CN108600199A - A kind of transmission method and system of the Audit data based on block chain - Google Patents

A kind of transmission method and system of the Audit data based on block chain Download PDF

Info

Publication number
CN108600199A
CN108600199A CN201810305930.6A CN201810305930A CN108600199A CN 108600199 A CN108600199 A CN 108600199A CN 201810305930 A CN201810305930 A CN 201810305930A CN 108600199 A CN108600199 A CN 108600199A
Authority
CN
China
Prior art keywords
data
node
target data
request
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810305930.6A
Other languages
Chinese (zh)
Inventor
于卓
颜拥
刘周斌
董爱强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Electric Power Research Institute of State Grid Zhejiang Electric Power Co Ltd
Beijing China Power Information Technology Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Electric Power Research Institute of State Grid Zhejiang Electric Power Co Ltd
Beijing China Power Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, Electric Power Research Institute of State Grid Zhejiang Electric Power Co Ltd, Beijing China Power Information Technology Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810305930.6A priority Critical patent/CN108600199A/en
Publication of CN108600199A publication Critical patent/CN108600199A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The present invention provides a kind of transmission methods and system of the Audit data based on block chain, the request of data message that identification (RNC-ID) analytic module sends the request of data node received parses, obtain target data mark, and when locally not storing target data, is identified according to target data and request of data message is sent to data publication node;Data publication node is encrypted target data using the public key of request of data node, obtain the encryption data packet of target data, it is signed to the encryption data packet of target data using the private key of data publication node, and the encryption data packet for the target data for carrying signature is sent to request of data node;Request of data node verifies the signature of the encryption data packet of target data using the public key of the data publication node, after being verified, the encryption data packet of target data is decrypted using the private key of request of data node, target data is obtained, the safe and reliable transmission of Audit data is realized.

Description

A kind of transmission method and system of the Audit data based on block chain
Technical field
The present invention relates to block chain technical fields, more particularly to a kind of transmission of the Audit data based on block chain Method and system.
Background technology
The credibility of data is always the emphasis that audit process is concerned about, directly affects the confidence level of auditing result.Tradition Field audit is that accounting information in the past period is exercised supervision and checked.Due to being lagged on the time so that bookkeeper person In the presence of the possibility for illegally modifying or distorting book of accounts, thus there are the risks of business activities information distortion.The audit time is upper stagnant Afterwards but also supervision department fails to find, by the unlawful practice of supervision unit, supervision function to be caused to lack in time.With setting about Work is done account and is replaced by financial software so that historic change occurs for the form of expression of accounting data, and electronic data becomes audit core The main body looked into.Electronic data is easy to will not leave behind after distorting and distorting and distorts trace, this to audit compared with papery data Personnel are difficult to find, there are the risks of account information inaccuracy;Once electronic data passes through after careful illegal modifications, auditor Member can not restore the electronic data of modification, to obtain authentic and valid Audit data.
Therefore, the auditing method of account electronic accounting is either done by hand, although by expending a large amount of manpower, object Reason ensures that Audit data is credible to greatest extent.But there are still the feelings of data inaccuracy in the transmission process of Audit data Condition.
Invention content
In view of this, the present invention provides a kind of transmission method and system of the Audit data based on block chain, realizes and examine The safe and reliable transmission counted.
In order to achieve the above-mentioned object of the invention, specific technical solution provided by the invention is as follows:
A kind of transmission method of the Audit data based on block chain, the method includes:
The request of data message that identification (RNC-ID) analytic module sends the request of data node received parses, and obtains target Data Identification, and when locally not storing target data, sent the request of data message according to target data mark To data publication node;
The data publication node is encrypted target data using the public key of the request of data node, obtains target The encryption data packet of data signs to the encryption data packet of target data using the private key of the data publication node, and The encryption data packet for the target data for carrying signature is sent to the request of data node;
The request of data node is using the public key of the data publication node to the label of the encryption data packet of target data Name is verified, and after being verified, is carried out to the encryption data packet of target data using the private key of the request of data node Decryption, obtains target data.
Preferably, the target data mark includes naming system, prefix field and suffix field;The prefix field table Show that the corresponding data publication node address of the target data, the suffix field are that the target data is sent out in corresponding data Unique mark on cloth node.
Preferably, the request of data message sent to the request of data node received in the identification (RNC-ID) analytic module carries out Before parsing, the method further includes:
System level mark in publicly-owned chain is backuped to local by mark synchronization module, and the system in alliance's chain is each The multistage mark of node backups to local.
Preferably, the request of data message sent to the request of data node received in the identification (RNC-ID) analytic module carries out Parsing, obtaining target data mark further includes later:
The identification (RNC-ID) analytic module judges that whether to be stored with target data corresponding for local according to target data mark Data publication address of node;
If so, sending the corresponding data publication address of node of target data to the request of data node;
It is identified request of data message hair according to the target data if it is not, triggering executes the identification (RNC-ID) analytic module It send to data publication node.
Preferably, the identification (RNC-ID) analytic module identifies according to the target data request of data message being sent to number According to publisher node, including:
The identification (RNC-ID) analytic module judges that the target data identifies whether to identify for level one data;
If so, the identification (RNC-ID) analytic module obtains data publication node address corresponding with target data mark, and The request of data message is forwarded to the data publication node;
If it is not, the identification (RNC-ID) analytic module is with obtaining the first forwarding destination node corresponding with target data mark Location, and the request of data message is forwarded to the first forwarding destination node;
Whether the first forwarding destination node judges the first forwarding destination node according to target data mark Corresponding data publication node is identified for the target data;
If not the target data identifies corresponding data publication node, the first forwarding destination node obtains and institute Target data mark corresponding second forwarding destination node address is stated, and the request of data message is forwarded to described second turn Destination node is sent out, corresponding data publication node is identified until the request of data message is forwarded to the target data.
Preferably, the encryption data packet for the target data for carrying signature is sent to the number by the data publication node According to requesting node, including:
The encryption data packet for the target data for carrying signature is sent to Data Verification module by the data publication node;
The Data Verification module is using the public key of the data publication node to the label of the encryption data packet of target data Name is verified;
After being verified, the Data Verification module judges locally whether be stored with mesh according to target data mark Mark the corresponding request of data address of node of data;
If so, the encryption data packet for the target data for carrying signature is forwarded to request of data by the Data Verification module Node;
If it is not, the Data Verification module is with obtaining the first passback destination node corresponding with target data mark Location, and the encryption data packet for the target data for carrying signature is forwarded to the first passback destination node;
The first passback destination node uses the public key of the data publication node to the encryption data packet of target data Signature verified;
After being verified, the first passback destination node judges first passback according to target data mark Whether destination node is that the target data identifies corresponding request of data node;
If not the target data identifies corresponding request of data node, the first passback destination node obtains and institute Target data mark corresponding second passback destination node address is stated, and the encryption data packet of the target data of signature will be carried It is forwarded to the second passback destination node, until the encryption data packet for carrying the target data of signature is forwarded to the mesh Mark the corresponding request of data node of Data Identification.
Preferably, the data publication node is encrypted target data using the public key of the request of data node, The encryption data packet of target data is obtained, the encryption data packet of target data is carried out using the private key of the data publication node Signature, including:
The data publication node uses the public key of the request of data node according to predetermined encryption algorithm, to target data It is encrypted, obtains the ciphertext of target data;
According to the ciphertext of Preset Transfer agreement and target data, the encryption data packet of target data is built;
Obtain the private key of the data publication node, and according to the predetermined encryption algorithm and the data publication node Private key signs to the encryption data packet of target data.
A kind of Transmission system of the Audit data based on block chain, including:Identification (RNC-ID) analytic module, request of data node sum number According to publisher node;
The identification (RNC-ID) analytic module, the request of data message for being sent to the request of data node received carry out Parsing obtains target data mark, and when locally not storing target data, is identified the data according to the target data Request message is sent to the data publication node;
The data publication node is obtained for target data to be encrypted using the public key of the request of data node To the encryption data packet of target data, the encryption data packet of target data is signed using the private key of the data publication node Name, and the encryption data packet for the target data for carrying signature is sent to the request of data node;
The request of data node, for the public key using the data publication node to the encryption data packet of target data Signature verified, after being verified, using the private key of the request of data node to the encryption data packet of target data It is decrypted, obtains target data.
Preferably, the system also includes:
Synchronization module is identified, for the system level mark in publicly-owned chain to be backuped to local, and will be in alliance's chain The multistage mark of each node of uniting backups to local.
Preferably, the identification (RNC-ID) analytic module judges locally whether be stored with target data according to target data mark Corresponding data publication address of node;
If so, sending the corresponding data publication address of node of target data to the request of data node;
It is identified request of data message hair according to the target data if it is not, triggering executes the identification (RNC-ID) analytic module It send to data publication node.
Compared with the existing technology, beneficial effects of the present invention are as follows:
The transmission method and system of a kind of Audit data based on block chain disclosed by the invention, application block chain technology are real The transmission of existing Audit data, passes through the data publication address of node of target data mark location target data, identification (RNC-ID) analytic mould The request of data message that block sends the request of data node received parses, and obtains target data mark, and when local When not storing target data, is identified according to the target data and the request of data message is sent to data publication node, and Data are encrypted and decrypted respectively by using the public and private key of each node, signature verification, Audit data can be disclosed and be deposited It is placed on block chain chain and is utilized by malicious third parties without concern of data, to realize the safe and reliable biography of Audit data It is defeated.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of transmission method flow chart of the Audit data based on block chain disclosed by the embodiments of the present invention;
Fig. 2 is a kind of method that the request of data message is sent to data publication node disclosed by the embodiments of the present invention Flow chart;
Fig. 3 is the schematic diagram of a scenario of level-one identification (RNC-ID) analytic disclosed by the embodiments of the present invention;
Fig. 4 is the schematic diagram of a scenario of multistage identification (RNC-ID) analytic disclosed by the embodiments of the present invention;
Fig. 5 is a kind of Transmission system structural schematic diagram of the Audit data based on block chain disclosed by the embodiments of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, present embodiment discloses a kind of transmission method of the Audit data based on block chain, specifically include with Lower step:
S101:The request of data message that identification (RNC-ID) analytic module sends the request of data node received parses, and obtains It identifies to target data, and when locally not storing target data, is identified the request of data report according to the target data Text is sent to data publication node;
Before carrying out Audit data transmission, first have to auditing system being registered on publicly-owned chain, publicly-owned chain is to owner Open, when auditing system is registered on publicly-owned chain, auditing system obtains a pair of public and private key and level-one mark;Then, it is based on Fabric frameworks and level-one mark structure alliance chain, alliance's chain open portion of tissue mechanism, and alliance's chain includes multiple nodes, There can be level division between multiple nodes, can also include that multiple two levels identify such as under level-one mark, multiple three-level marks Know, etc.;Multiple nodes may be same layer in alliance's chain, and each node has the two level mark under level-one mark.
The target data is the Audit data being stored on block chain, target data mark include naming system, Prefix field and suffix field;The prefix field indicates the corresponding data publication node address of the target data, after described Asyllabia section is unique mark of the target data on corresponding data publication node.Naming system, prefix field and suffix Field three parts are separated with slash, are divided into two parts in prefix with decimal point, and format is [BTC_BLOCK_SN] [BTC_ TRANS_INDEX], wherein [BTC_BLOCK_SN] is the number of the block where auditing system from the registration record on publicly-owned chain Serial number, [BTC_TRANS_INDEX] be registration record of the auditing system on block chain where block in specific storage The Arabic numerals of position are numbered, block chain can not tamper ensure that Data Identification can not tamper.Suffix [DSS] by Auditing system is optional and voluntarily provides, and independently ensures uniqueness, so that it is determined that the specific data content mark corresponding to the mark.
It should be noted that the request of data report sent to the request of data node received in the identification (RNC-ID) analytic module Before text is parsed, the method further includes:
System level mark in publicly-owned chain is backuped to local by mark synchronization module, and the system in alliance's chain is each The multistage mark of node backups to local.
Local subsequently identify target data convenient for identification (RNC-ID) analytic module is backuped to the mark of each node to parse.
It should also be noted that, the mark of identification (RNC-ID) analytic module parsing may be the mark of a certain target data, it is also possible to For the mark of a certain sensor.
It parses, obtains in the request of data message that the identification (RNC-ID) analytic module sends the request of data node received Further include after to target data mark:
The identification (RNC-ID) analytic module judges that whether to be stored with target data corresponding for local according to target data mark Data publication address of node;
If so, sending the corresponding data publication address of node of target data to the request of data node;
It is identified request of data message hair according to the target data if it is not, triggering executes the identification (RNC-ID) analytic module It send to data publication node.
The request of data message is sent referring to Fig. 2, the identification (RNC-ID) analytic module is identified according to the target data To data publication node, including:
S201:The identification (RNC-ID) analytic module judges that the target data identifies whether to identify for level one data;
If so, executing S202, S202:The identification (RNC-ID) analytic module obtains data hair corresponding with target data mark Cloth node address, and the request of data message is forwarded to the data publication node;
If it is not, executing S203, S203:The identification (RNC-ID) analytic module obtains first turn corresponding with target data mark Destination node address is sent out, and the request of data message is forwarded to the first forwarding destination node;
S204:The first forwarding destination node judges the first forwarding destination node according to target data mark Whether it is that the target data identifies corresponding data publication node;
If the target data identifies corresponding data publication node and executes S205, S205:By the request of data report Text is forwarded to the first forwarding destination node;
If not the target data identifies corresponding data publication node and executes S206, S206:The first forwarding mesh Node obtain corresponding with target data mark second and forward destination node address, and by the request of data message turn It is sent to the second forwarding destination node, corresponding number is identified until the request of data message is forwarded to the target data According to publisher node.
Specifically, please referring to Fig. 3 and Fig. 4, Fig. 3 is the schematic diagram of a scenario that identification (RNC-ID) analytic module carries out level-one identification (RNC-ID) analytic, Fig. 4 is the schematic diagram of a scenario of multistage identification (RNC-ID) analytic.User request of data node input target data mark, number where client Request of data is initiated after target data mark packing is obtained request of data message according to requesting node.If local be not present number of targets Destination address is forwarded according to then being obtained in alliance's chain query, and by data message forwarding to the address, the corresponding node in the address is sentenced Disconnected target data identifies whether to arrived afterbody, and repeated resolution is after finding required data, backtracking.
S102:The data publication node is encrypted target data using the public key of the request of data node, obtains To the encryption data packet of target data, the encryption data packet of target data is signed using the private key of the data publication node Name, and the encryption data packet for the target data for carrying signature is sent to the request of data node;
It should be noted that each node has the public private key pair for belonging to itself, each node that can pass through interrogation zone Block chain obtains the public key of other nodes, but cannot obtain the private key of other nodes.
Specifically, the data publication node uses the public key of the request of data node according to predetermined encryption algorithm, it is right Target data is encrypted, and obtains the ciphertext of target data;
According to the ciphertext of Preset Transfer agreement and target data, the encryption data packet of target data is built;
Obtain the private key of the data publication node, and according to the predetermined encryption algorithm and the data publication node Private key signs to the encryption data packet of target data.
Predetermined encryption algorithm can be any one Encryption Algorithm, such as RSA Algorithm etc..
It signs for the encryption data packet of target data, ensures that target data is not tampered in transmission process, ensure Target data is from the horse's mouth.
S103:The request of data node uses the public key of the data publication node to the encryption data packet of target data Signature verified, after being verified, using the private key of the request of data node to the encryption data packet of target data It is decrypted, obtains target data.
The encryption data packet for the target data for carrying signature is sent to the request of data by the data publication node Node, including:
The encryption data packet for the target data for carrying signature is sent to Data Verification module by the data publication node;
The Data Verification module is using the public key of the data publication node to the label of the encryption data packet of target data Name is verified;
After being verified, the Data Verification module judges locally whether be stored with mesh according to target data mark Mark the corresponding request of data address of node of data;
If so, the encryption data packet for the target data for carrying signature is forwarded to request of data by the Data Verification module Node;
If it is not, the Data Verification module is with obtaining the first passback destination node corresponding with target data mark Location, and the encryption data packet for the target data for carrying signature is forwarded to the first passback destination node;
The first passback destination node uses the public key of the data publication node to the encryption data packet of target data Signature verified;
After being verified, the first passback destination node judges first passback according to target data mark Whether destination node is that the target data identifies corresponding request of data node;
If not the target data identifies corresponding request of data node, the first passback destination node obtains and institute Target data mark corresponding second passback destination node address is stated, and the encryption data packet of the target data of signature will be carried It is forwarded to the second passback destination node, until the encryption data packet for carrying the target data of signature is forwarded to the mesh Mark the corresponding request of data node of Data Identification.
It is understood that in the passback process of target data, destination node and request of data node are each returned It is required for verifying the signature of target data, the reliability in verification target data source is verified, caches and continue Otherwise processing passback downwards abandons the encryption data packet of target data.
In the passback process of target data, only request of data node has permission the encryption data of decryption target data Packet, that is, the encryption data packet of target data can be decrypted by the private key of request of data node, other nodes are not due to having There are the private key of request of data node, no permission that the encryption data packet of target data is decrypted, ensures that target data is passing Safety during defeated.
A kind of transmission method of the Audit data based on block chain disclosed in the present embodiment, application block chain technology, which is realized, to be examined The transmission counted passes through the data publication address of node of target data mark location target data, identification (RNC-ID) analytic module pair The request of data message that the request of data node received is sent is parsed, and obtains target data mark, and ought not deposit locally When storing up target data, is identified according to the target data and the request of data message is sent to data publication node, and passed through Data are encrypted and decrypted respectively using the public and private key of each node, signature verification, Audit data can be disclosed and is stored in It is utilized by malicious third parties without concern of data on block chain chain, to realize the safe and reliable transmission of Audit data.
Based on a kind of transmission method of the Audit data based on block chain disclosed in above-described embodiment, referring to Fig. 5, this reality It applies example correspondence and discloses a kind of Transmission system of the Audit data based on block chain, including:Identification (RNC-ID) analytic module 501, data are asked Ask node 502 and data publisher node 503;
The identification (RNC-ID) analytic module 501, the request of data report for being sent to the request of data node 502 received Text is parsed, and is obtained target data mark, and when locally not storing target data, is identified institute according to the target data It states request of data message and is sent to the data publication node 503;
The data publication node 503, for being added to target data using the public key of the request of data node 502 It is close, the encryption data packet of target data is obtained, using the private key of the data publication node 503 to the encryption data of target data Packet is signed, and the encryption data packet for the target data for carrying signature is sent to the request of data node 502;
The request of data node 502, the encryption for the public key using the data publication node 503 to target data The signature of data packet is verified, after being verified, the encryption using the private key of the request of data node to target data Data packet is decrypted, and obtains target data.
Preferably, the system also includes:
Synchronization module is identified, for the system level mark in publicly-owned chain to be backuped to local, and will be in alliance's chain The multistage mark of each node of uniting backups to local.
Preferably, the identification (RNC-ID) analytic module judges locally whether be stored with target data according to target data mark Corresponding data publication address of node;
If so, sending the corresponding data publication address of node of target data to the request of data node;
It is identified request of data message hair according to the target data if it is not, triggering executes the identification (RNC-ID) analytic module It send to data publication node.
A kind of Transmission system of the Audit data based on block chain disclosed in the present embodiment, application block chain technology, which is realized, to be examined The transmission counted passes through the data publication address of node of target data mark location target data, identification (RNC-ID) analytic module pair The request of data message that the request of data node received is sent is parsed, and obtains target data mark, and ought not deposit locally When storing up target data, is identified according to the target data and the request of data message is sent to data publication node, and passed through Data are encrypted and decrypted respectively using the public and private key of each node, signature verification, Audit data can be disclosed and is stored in It is utilized by malicious third parties without concern of data on block chain chain, to realize the safe and reliable transmission of Audit data.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest range caused.

Claims (10)

1. a kind of transmission method of the Audit data based on block chain, which is characterized in that the method includes:
The request of data message that identification (RNC-ID) analytic module sends the request of data node received parses, and obtains target data Mark, and when locally not storing target data, identified according to the target data and the request of data message is sent to number According to publisher node;
The data publication node is encrypted target data using the public key of the request of data node, obtains target data Encryption data packet, signed to the encryption data packet of target data using the private key of the data publication node, and will take The encryption data packet of target data with signature is sent to the request of data node;
The request of data node using the data publication node public key to the signature of the encryption data packet of target data into Row verification, after being verified, is decrypted the encryption data packet of target data using the private key of the request of data node, Obtain target data.
2. according to the method described in claim 1, it is characterized in that, target data mark includes naming system, preceding asyllabia Section and suffix field;The prefix field indicates the corresponding data publication node address of the target data, the suffix field For unique mark of the target data on corresponding data publication node.
3. according to the method described in claim 1, it is characterized in that, in the identification (RNC-ID) analytic module to the request of data that receives Before the request of data message that node is sent is parsed, the method further includes:
System level mark in publicly-owned chain is backuped to local by mark synchronization module, and by each node of system in alliance's chain Multistage mark backup to local.
4. according to the method described in claim 1, it is characterized in that, in the identification (RNC-ID) analytic module to the request of data that receives The request of data message that node is sent is parsed, and is obtained target data mark and is further included later:
The identification (RNC-ID) analytic module judges locally whether be stored with the corresponding data of target data according to target data mark The address of publisher node;
If so, sending the corresponding data publication address of node of target data to the request of data node;
The request of data message is sent to according to target data mark if it is not, triggering executes the identification (RNC-ID) analytic module Data publication node.
5. according to the method described in claim 1, it is characterized in that, the identification (RNC-ID) analytic module is identified according to the target data The request of data message is sent to data publication node, including:
The identification (RNC-ID) analytic module judges that the target data identifies whether to identify for level one data;
If so, the identification (RNC-ID) analytic module obtains data publication node address corresponding with target data mark, and by institute It states request of data message and is forwarded to the data publication node;
If it is not, the identification (RNC-ID) analytic module obtains the first forwarding destination node corresponding with target data mark address, and The request of data message is forwarded to the first forwarding destination node;
The first forwarding destination node judges whether the first forwarding destination node is institute according to target data mark It states target data and identifies corresponding data publication node;
If not the target data identifies corresponding data publication node, the first forwarding destination node obtains and the mesh Data Identification corresponding second forwarding destination node address is marked, and the request of data message is forwarded to the second forwarding mesh Node, identify corresponding data publication node until the request of data message is forwarded to the target data.
6. according to the method described in claim 1, it is characterized in that, the data publication node will carry the number of targets of signature According to encryption data packet be sent to the request of data node, including:
The encryption data packet for the target data for carrying signature is sent to Data Verification module by the data publication node;
The Data Verification module using the data publication node public key to the signature of the encryption data packet of target data into Row verification;
After being verified, the Data Verification module judges locally whether be stored with number of targets according to target data mark According to corresponding request of data address of node;
If so, the encryption data packet for the target data for carrying signature is forwarded to request of data section by the Data Verification module Point;
If it is not, the Data Verification module obtains the first passback destination node corresponding with target data mark address, and The encryption data packet for the target data for carrying signature is forwarded to the first passback destination node;
The first passback destination node is using the public key of the data publication node to the label of the encryption data packet of target data Name is verified;
After being verified, the first passback destination node judges the first passback purpose according to target data mark Whether node is that the target data identifies corresponding request of data node;
If not the target data identifies corresponding request of data node, the first passback destination node obtains and the mesh Data Identification corresponding second passback destination node address is marked, and the encryption data packet forwarding of the target data of signature will be carried Destination node is returned to described second, until the encryption data packet for carrying the target data of signature is forwarded to the number of targets According to the corresponding request of data node of mark.
7. according to the method described in claim 1, it is characterized in that, the data publication node uses the request of data node Public key target data is encrypted, obtain the encryption data packet of target data, use the private key of the data publication node It signs to the encryption data packet of target data, including:
The data publication node uses the public key of the request of data node according to predetermined encryption algorithm, is carried out to target data Encryption, obtains the ciphertext of target data;
According to the ciphertext of Preset Transfer agreement and target data, the encryption data packet of target data is built;
The private key of the data publication node is obtained, and according to the private key of the predetermined encryption algorithm and the data publication node It signs to the encryption data packet of target data.
8. a kind of Transmission system of the Audit data based on block chain, which is characterized in that including:Identification (RNC-ID) analytic module, data are asked Ask node and data publisher node;
The identification (RNC-ID) analytic module, the request of data message for being sent to the request of data node received solve Analysis obtains target data mark, and when locally not storing target data, is identified according to the target data and ask the data Message is asked to be sent to the data publication node;
The data publication node obtains mesh for target data to be encrypted using the public key of the request of data node The encryption data packet for marking data, signs to the encryption data packet of target data using the private key of the data publication node, And the encryption data packet for the target data for carrying signature is sent to the request of data node;
The request of data node, for the public key using the data publication node to the label of the encryption data packet of target data Name is verified, and after being verified, is carried out to the encryption data packet of target data using the private key of the request of data node Decryption, obtains target data.
9. system according to claim 8, which is characterized in that the system also includes:
Synchronization module is identified, for the system level mark in publicly-owned chain to be backuped to local, and the system in alliance's chain is every The multistage mark of a node backups to local.
10. system according to claim 8, which is characterized in that
The identification (RNC-ID) analytic module is additionally operable to judge that the local target data that whether is stored with corresponds to according to target data mark Data publication address of node;
If so, sending the corresponding data publication address of node of target data to the request of data node;
The request of data message is sent to according to target data mark if it is not, triggering executes the identification (RNC-ID) analytic module Data publication node.
CN201810305930.6A 2018-04-08 2018-04-08 A kind of transmission method and system of the Audit data based on block chain Pending CN108600199A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810305930.6A CN108600199A (en) 2018-04-08 2018-04-08 A kind of transmission method and system of the Audit data based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810305930.6A CN108600199A (en) 2018-04-08 2018-04-08 A kind of transmission method and system of the Audit data based on block chain

Publications (1)

Publication Number Publication Date
CN108600199A true CN108600199A (en) 2018-09-28

Family

ID=63621138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810305930.6A Pending CN108600199A (en) 2018-04-08 2018-04-08 A kind of transmission method and system of the Audit data based on block chain

Country Status (1)

Country Link
CN (1) CN108600199A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833440A (en) * 2018-07-21 2018-11-16 杭州安恒信息技术股份有限公司 A kind of Network Security Audit System and network security auditing method based on block chain
CN109859067A (en) * 2018-12-28 2019-06-07 无锡井通网络科技有限公司 Auxiliary manufacture verification method, device and electronic equipment based on block chain
CN110009499A (en) * 2019-04-17 2019-07-12 北京八分量信息科技有限公司 A kind of method of commerce and system based on block chain and hidden address
CN110020513A (en) * 2018-11-07 2019-07-16 阿里巴巴集团控股有限公司 Signature recording method, verification method, device and storage medium
CN110147995A (en) * 2019-05-06 2019-08-20 山东公链信息科技有限公司 A kind of auditing method based on key level
CN110309259A (en) * 2018-10-10 2019-10-08 腾讯科技(深圳)有限公司 Audit result data storage, querying method, audit item storage method and device
CN111861687A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Accounting method and system based on block chain
CN113012414A (en) * 2021-01-28 2021-06-22 国电南瑞南京控制系统有限公司 Modular energy acquisition and control terminal supporting real-time reporting of household meter power failure information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106341421A (en) * 2016-10-31 2017-01-18 杭州云象网络技术有限公司 Block chain technology based data exchange method
CN106549933A (en) * 2016-09-22 2017-03-29 中金云金融(北京)大数据科技股份有限公司 The data transmission system and method for block chain
CN106973036A (en) * 2017-02-07 2017-07-21 杭州云象网络技术有限公司 A kind of block chain method for secret protection based on asymmetric encryption
CA3014727A1 (en) * 2016-02-23 2017-08-31 nChain Holdings Limited Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
CN107635028A (en) * 2017-10-19 2018-01-26 国网浙江省电力公司电力科学研究院 A kind of naming method of resource, device, block scm cluster and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3014727A1 (en) * 2016-02-23 2017-08-31 nChain Holdings Limited Method and system for efficient transfer of cryptocurrency associated with a payroll on a blockchain that leads to an automated payroll method and system based on smart contracts
CN106549933A (en) * 2016-09-22 2017-03-29 中金云金融(北京)大数据科技股份有限公司 The data transmission system and method for block chain
CN106341421A (en) * 2016-10-31 2017-01-18 杭州云象网络技术有限公司 Block chain technology based data exchange method
CN106973036A (en) * 2017-02-07 2017-07-21 杭州云象网络技术有限公司 A kind of block chain method for secret protection based on asymmetric encryption
CN107635028A (en) * 2017-10-19 2018-01-26 国网浙江省电力公司电力科学研究院 A kind of naming method of resource, device, block scm cluster and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王继业、高灵超、董爱强等: "基于区块链的数据安全共享网络体系研究", 《计算机研究与发展》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833440B (en) * 2018-07-21 2021-03-30 杭州安恒信息技术股份有限公司 Block chain-based network security audit system and network security audit method
CN108833440A (en) * 2018-07-21 2018-11-16 杭州安恒信息技术股份有限公司 A kind of Network Security Audit System and network security auditing method based on block chain
US11700113B2 (en) 2018-10-10 2023-07-11 Tencent Technology (Shenzhen) Company Limited Audit result data storage method and device, audit result data query method and device, and audit item storage method and device
US11316669B2 (en) 2018-10-10 2022-04-26 Tencent Technology (Shenzhen) Company Limited Audit result data storage method and device, audit result data query method and device, and audit item storage method and device
CN110309259B (en) * 2018-10-10 2021-09-03 腾讯科技(深圳)有限公司 Audit result data storage and query methods, and audit item storage method and device
CN110309259A (en) * 2018-10-10 2019-10-08 腾讯科技(深圳)有限公司 Audit result data storage, querying method, audit item storage method and device
CN110020513A (en) * 2018-11-07 2019-07-16 阿里巴巴集团控股有限公司 Signature recording method, verification method, device and storage medium
CN110020513B (en) * 2018-11-07 2023-08-22 创新先进技术有限公司 Signature recording method, signature verification device and storage medium
CN109859067A (en) * 2018-12-28 2019-06-07 无锡井通网络科技有限公司 Auxiliary manufacture verification method, device and electronic equipment based on block chain
CN110009499A (en) * 2019-04-17 2019-07-12 北京八分量信息科技有限公司 A kind of method of commerce and system based on block chain and hidden address
CN110147995A (en) * 2019-05-06 2019-08-20 山东公链信息科技有限公司 A kind of auditing method based on key level
CN111861687A (en) * 2020-06-12 2020-10-30 方欣科技有限公司 Accounting method and system based on block chain
CN113012414A (en) * 2021-01-28 2021-06-22 国电南瑞南京控制系统有限公司 Modular energy acquisition and control terminal supporting real-time reporting of household meter power failure information

Similar Documents

Publication Publication Date Title
CN108600199A (en) A kind of transmission method and system of the Audit data based on block chain
Marbouh et al. Blockchain for COVID-19: review, opportunities, and a trusted tracking system
US10972264B2 (en) Method for realizing network electronic identity identification information protection based on key dispersion calculation
CN108830109B (en) Electronic seal application, client implementation method, system and equipment, and storage medium
CN101170407B (en) A method for securely generating secret key pair and transmitting public key or certificate application file
CN110113167A (en) A kind of information protecting method of intelligent terminal, system and readable storage medium storing program for executing
CN101075866B (en) Method and system for loading message on Internet
ES2819192T3 (en) Identification of an anonymous entity as part of a group
CN107171785A (en) A kind of digital copyright management method based on block chain technology
CN107360156A (en) P2P network method for cloud storage based on block chain under a kind of big data environment
EP0484603A1 (en) Non-repudiation in computer networks
CN102110198A (en) Anti-counterfeiting method for web page
CN101425903A (en) Trusted network architecture based on identity
CN103236927B (en) A kind of authentication method based on dynamic ID mark and system
Das et al. AI and blockchain-based cloud-assisted secure vaccine distribution and tracking in IoMT-enabled COVID-19 environment
CN107517221A (en) A kind of acentric secure and trusted auditing system
CN111008366A (en) Copyright authorization method and device based on block chain
CN105518689A (en) Method and system related to authentication of users for accessing data networks
Cheng et al. Defenses against the truncation of computation results of free-roaming agents
JP2016170761A (en) Fraudulent money transfer prevention method and fraudulent money transfer prevention system
CN109347643A (en) A kind of monitoring and managing method and device of the customer center system safety based on ether mill
CN102255894A (en) Website information verification method, system and resolution server
CN110634072B (en) Block chain transaction system based on multi-signature and hardware encryption
CN103281180B (en) User is protected to access the bill generation method of privacy in a kind of network service
CN103200179A (en) Website certification, deployment and identification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180928