CN112383537A - Trusted block chain uplink method and user application uplink system - Google Patents
Trusted block chain uplink method and user application uplink system Download PDFInfo
- Publication number
- CN112383537A CN112383537A CN202011250777.5A CN202011250777A CN112383537A CN 112383537 A CN112383537 A CN 112383537A CN 202011250777 A CN202011250777 A CN 202011250777A CN 112383537 A CN112383537 A CN 112383537A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- cloud platform
- user application
- uplink
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a trusted block chain chaining method and a user application chain chaining system, wherein the trusted block chain chaining method comprises the steps of establishing a centralized cloud platform for receiving data to be chained in user application; receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data; before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform; and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain. In this way, the trusted block chain uplink method and the user application uplink system provided by the embodiment of the invention include that data needing to be uplink of the centralized cloud platform is verified through the block chain trusted module, so that the data to be uplink of the centralized platform is real and reliable and cannot be tampered.
Description
Technical Field
The invention relates to the technical field of block chain encryption, in particular to a trusted block chain uplink method and a user application uplink system.
Background
In a traditional block chain data uplink mode, data is uploaded to a block chain through a centralized cloud platform, but data tampering cost at a platform end is low, so that the data is still possible to be tampered in the process of uplink of the data by the cloud platform. The content may have been modified although the data ultimately stored on the blockchain cannot be tampered with and can be traced back.
Therefore, in the process of chaining data on the cloud platform, the data are still easy to modify, so that the data on the chain are not real and can not be trusted.
Disclosure of Invention
The embodiment of the invention provides a trusted block chain uplink method and a user application uplink system, which are used for solving the technical problem that uplink data are easy to be tampered in the prior art.
The embodiment of the invention provides a trusted block chain uplink method, which comprises the following steps: establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
According to an embodiment of the present invention, the method for trusted blockchain uplink receives data to be uplink in the user application through a blockchain trusted module, and performs encryption verification on the received data, including,
and performing digital identity authentication and credible state monitoring on the data to be linked, and establishing a verification mechanism.
According to an embodiment of the present invention, a method for trusted block chain uplink includes receiving, by a block chain trusted module, data to be uplink transmitted in a user application, and performing encryption verification on the received data, and further includes:
and the block chain trusted module forms a chain block structure by the data passing through the verification mechanism to store the data, and links the data to the alliance chain for user lookup and access.
According to an embodiment of the present invention, the method for uplink of the trusted block chain further includes:
and integrating the block chain trusted module in the user application to acquire data information in the user application.
According to the trusted block chain chaining method provided by the embodiment of the invention, the user application comprises an intelligent washing machine, an intelligent seal and an intelligent sweeping robot.
An embodiment of the present invention further provides a user application uplink system, including: a processor;
a memory coupled to the processor; wherein the memory stores instructions for execution by the processor to enable the processor to:
establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
According to an embodiment of the uplink system for user applications, the block chain trusted module further includes an encryption mechanism for encrypting the received data to be uplink.
The trusted block chain uplink method and the user application uplink system provided by the embodiment of the invention comprise the step of verifying data needing to be uplink of the centralized cloud platform through the block chain trusted module, so that the data to be uplink of the centralized platform is real and reliable and cannot be tampered.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a trusted block link chaining method according to an embodiment of the present invention;
FIG. 2 is a block diagram of a user application uplink system according to an embodiment of the present invention;
FIG. 3 is a diagram of another state component of a user application uplink system in accordance with an embodiment of the present invention;
fig. 4 is a simplified structural diagram of a user application uplink system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 to 4, fig. 1 is a flowchart illustrating a trusted block link uplink method according to an embodiment of the present invention, fig. 2 is a structural composition diagram illustrating a user application uplink system according to an embodiment of the present invention, fig. 3 is another structural composition diagram illustrating the user application uplink system according to an embodiment of the present invention, and fig. 4 is a structural diagram illustrating the user application uplink system according to an embodiment of the present invention.
The invention provides a trusted block chain chaining method, which comprises the following steps:
s110, establishing a centralized cloud platform for receiving data to be uplink in user application.
It should be noted that, the block chain trusted module receives data to be uplink in the user application, and performs encryption verification on the received data, including performing digital identity authentication and trusted status monitoring on the data to be uplink, and establishing a verification mechanism. Specifically, receiving data to be uplinked in a user application through a block chain trusted module, and performing encryption verification on the received data, further includes: the block chain credible module forms a chain block structure by the data passing through the verification mechanism to store the data, and links to the alliance chain for user lookup and access.
S120, receiving data to be uplinked in the user application through the block chain trusted module, and performing encryption verification on the received data.
S130, before the centralized cloud platform carries out chain loading on the data to be chain loaded, the block chain trusted module carries out verification on the data to be chain loaded of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to the alliance chain.
