CN112383537A - Trusted block chain uplink method and user application uplink system - Google Patents

Trusted block chain uplink method and user application uplink system Download PDF

Info

Publication number
CN112383537A
CN112383537A CN202011250777.5A CN202011250777A CN112383537A CN 112383537 A CN112383537 A CN 112383537A CN 202011250777 A CN202011250777 A CN 202011250777A CN 112383537 A CN112383537 A CN 112383537A
Authority
CN
China
Prior art keywords
data
block chain
cloud platform
user application
uplink
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011250777.5A
Other languages
Chinese (zh)
Other versions
CN112383537B (en
Inventor
林炀平
宋学武
徐铁兵
刘卫卫
柯叶翔
赵帅
过祖耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Gandao Intelligent Technology Co ltd
Original Assignee
Hangzhou Gandao Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Gandao Intelligent Technology Co ltd filed Critical Hangzhou Gandao Intelligent Technology Co ltd
Priority to CN202011250777.5A priority Critical patent/CN112383537B/en
Publication of CN112383537A publication Critical patent/CN112383537A/en
Application granted granted Critical
Publication of CN112383537B publication Critical patent/CN112383537B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a trusted block chain chaining method and a user application chain chaining system, wherein the trusted block chain chaining method comprises the steps of establishing a centralized cloud platform for receiving data to be chained in user application; receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data; before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform; and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain. In this way, the trusted block chain uplink method and the user application uplink system provided by the embodiment of the invention include that data needing to be uplink of the centralized cloud platform is verified through the block chain trusted module, so that the data to be uplink of the centralized platform is real and reliable and cannot be tampered.

Description

Trusted block chain uplink method and user application uplink system
Technical Field
The invention relates to the technical field of block chain encryption, in particular to a trusted block chain uplink method and a user application uplink system.
Background
In a traditional block chain data uplink mode, data is uploaded to a block chain through a centralized cloud platform, but data tampering cost at a platform end is low, so that the data is still possible to be tampered in the process of uplink of the data by the cloud platform. The content may have been modified although the data ultimately stored on the blockchain cannot be tampered with and can be traced back.
Therefore, in the process of chaining data on the cloud platform, the data are still easy to modify, so that the data on the chain are not real and can not be trusted.
Disclosure of Invention
The embodiment of the invention provides a trusted block chain uplink method and a user application uplink system, which are used for solving the technical problem that uplink data are easy to be tampered in the prior art.
The embodiment of the invention provides a trusted block chain uplink method, which comprises the following steps: establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
According to an embodiment of the present invention, the method for trusted blockchain uplink receives data to be uplink in the user application through a blockchain trusted module, and performs encryption verification on the received data, including,
and performing digital identity authentication and credible state monitoring on the data to be linked, and establishing a verification mechanism.
According to an embodiment of the present invention, a method for trusted block chain uplink includes receiving, by a block chain trusted module, data to be uplink transmitted in a user application, and performing encryption verification on the received data, and further includes:
and the block chain trusted module forms a chain block structure by the data passing through the verification mechanism to store the data, and links the data to the alliance chain for user lookup and access.
According to an embodiment of the present invention, the method for uplink of the trusted block chain further includes:
and integrating the block chain trusted module in the user application to acquire data information in the user application.
According to the trusted block chain chaining method provided by the embodiment of the invention, the user application comprises an intelligent washing machine, an intelligent seal and an intelligent sweeping robot.
An embodiment of the present invention further provides a user application uplink system, including: a processor;
a memory coupled to the processor; wherein the memory stores instructions for execution by the processor to enable the processor to:
establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
According to an embodiment of the uplink system for user applications, the block chain trusted module further includes an encryption mechanism for encrypting the received data to be uplink.
The trusted block chain uplink method and the user application uplink system provided by the embodiment of the invention comprise the step of verifying data needing to be uplink of the centralized cloud platform through the block chain trusted module, so that the data to be uplink of the centralized platform is real and reliable and cannot be tampered.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a trusted block link chaining method according to an embodiment of the present invention;
FIG. 2 is a block diagram of a user application uplink system according to an embodiment of the present invention;
FIG. 3 is a diagram of another state component of a user application uplink system in accordance with an embodiment of the present invention;
fig. 4 is a simplified structural diagram of a user application uplink system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 to 4, fig. 1 is a flowchart illustrating a trusted block link uplink method according to an embodiment of the present invention, fig. 2 is a structural composition diagram illustrating a user application uplink system according to an embodiment of the present invention, fig. 3 is another structural composition diagram illustrating the user application uplink system according to an embodiment of the present invention, and fig. 4 is a structural diagram illustrating the user application uplink system according to an embodiment of the present invention.
The invention provides a trusted block chain chaining method, which comprises the following steps:
s110, establishing a centralized cloud platform for receiving data to be uplink in user application.
It should be noted that, the block chain trusted module receives data to be uplink in the user application, and performs encryption verification on the received data, including performing digital identity authentication and trusted status monitoring on the data to be uplink, and establishing a verification mechanism. Specifically, receiving data to be uplinked in a user application through a block chain trusted module, and performing encryption verification on the received data, further includes: the block chain credible module forms a chain block structure by the data passing through the verification mechanism to store the data, and links to the alliance chain for user lookup and access.
S120, receiving data to be uplinked in the user application through the block chain trusted module, and performing encryption verification on the received data.
S130, before the centralized cloud platform carries out chain loading on the data to be chain loaded, the block chain trusted module carries out verification on the data to be chain loaded of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to the alliance chain.
In an embodiment of the present invention, the user applications include, but are not limited to, an intelligent washing machine, an intelligent stamp, and an intelligent sweeping robot. The centralized cloud platform can receive data information to be linked of the intelligent washing machine, the intelligent seal and the intelligent sweeping robot. The block chain trusted module can be integrated in the user application, and when the data information of the user application needs to be uplink-linked, the block chain trusted module can acquire the data information to be uplink-linked, and further perform digital identity authentication and trusted state detection on the data information to be uplink-linked. Namely, after the relevant data information is acquired, the data information of the user is encrypted through a credible verification mechanism, namely, through digital identity authentication, credible state detection and the like. And upload the encrypted data to the federation chain. And the uplink data can be traced and consulted conveniently.
The present invention also provides a user application uplink system, which includes: a processor; a memory coupled to the processor; wherein the memory stores instructions for execution by the processor to enable the processor to: establishing a centralized cloud platform for receiving data to be linked in user application; receiving data to be linked in user application through a block chain trusted module, and carrying out encryption verification on the received data; before the centralized cloud platform carries out chain loading on the data to be chain loaded, the block chain trusted module carries out verification on the data to be chain loaded of the centralized cloud platform; and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to the alliance chain. The block chain trusted module further comprises an encryption mechanism for encrypting the received data to be linked. The user application uplink system can perform truth checking and verification on data before the centralized cloud platform uplink, and the encrypted data is also uplink to the alliance chain, so that the data after the centralized cloud platform uplink can be traced and inquired.
The uplink system is connected with the terminal electronic equipment, and further can perform operations such as data query and the like through the terminal electronic equipment. In particular, an "electronic device" (or simply "terminal") as used herein includes, but is not limited to, an apparatus that is configured to receive/transmit communication signals via a wireline connection, such as via a Public Switched Telephone Network (PSTN), a Digital Subscriber Line (DSL), a digital cable, a direct cable connection, and/or another data connection/network, and/or via a wireless interface (e.g., for a cellular network, a Wireless Local Area Network (WLAN), a digital television network such as a DVB-H network, a satellite network, an AM-FM broadcast transmitter, and/or another communication terminal). A communication terminal arranged to communicate over a wireless interface may be referred to as a "wireless communication terminal", "wireless terminal" or "electronic device". Examples of electronic devices include, but are not limited to, satellite or cellular telephones; a Personal Communications System (PCS) terminal that may combine a cellular radiotelephone with data processing, facsimile and data communications capabilities; PDAs that may include radiotelephones, pagers, internet/intranet access, Web browsers, notepads, calendars, and/or Global Positioning System (GPS) receivers; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. A cellular phone is an electronic device equipped with a cellular communication module.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, in the embodiments of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or may alternatively include other components or elements inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (7)

1. A method for trusted blockchain uplink, comprising:
establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
2. The method of claim 1, wherein said receiving data to be uplink in said user application via a blockchain trusted module and cryptographically verifying the received data comprises,
and performing digital identity authentication and credible state monitoring on the data to be linked, and establishing a verification mechanism.
3. The method of claim 2, wherein the receiving data to be uplink in the user application via a blockchain trusted module and performing encryption check on the received data further comprises:
and the block chain trusted module forms a chain block structure by the data passing through the verification mechanism to store the data, and links the data to the alliance chain for user lookup and access.
4. The method of claim 1, further comprising:
and integrating the block chain trusted module in the user application to acquire data information in the user application.
5. The trusted block chain winding method according to claim 4, wherein the user applications include intelligent washing machines, intelligent seals, and intelligent sweeping robots.
6. A user application uplink system, comprising:
a processor;
a memory coupled to the processor; wherein the memory stores instructions for execution by the processor to enable the processor to:
establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
7. The ul system of claim 6, wherein the blockchain trusted module further comprises an encryption mechanism for encrypting the received data to be uplinked.
CN202011250777.5A 2020-11-11 2020-11-11 Trusted block chain uplink method and user application uplink system Active CN112383537B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011250777.5A CN112383537B (en) 2020-11-11 2020-11-11 Trusted block chain uplink method and user application uplink system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011250777.5A CN112383537B (en) 2020-11-11 2020-11-11 Trusted block chain uplink method and user application uplink system

Publications (2)

Publication Number Publication Date
CN112383537A true CN112383537A (en) 2021-02-19
CN112383537B CN112383537B (en) 2022-06-03

Family

ID=74578564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011250777.5A Active CN112383537B (en) 2020-11-11 2020-11-11 Trusted block chain uplink method and user application uplink system

Country Status (1)

Country Link
CN (1) CN112383537B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN108830733A (en) * 2018-06-21 2018-11-16 中国银行股份有限公司 A kind of information processing method, block scm cluster and system
CN109522363A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform synchronous method, system, equipment and storage medium based on block chain
CN110650139A (en) * 2019-09-25 2020-01-03 四川师范大学 Resource access control method and system of cloud platform
CN111353778A (en) * 2020-01-09 2020-06-30 广东南方新媒体股份有限公司 Block chain television lottery system
CN111369267A (en) * 2020-03-05 2020-07-03 广州宏算信息科技有限公司 Fruit and vegetable agricultural product tracing method, device and system based on block chain and storage medium
CN111427958A (en) * 2020-03-26 2020-07-17 北京链化未来科技有限公司 Decentralized data sharing method based on block chain
CN111510298A (en) * 2020-04-10 2020-08-07 中国司法大数据研究院有限公司 Cross-domain trusted data exchange method and system based on block chain
CN111797138A (en) * 2020-06-29 2020-10-20 北京荷月科技有限公司 Method and system for querying data on trusted front-end chain
CN111835500A (en) * 2020-07-08 2020-10-27 浙江工商大学 Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN111861194A (en) * 2020-07-16 2020-10-30 中国农业科学院深圳农业基因组研究所 Block chain system, biological product monitoring method and device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032372A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Trusted power grid transaction platform based on block chain technology
CN108830733A (en) * 2018-06-21 2018-11-16 中国银行股份有限公司 A kind of information processing method, block scm cluster and system
CN109522363A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform synchronous method, system, equipment and storage medium based on block chain
CN110650139A (en) * 2019-09-25 2020-01-03 四川师范大学 Resource access control method and system of cloud platform
CN111353778A (en) * 2020-01-09 2020-06-30 广东南方新媒体股份有限公司 Block chain television lottery system
CN111369267A (en) * 2020-03-05 2020-07-03 广州宏算信息科技有限公司 Fruit and vegetable agricultural product tracing method, device and system based on block chain and storage medium
CN111427958A (en) * 2020-03-26 2020-07-17 北京链化未来科技有限公司 Decentralized data sharing method based on block chain
CN111510298A (en) * 2020-04-10 2020-08-07 中国司法大数据研究院有限公司 Cross-domain trusted data exchange method and system based on block chain
CN111797138A (en) * 2020-06-29 2020-10-20 北京荷月科技有限公司 Method and system for querying data on trusted front-end chain
CN111835500A (en) * 2020-07-08 2020-10-27 浙江工商大学 Searchable encryption data secure sharing method based on homomorphic encryption and block chain
CN111861194A (en) * 2020-07-16 2020-10-30 中国农业科学院深圳农业基因组研究所 Block chain system, biological product monitoring method and device

Also Published As

Publication number Publication date
CN112383537B (en) 2022-06-03

Similar Documents

Publication Publication Date Title
US9877210B1 (en) Mobile device monitoring and control system
US20070117560A1 (en) Remote testing of mobile terminals
US20110141953A1 (en) Method for Managing Data Communication Between a Communication Device and Another Device and Communication Device
GB2378531A (en) Providing application / driver software for an accessory of a communications device
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN105933888A (en) Burning method and device of eSIM (Subscriber Identity Module) card based on NFC
CN105100415A (en) Login method and mobile terminal
RU2454819C2 (en) Method and system to read data from memory of remote mobile device
US20090221264A1 (en) Storage system of mobile terminal and access control method
CN111400737A (en) Multi-application physical isolation encrypted SIM card implementation device, method and terminal
CN105991293B (en) A kind of method of calibration and device
HK1066676A1 (en) Method and computer program product for verifying the authenticity of a telephone number reported in a request from a wireless device
US7698747B2 (en) Applet download in a communication system
KR20080088535A (en) Mobile terminal and method for operating a mobile terminal
CN112733127B (en) Bidirectional authentication method and system based on blockchain
CN112383537B (en) Trusted block chain uplink method and user application uplink system
US7502367B2 (en) Method for providing a program module in a communications system
CN112866287A (en) Cross-network access method, device and system based on office environment and storage medium
CN104331649A (en) Identity recognition system and method based on network connection
CN106788868A (en) signal shielding system, signal shielding system control method
CN106534602B (en) A kind of terminal and information processing method
CN102547661B (en) Method and device for establishing communication between Android system and telecommunications smart card
CN106599619A (en) Verification method and device
CN106488392B (en) Data transfer method and device
CN211830833U (en) Hardware encryption satellite mobile phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant