stored, judging whether the result of the hash operation is consistent with the log hash value, if so, judging that the log to be stored is not tampered, otherwise, judging that the log to be stored is tampered.

In one embodiment of the invention, the method further comprises: before acquiring the log abstract and the log hash value of the log to be stored, desensitizing sensitive data in the log to be stored.

In an embodiment of the present invention, the desensitizing processing of the sensitive data in the log to be stored includes:

matching the sensitive data in the log to be stored according to a preset regular expression matching rule;

and desensitizing the matched sensitive data according to a preset desensitizing rule.

In an embodiment of the present invention, the step of obtaining the log digest and the log hash value of the log to be stored includes:

extracting field names of preset fields in the log to be stored to form the log abstract;

and carrying out hash operation on the log to be stored to obtain the hash value of the log.

In order to achieve the above object, the present invention further provides a block chain based log storage method, which is suitable for a client, and includes the following steps:

sending a log storage request to a block chain server, wherein the log storage request carries a log to be stored, so that the block chain server can obtain a log abstract and a log hash value of the log to be stored according to the log storage request, and then generate and return security check information according to the log to be stored, the log abstract and the log hash value;

verifying whether the log to be stored is tampered according to the safety verification information returned by the block chain server, returning a storage confirmation notification to the block chain server when the log to be stored is verified not to be tampered, so that the block chain server stores the log to be stored in a local client or a cloud storage end after receiving the storage confirmation notification, digitally signs data formed by splicing the log abstract, the log hash value and a storage address of the log to be stored, obtains a second signature result, and stores the log abstract, the log hash value and the second signature result in the block chain server.

In an embodiment of the present invention, the step of generating, by the blockchain server, the security check information according to the log to be stored, the log digest, and the log hash value includes:

performing digital signature on the data formed by splicing the log to be stored, the log abstract and the log hash value according to a pre-generated server-side private key to obtain a first signature result;

encrypting the data formed by splicing the log to be stored, the log abstract, the log hash value and the first signature result by adopting a preset symmetric key to obtain a first encryption result;

encrypting the symmetric key by adopting a pre-received client public key to obtain a second encryption result, and then returning the first encryption result and the second encryption result;

decrypting the second encryption result by adopting a preset client private key corresponding to the client public key to obtain the symmetric key;

and determining the first encryption result and the second encryption result as the security check information.

In an embodiment of the present invention, the step of verifying whether the log to be stored is tampered according to the security check information returned by the blockchain server includes:

decrypting the second encryption result by adopting a preset client private key corresponding to the client public key to obtain the symmetric key;

decrypting the first encryption result by adopting the symmetric key to obtain the log to be stored, the log abstract, the log hash value and a first signature result;

verifying the first signature result by adopting a server public key corresponding to the server private key received in advance, and obtaining the log to be stored, the log abstract and the log hash value again;

and judging whether the log to be stored, the log abstract and the log hash value obtained by decrypting the first encryption result are consistent with the log to be stored, the log abstract and the log hash value obtained by verifying the first signature result, if so, carrying out hash operation on the log to be stored, judging whether the result of the hash operation is consistent with the log hash value, if so, judging that the log to be stored is not tampered, otherwise, judging that the log to be stored is tampered.

In one embodiment of the invention, the method further comprises: before acquiring the log abstract and the log hash value of the log to be stored, the block chain server side carries out desensitization processing on sensitive data in the log to be stored.

In an embodiment of the present invention, the step of desensitizing, by the blockchain server, the sensitive data in the log to be stored includes:

matching the sensitive data in the log to be stored according to a preset regular expression matching rule;

and desensitizing the matched sensitive data according to a preset desensitizing rule.

In an embodiment of the present invention, the step of acquiring the log digest and the log hash value of the log to be stored by the blockchain server includes:

extracting field names of preset fields in the log to be stored to form the log abstract;

and carrying out hash operation on the log to be stored to obtain the hash value of the log.

In order to achieve the above object, the present invention further provides a log reading method based on a block chain, which is suitable for a block chain server and is used for reading a log stored based on the foregoing method, and the reading method includes the following steps:

receiving a log query request sent by the client, wherein the log query request carries a preset identification field in a log to be queried;

and locally acquiring a log abstract, a log hash value and a second signature result corresponding to the preset identification field from the blockchain server and returning the log abstract, the log hash value and the second signature result to the client, so that the client can verify the second signature result to obtain the log abstract, the log hash value and a storage address in the second signature result, and then judging whether the log abstract and the log hash value locally acquired from the blockchain server are consistent with the log abstract and the log hash value in the second signature result, if so, acquiring the log to be queried from the client or the cloud storage end according to the acquired storage address.

In order to achieve the above object, the present invention further provides a log reading method based on a block chain, which is suitable for a client and is used for reading a log stored based on the foregoing method, and the reading method includes the following steps:

sending a log query request to the blockchain server, wherein the log query request carries a preset identification field in a log to be queried, so that the blockchain server locally obtains a log abstract, a log hash value and a second signature result corresponding to the preset identification field from the blockchain server and returns the log abstract, the log hash value and the second signature result;

verifying the returned second signature result by using the server public key to obtain a log abstract, a log hash value and a storage address in the second signature result;

and judging whether the log abstract and the log hash value acquired locally from the blockchain server are consistent with the log abstract and the log hash value in the second signature result, if so, acquiring the log to be queried from a client locally or a cloud storage terminal according to the acquired storage address.

In order to achieve the above object, the present invention further provides a block chain-based log storage device, including:

the storage request receiving module is used for receiving a log storage request uploaded by a client, wherein the log storage request carries a log to be stored;

the log abstract acquiring module is used for acquiring a log abstract of the log to be stored;

the log hash value acquisition module is used for acquiring the log hash value of the log to be stored;

the verification information generation module is used for generating safety verification information according to the log to be stored, the log abstract and the log hash value;

a check information returning module, configured to return the security check information to the client, so that the client verifies whether the log to be stored is tampered according to the security check information, and returns a storage confirmation notification when it is verified that the log to be stored is not tampered;

the log storage module is used for storing the log to be stored in the client or the cloud storage terminal after receiving a storage confirmation notification returned by the client;

the log index signature module is used for carrying out digital signature on data formed by splicing the log abstract, the log hash value and the storage address of the log to be stored to obtain a second signature result;

and the log index storage module is used for storing the log abstract, the log hash value and the second signature result in the local block chain server.

In an embodiment of the present invention, the step of generating, by the check information generation module, the security check information according to the log to be stored, the log digest, and the log hash value includes:

performing digital signature on the data formed by splicing the log to be stored, the log abstract and the log hash value according to a pre-generated server-side private key to obtain a first signature result;

encrypting the data formed by splicing the log to be stored, the log abstract, the log hash value and the first signature result by adopting a preset symmetric key to obtain a first encryption result;

encrypting the symmetric key by adopting a client public key which is pre-sent by the client to obtain a second encryption result;

and determining the first encryption result and the second encryption result as the security check information.

In an embodiment of the present invention, the step of the client verifying whether the log to be stored is tampered with and returning a verification result according to the security check information includes:

decrypting the second encryption result by adopting a preset client private key corresponding to the client public key to obtain the symmetric key;

decrypting the first encryption result by adopting the symmetric key to obtain the log to be stored, the log abstract, the log hash value and a first signature result;

verifying the first signature result by adopting a server public key corresponding to the server private key received in advance, and obtaining the log to be stored, the log abstract and the log hash value again;

and judging whether the log to be stored, the log abstract and the log hash value obtained by decrypting the first encryption result are consistent with the log to be stored, the log abstract and the log hash value obtained by verifying the first signature result, if so, carrying out hash operation on the log to be stored, judging whether the result of the hash operation is consistent with the log hash value, if so, judging that the log to be stored is not tampered, otherwise, judging that the log to be stored is tampered.

In one embodiment of the invention, the apparatus further comprises: and the desensitization module is used for desensitizing the sensitive data in the log to be stored before acquiring the log digest and the log hash value of the log to be stored.

In an embodiment of the present invention, the desensitizing module performs desensitization processing on the sensitive data in the log to be stored, including:

matching the sensitive data in the log to be stored according to a preset regular expression matching rule;

and desensitizing the matched sensitive data according to a preset desensitizing rule.

In an embodiment of the present invention, the step of obtaining the log digest and the log hash value of the log to be stored includes:

the log abstract acquiring module is specifically used for extracting field names of preset fields in the log to be stored to form the log abstract;

the log hash value obtaining module is specifically configured to perform hash operation on the log to be stored to obtain the log hash value.

In order to achieve the above object, the present invention further provides a block chain-based log storage device, including:

the storage request sending module is used for sending a log storage request to the block chain server, wherein the log storage request carries a log to be stored, so that the block chain server can obtain a log abstract and a log hash value of the log to be stored according to the log storage request, and then generate and return security check information according to the log to be stored, the log abstract and the log hash value;

the verification module is used for verifying whether the log to be stored is tampered according to the safety verification information returned by the block chain server, and returning a storage confirmation notice to the block chain server when the log to be stored is verified not to be tampered, so that the block chain server stores the log to be stored in a local or cloud storage end of a client after receiving the storage confirmation notice, digitally signs data formed by splicing the log abstract, the log hash value and the storage address of the log to be stored, obtains a second signature result, and then stores the log abstract, the log hash value and the second signature result in the block chain server.

In an embodiment of the present invention, the step of generating, by the blockchain server, the security check information according to the log to be stored, the log digest, and the log hash value includes:

performing digital signature on the data formed by splicing the log to be stored, the log abstract and the log hash value according to a pre-generated server-side private key to obtain a first signature result;

encrypting the data formed by splicing the log to be stored, the log abstract, the log hash value and the first signature result by adopting a preset symmetric key to obtain a first encryption result;

encrypting the symmetric key by adopting a pre-received client public key to obtain a second encryption result, and then returning the first encryption result and the second encryption result;

decrypting the second encryption result by adopting a preset client private key corresponding to the client public key to obtain the symmetric key;

and determining the first encryption result and the second encryption result as the security check information.

In an embodiment of the present invention, the step of verifying, by the verification module, whether the log to be stored is tampered according to the security verification information returned by the blockchain server includes:

decrypting the second encryption result by adopting a preset client private key corresponding to the client public key to obtain the symmetric key;

decrypting the first encryption result by adopting the symmetric key to obtain the log to be stored, the log abstract, the log hash value and a first signature result;

verifying the first signature result by adopting a server public key corresponding to the server private key received in advance, and obtaining the log to be stored, the log abstract and the log hash value again;

and judging whether the log to be stored, the log abstract and the log hash value obtained by decrypting the first encryption result are consistent with the log to be stored, the log abstract and the log hash value obtained by verifying the first signature result, if so, carrying out hash operation on the log to be stored, judging whether the result of the hash operation is consistent with the log hash value, if so, judging that the log to be stored is not tampered, otherwise, judging that the log to be stored is tampered.

In an embodiment of the present invention, before acquiring the log digest and the log hash value of the log to be stored, the blockchain server performs desensitization processing on sensitive data in the log to be stored.

In an embodiment of the present invention, the step of desensitizing, by the blockchain server, the sensitive data in the log to be stored includes:

matching the sensitive data in the log to be stored according to a preset regular expression matching rule;

and desensitizing the matched sensitive data according to a preset desensitizing rule.

In an embodiment of the present invention, the step of acquiring the log digest and the log hash value of the log to be stored by the blockchain server includes:

extracting field names of preset fields in the log to be stored to form the log abstract;

and carrying out hash operation on the log to be stored to obtain the hash value of the log.

In order to achieve the above object, the present invention further provides a block chain-based log reading apparatus for reading a log stored in the storage apparatus, where the apparatus includes:

the query request receiving module is used for receiving a log query request sent by the client, wherein the log query request carries a preset identification field in a log to be queried;

and the log index query module is used for locally acquiring the log abstract, the log hash value and the second signature result corresponding to the preset identification field from the block chain server and returning the log abstract, the log hash value and the second signature result to the client, so that the client can verify the second signature result to obtain the log abstract, the log hash value and the storage address in the second signature result, and then judging whether the log abstract and the log hash value locally acquired from the block chain server are consistent with the log abstract and the log hash value in the second signature result, if so, acquiring the log to be queried from the client or the cloud storage end according to the acquired storage address.

In order to achieve the above object, the present invention further provides a block chain-based log reading apparatus for reading a log stored in the storage apparatus, where the apparatus includes:

the query request sending module is used for sending a log query request to the block chain server, wherein the log query request carries a preset identification field in a log to be queried, so that the block chain server locally obtains a log abstract, a log hash value and a second signature result corresponding to the preset identification field from the block chain server and returns the log abstract, the log hash value and the second signature result;

the verification module is used for verifying the returned second signature result by adopting the server public key to obtain a log abstract, a log hash value and a storage address in the second signature result;

and the log query module is used for judging whether the log abstract and the log hash value which are locally acquired from the block chain server are consistent with the log abstract and the log hash value in the second signature result, and if so, acquiring the log to be queried from a client local or a cloud storage end according to the acquired storage address.

To achieve the above object, the present invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any of the preceding methods when executing the computer program.

To achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of any of the methods described above.

By adopting the technical scheme, the invention has the following beneficial effects:

according to the invention, the block chain technology is introduced, the log abstract, the log hash value and the log storage address are stored in the block chain server, and due to the advantage of difficult tampering of the block chain, the safety of the log abstract, the log hash value and the log storage address can be improved, and the source tracing can be carried out according to the traceability of the block chain, so that the log use record can be obtained. The block chain can not store overlarge data, so that the log to be stored is stored in the local client or the cloud storage end, and after the log to be inquired is inquired according to the log storage address, whether the log is tampered or not can be judged by comparing the hash operation result of the log inquired from the local client or the cloud storage end with the hash value of the log inquired from the block chain, and the data safety is guaranteed. In addition, the invention greatly improves the confidentiality, the integrity and the usability of the log through a unique encryption and decryption mechanism.

Drawings

Fig. 1 is a flowchart of a block chain-based log storage method according to an embodiment of the present invention;

fig. 2 is a flowchart of a block chain-based log storage method according to a second embodiment of the present invention;

fig. 3 is a flowchart of a block chain-based log storage method according to an embodiment of the present invention;

fig. 4 is a flowchart of a block chain-based log storage method according to a second embodiment of the present invention;

fig. 5 is a flowchart of a log reading method based on a block chain according to a third embodiment of the present invention;

fig. 6 is a flowchart of a log reading method based on a block chain according to a fourth embodiment of the present invention;

fig. 7 is a flowchart of a block chain-based log storage apparatus according to a fifth embodiment of the present invention;

fig. 8 is a flowchart of a block chain based log storage apparatus according to a sixth embodiment of the present invention;

fig. 9 is a flowchart of a log reading apparatus based on a block chain according to a seventh embodiment of the present invention;

fig. 10 is a flowchart of a log reading apparatus based on a block chain according to an eighth embodiment of the present invention;

fig. 11 is a hardware architecture diagram of the computer apparatus of the present invention.

Detailed Description

Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.

It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.

In the invention, the blockchain server refers to a server added into a blockchain, the client refers to a service system needing to store logs, and the blockchain server can perform data interaction with the client through appropriate technologies such as a network and a near field communication technology.

26页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:异常流量监测方法、装置、设备及存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类