In an embodiment of the present invention, the user applications include, but are not limited to, an intelligent washing machine, an intelligent stamp, and an intelligent sweeping robot. The centralized cloud platform can receive data information to be linked of the intelligent washing machine, the intelligent seal and the intelligent sweeping robot. The block chain trusted module can be integrated in the user application, and when the data information of the user application needs to be uplink-linked, the block chain trusted module can acquire the data information to be uplink-linked, and further perform digital identity authentication and trusted state detection on the data information to be uplink-linked. Namely, after the relevant data information is acquired, the data information of the user is encrypted through a credible verification mechanism, namely, through digital identity authentication, credible state detection and the like. And upload the encrypted data to the federation chain. And the uplink data can be traced and consulted conveniently.
The present invention also provides a user application uplink system, which includes: a processor; a memory coupled to the processor; wherein the memory stores instructions for execution by the processor to enable the processor to: establishing a centralized cloud platform for receiving data to be linked in user application; receiving data to be linked in user application through a block chain trusted module, and carrying out encryption verification on the received data; before the centralized cloud platform carries out chain loading on the data to be chain loaded, the block chain trusted module carries out verification on the data to be chain loaded of the centralized cloud platform; and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to the alliance chain. The block chain trusted module further comprises an encryption mechanism for encrypting the received data to be linked. The user application uplink system can perform truth checking and verification on data before the centralized cloud platform uplink, and the encrypted data is also uplink to the alliance chain, so that the data after the centralized cloud platform uplink can be traced and inquired.
The uplink system is connected with the terminal electronic equipment, and further can perform operations such as data query and the like through the terminal electronic equipment. In particular, an "electronic device" (or simply "terminal") as used herein includes, but is not limited to, an apparatus that is configured to receive/transmit communication signals via a wireline connection, such as via a Public Switched Telephone Network (PSTN), a Digital Subscriber Line (DSL), a digital cable, a direct cable connection, and/or another data connection/network, and/or via a wireless interface (e.g., for a cellular network, a Wireless Local Area Network (WLAN), a digital television network such as a DVB-H network, a satellite network, an AM-FM broadcast transmitter, and/or another communication terminal). A communication terminal arranged to communicate over a wireless interface may be referred to as a "wireless communication terminal", "wireless terminal" or "electronic device". Examples of electronic devices include, but are not limited to, satellite or cellular telephones; a Personal Communications System (PCS) terminal that may combine a cellular radiotelephone with data processing, facsimile and data communications capabilities; PDAs that may include radiotelephones, pagers, internet/intranet access, Web browsers, notepads, calendars, and/or Global Positioning System (GPS) receivers; and conventional laptop and/or palmtop receivers or other electronic devices that include a radiotelephone transceiver. A cellular phone is an electronic device equipped with a cellular communication module.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, in the embodiments of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or may alternatively include other components or elements inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (7)
1. A method for trusted blockchain uplink, comprising:
establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
2. The method of claim 1, wherein said receiving data to be uplink in said user application via a blockchain trusted module and cryptographically verifying the received data comprises,
and performing digital identity authentication and credible state monitoring on the data to be linked, and establishing a verification mechanism.
3. The method of claim 2, wherein the receiving data to be uplink in the user application via a blockchain trusted module and performing encryption check on the received data further comprises:
and the block chain trusted module forms a chain block structure by the data passing through the verification mechanism to store the data, and links the data to the alliance chain for user lookup and access.
4. The method of claim 1, further comprising:
and integrating the block chain trusted module in the user application to acquire data information in the user application.
5. The trusted block chain winding method according to claim 4, wherein the user applications include intelligent washing machines, intelligent seals, and intelligent sweeping robots.
6. A user application uplink system, comprising:
a processor;
a memory coupled to the processor; wherein the memory stores instructions for execution by the processor to enable the processor to:
establishing a centralized cloud platform for receiving data to be linked in user application;
receiving data to be uplinked in the user application through a block chain trusted module, and carrying out encryption verification on the received data;
before the centralized cloud platform links the data to be linked, the block chain trusted module verifies the data to be linked of the centralized cloud platform;
and if the data received by the block chain trusted module is consistent with the data to be linked by the centralized cloud platform, linking the data received by the centralized cloud platform to a coalition chain.
7. The ul system of claim 6, wherein the blockchain trusted module further comprises an encryption mechanism for encrypting the received data to be uplinked.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011250777.5A CN112383537B (en) | 2020-11-11 | 2020-11-11 | Trusted block chain uplink method and user application uplink system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011250777.5A CN112383537B (en) | 2020-11-11 | 2020-11-11 | Trusted block chain uplink method and user application uplink system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112383537A true CN112383537A (en) | 2021-02-19 |
CN112383537B CN112383537B (en) | 2022-06-03 |
Family
ID=74578564
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011250777.5A Active CN112383537B (en) | 2020-11-11 | 2020-11-11 | Trusted block chain uplink method and user application uplink system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112383537B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018032372A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Trusted power grid transaction platform based on block chain technology |
CN108830733A (en) * | 2018-06-21 | 2018-11-16 | 中国银行股份有限公司 | A kind of information processing method, block scm cluster and system |
CN109522363A (en) * | 2018-10-18 | 2019-03-26 | 上海达家迎信息科技有限公司 | Cloud platform synchronous method, system, equipment and storage medium based on block chain |
CN110650139A (en) * | 2019-09-25 | 2020-01-03 | 四川师范大学 | Resource access control method and system of cloud platform |
CN111353778A (en) * | 2020-01-09 | 2020-06-30 | 广东南方新媒体股份有限公司 | Block chain television lottery system |
CN111369267A (en) * | 2020-03-05 | 2020-07-03 | 广州宏算信息科技有限公司 | Fruit and vegetable agricultural product tracing method, device and system based on block chain and storage medium |
CN111427958A (en) * | 2020-03-26 | 2020-07-17 | 北京链化未来科技有限公司 | Decentralized data sharing method based on block chain |
CN111510298A (en) * | 2020-04-10 | 2020-08-07 | 中国司法大数据研究院有限公司 | Cross-domain trusted data exchange method and system based on block chain |
CN111797138A (en) * | 2020-06-29 | 2020-10-20 | 北京荷月科技有限公司 | Method and system for querying data on trusted front-end chain |
CN111835500A (en) * | 2020-07-08 | 2020-10-27 | 浙江工商大学 | Searchable encryption data secure sharing method based on homomorphic encryption and block chain |
CN111861194A (en) * | 2020-07-16 | 2020-10-30 | 中国农业科学院深圳农业基因组研究所 | Block chain system, biological product monitoring method and device |
-
2020
- 2020-11-11 CN CN202011250777.5A patent/CN112383537B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018032372A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Trusted power grid transaction platform based on block chain technology |
CN108830733A (en) * | 2018-06-21 | 2018-11-16 | 中国银行股份有限公司 | A kind of information processing method, block scm cluster and system |
CN109522363A (en) * | 2018-10-18 | 2019-03-26 | 上海达家迎信息科技有限公司 | Cloud platform synchronous method, system, equipment and storage medium based on block chain |
CN110650139A (en) * | 2019-09-25 | 2020-01-03 | 四川师范大学 | Resource access control method and system of cloud platform |
CN111353778A (en) * | 2020-01-09 | 2020-06-30 | 广东南方新媒体股份有限公司 | Block chain television lottery system |
CN111369267A (en) * | 2020-03-05 | 2020-07-03 | 广州宏算信息科技有限公司 | Fruit and vegetable agricultural product tracing method, device and system based on block chain and storage medium |
CN111427958A (en) * | 2020-03-26 | 2020-07-17 | 北京链化未来科技有限公司 | Decentralized data sharing method based on block chain |
CN111510298A (en) * | 2020-04-10 | 2020-08-07 | 中国司法大数据研究院有限公司 | Cross-domain trusted data exchange method and system based on block chain |
CN111797138A (en) * | 2020-06-29 | 2020-10-20 | 北京荷月科技有限公司 | Method and system for querying data on trusted front-end chain |
CN111835500A (en) * | 2020-07-08 | 2020-10-27 | 浙江工商大学 | Searchable encryption data secure sharing method based on homomorphic encryption and block chain |
CN111861194A (en) * | 2020-07-16 | 2020-10-30 | 中国农业科学院深圳农业基因组研究所 | Block chain system, biological product monitoring method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112383537B (en) | 2022-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9877210B1 (en) | Mobile device monitoring and control system | |
US20070117560A1 (en) | Remote testing of mobile terminals | |
US20110141953A1 (en) | Method for Managing Data Communication Between a Communication Device and Another Device and Communication Device | |
GB2378531A (en) | Providing application / driver software for an accessory of a communications device | |
CN104168557A (en) | Upgrading method for operating systems and upgrading device for operating systems | |
CN105933888A (en) | Burning method and device of eSIM (Subscriber Identity Module) card based on NFC | |
CN105100415A (en) | Login method and mobile terminal | |
RU2454819C2 (en) | Method and system to read data from memory of remote mobile device | |
US20090221264A1 (en) | Storage system of mobile terminal and access control method | |
CN111400737A (en) | Multi-application physical isolation encrypted SIM card implementation device, method and terminal | |
CN105991293B (en) | A kind of method of calibration and device | |
HK1066676A1 (en) | Method and computer program product for verifying the authenticity of a telephone number reported in a request from a wireless device | |
US7698747B2 (en) | Applet download in a communication system | |
KR20080088535A (en) | Mobile terminal and method for operating a mobile terminal | |
CN112733127B (en) | Bidirectional authentication method and system based on blockchain | |
CN112383537B (en) | Trusted block chain uplink method and user application uplink system | |
US7502367B2 (en) | Method for providing a program module in a communications system | |
CN112866287A (en) | Cross-network access method, device and system based on office environment and storage medium | |
CN104331649A (en) | Identity recognition system and method based on network connection | |
CN106788868A (en) | signal shielding system, signal shielding system control method | |
CN106534602B (en) | A kind of terminal and information processing method | |
CN102547661B (en) | Method and device for establishing communication between Android system and telecommunications smart card | |
CN106599619A (en) | Verification method and device | |
CN106488392B (en) | Data transfer method and device | |
CN211830833U (en) | Hardware encryption satellite mobile phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |