CN113360936B - Data analysis system based on block chain - Google Patents

Data analysis system based on block chain Download PDF

Info

Publication number
CN113360936B
CN113360936B CN202110910325.3A CN202110910325A CN113360936B CN 113360936 B CN113360936 B CN 113360936B CN 202110910325 A CN202110910325 A CN 202110910325A CN 113360936 B CN113360936 B CN 113360936B
Authority
CN
China
Prior art keywords
data
data stream
stream
user
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110910325.3A
Other languages
Chinese (zh)
Other versions
CN113360936A (en
Inventor
冯武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Hexin Blockchain Research Institute
Original Assignee
Hunan Hexin Anhua Blockchain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Hexin Anhua Blockchain Technology Co Ltd filed Critical Hunan Hexin Anhua Blockchain Technology Co Ltd
Priority to CN202110910325.3A priority Critical patent/CN113360936B/en
Publication of CN113360936A publication Critical patent/CN113360936A/en
Application granted granted Critical
Publication of CN113360936B publication Critical patent/CN113360936B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data analysis system based on a block chain, which relates to the technical field of the block chain and comprises a database, a login verification module, a data acquisition module, a data preprocessing module, a data distribution node, a data storage module, a data encryption module and a cloud platform; according to the property of the data stream, the data stream is classified, so that the data stream is divided into a platform data stream and a personal data stream, the personal data stream is divided into a conventional personal data stream and an encrypted personal data stream, and then the encrypted personal data stream passes through an encryption module to generate a secret key, so that the processes of data encryption and data decryption of the encrypted personal data stream are completed, the data encryption module only needs to encrypt the data stream needing to be encrypted, the effectiveness of the system for encrypting the data stream is improved, unnecessary data encryption and decryption processes are reduced, and the working efficiency of the system is improved.

Description

Data analysis system based on block chain
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a data analysis system based on a block chain.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system. The core of the method is a distributed accounting method, data of each node is synchronized, and can only be written in or read out and cannot be modified, so that decentralization and non-tampering are realized.
In the prior art, data streams cannot be distinguished, so that data analysis amount is increased in the process of analyzing the data streams, and some data streams which do not need to be encrypted are also encrypted in the process of encrypting the data, so that the load of data analysis is increased, encrypted content is increased, and unnecessary work content is generated in system work.
Disclosure of Invention
The invention aims to provide a data analysis system based on a block chain.
The purpose of the invention can be realized by the following technical scheme: a data analysis system based on a block chain comprises a database, a login verification module, a data acquisition module, a data preprocessing module, a data distribution node, a data storage module, a data encryption module and a cloud platform;
the database is used for establishing a data identification string code sequence library;
the data acquisition module is used for acquiring data streams;
the data preprocessing module is used for preprocessing the data acquired by the data acquisition module and acquiring an identification data stream by combining the data identification string code group in the data identification string code sequence library with the data stream;
the data distribution node is used for classifying the data flow according to the property of the data flow;
the data encryption module is used for encrypting and decrypting personal data streams needing to be encrypted, and the data encryption module is used for setting data stream extraction passwords for the data streams needing to be transmitted, so that data encryption and data decryption of the data streams are realized.
Further, the process of establishing the data identification string code sequence library comprises the following steps: establishing a data matching interval in a database through a block chain technology; the data matching interval acquires a data stream through a data acquisition module and uploads the data stream to the data matching interval; establishing a data identification string code sequence library linked with the data matching interval, wherein the data identification string code sequence library is linked with the data matching interval through an index sequence; importing a data identification string code group into a data identification string code sequence library, wherein different data identification string code groups correspond to different data stream length ranges in the actual use process; corresponding sub-index sequences are set for different data string code groups.
Further, the data stream acquisition process includes: building a block chain local area network space, and recording data streams in the local area network space; and marking the types of the acquired data streams, wherein the types of the data streams comprise personal data streams and platform data streams.
Further, the preprocessing process of the data stream comprises: acquiring the type of the data stream, acquiring a platform protocol of the data stream when the data stream is a platform data stream, and uploading the content of the data stream to a data storage module for storage through the platform protocol; when the data stream is the personal data stream, acquiring the data length of the data stream, and marking the data length of the data stream; establishing a temporary data combination interval, uploading a data stream to the data combination interval, linking the data stream with a data identification string code base with the length of the corresponding data stream through an index sequence according to the data length of the data stream, and retrieving a data identification string code group with the corresponding length through a sub-index sequence; and combining the obtained data identification string code group with the data stream in a temporary data combination interval to form the identification data stream.
Further, the classification processing procedure of the data stream includes: acquiring the security requirement of the data stream, and classifying the data stream; acquiring the content of the data stream, judging that the data stream is a conventional personal data stream when the content of the data stream does not contain an encryption instruction, and sending the conventional personal data stream to a data storage module for storage; when the content of the data stream contains an encryption instruction, the data stream is judged to be an encrypted personal data stream, and the encrypted personal data stream is sent to a data encryption module to encrypt the encrypted personal data stream.
Further, the process of data encryption comprises: setting a data stream extraction password for the content of the data stream, and converting the data stream extraction password into a data decoding sequence; combining the obtained data decoding sequence with the identification data stream to form an encrypted data stream; and generating a key according to the encrypted data stream, sending the key to the mobile phone terminal bound by the user, and recording the sending time of the key as t 0.
Further, the data decryption process includes: after a user logs in the system, selecting an encrypted personal data stream to acquire decryption authority; inputting a key in the system, returning to the encrypted personal data stream selection again when the key input by the user is incorrect, and invalidating the key of the data stream when the key input by the user exceeds the preset times of the system, regenerating an information data stream through the steps M1-M3 to extract a password, and then sending the password to the mobile phone terminal bound by the user; when the input key is correct, acquiring a time point t1 of the key input by the user; the duration of obtaining the key is Ty = t1-t0 through t1 and t 0; when Ty is less than or equal to T, the secret key is not expired, and the data stream is decrypted through the secret key; and when Ty is more than T, if the key is overdue, locking the data stream and sending prompt information to the mobile phone terminal bound by the user.
Further, the login verification module is used for registering personal information of a user, the personal information of the user comprises the name, age and sex of the user and a telephone number of real-name authentication, the telephone number of the real-name authentication is set as a login account, and the personal information of the user is uploaded to the data storage module for storage after the user is registered; when a user needs to log in the system, the user can log in the system by verifying the bound mobile phone number, and after the user inputs the mobile phone number, the user can log in the system by inputting the login verification code received by the mobile phone.
The invention has the beneficial effects that: according to the property of the data stream, the data stream is classified, so that the data stream is divided into a platform data stream and a personal data stream, the personal data stream is divided into a conventional personal data stream and an encrypted personal data stream, and then the encrypted personal data stream passes through an encryption module to generate a secret key, so that the processes of data encryption and data decryption of the encrypted personal data stream are completed, the data encryption module only needs to encrypt the data stream needing to be encrypted, the effectiveness of the system for encrypting the data stream is improved, unnecessary data encryption and decryption processes are reduced, and the working efficiency of the system is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a functional block diagram of a blockchain-based data analysis system.
Detailed Description
As shown in fig. 1, a data analysis system based on a block chain includes a database, a login verification module, a data acquisition module, a data preprocessing module, a data distribution node, a data storage module, a data encryption module, and a cloud platform;
the login verification module is used for registering personal information of a user, the personal information of the user comprises the name, age and sex of the user and a telephone number of real-name authentication, the telephone number of the real-name authentication is set as a login account, and the personal information of the user is uploaded to the data storage module to be stored after the user registration is finished; when a user needs to log in the system, the user can log in the system by verifying the bound mobile phone number, and after the user inputs the mobile phone number, the user can log in the system by inputting the login verification code received by the mobile phone.
The database is used for establishing a data identification string code sequence library, and specifically comprises the following steps:
step S1: establishing a data matching interval in a database through a block chain technology; the data matching interval acquires a data stream through a data acquisition module and uploads the data stream to the data matching interval;
step S2: establishing a data identification string code sequence library linked with the data matching interval, wherein the data identification string code sequence library is linked with the data matching interval through an index sequence;
step S3: importing a data identification string code group into a data identification string code sequence library, wherein different data identification string code groups correspond to different data stream length ranges in the actual use process;
step S4: corresponding sub-index sequences are set for different data string code groups.
The data acquisition module is used for acquiring data streams, and the specific process comprises the following steps:
step H1: building a block chain local area network space, and recording data streams in the local area network space;
step H2: marking the type of the acquired data stream, wherein the type of the data stream comprises a personal data stream and a platform data stream;
step H3: and sending the data stream obtained by the data acquisition module to a data preprocessing module.
The data preprocessing module is used for preprocessing the data acquired by the data acquisition module, and the specific process comprises the following steps:
step Y1: acquiring the type of the data stream, acquiring a platform protocol of the data stream when the data stream is a platform data stream, and uploading the content of the data stream to a data storage module for storage through the platform protocol;
step Y2: when the data stream is the personal data stream, acquiring the data length of the data stream, and marking the data length of the data stream;
step Y3: establishing a temporary data combination interval, uploading a data stream to the data combination interval, linking the data stream with a data identification string code base with the length of the corresponding data stream through an index sequence according to the data length of the data stream, and retrieving a data identification string code group with the corresponding length through a sub-index sequence;
step Y4: combining the obtained data identification string code group with the data stream in a temporary data combination interval to form an identification data stream;
step Y5: sending the steps Y1-Y4 to a data distribution node, and carrying out classification processing on the data;
the data distribution node is used for classifying the data flow according to the property of the data flow, and the specific process comprises the following steps:
step F1: acquiring the security requirement of the data stream, and classifying the data stream;
step F2: acquiring the content of the data stream, judging that the data stream is a conventional personal data stream when the content of the data stream does not contain an encryption instruction, and sending the conventional personal data stream to a data storage module for storage;
step F3: when the content of the data stream contains an encryption instruction, the data stream is judged to be an encrypted personal data stream, and the encrypted personal data stream is sent to a data encryption module to encrypt the encrypted personal data stream.
The data encryption module is used for encrypting and decrypting personal data streams needing to be encrypted, and data streams needing to be transmitted are set with data stream extraction passwords through the data encryption module, so that data encryption and data decryption of the data streams are realized, and the data encryption process comprises the following steps:
step M1: setting a data stream extraction password for the content of the data stream, and converting the data stream extraction password into a data decoding sequence;
step M2: combining the obtained data decoding sequence with the identification data stream to form an encrypted data stream;
step M3: generating a key according to the encrypted data stream, sending the key to a mobile phone terminal bound by a user, and recording the sending time of the key as t 0;
the data decryption process comprises the following steps:
step P1: after a user logs in the system, selecting an encrypted personal data stream to acquire decryption authority;
step P2: inputting a key in the system, returning to the encrypted personal data stream selection again when the key input by the user is incorrect, and invalidating the key of the data stream when the key input by the user exceeds the preset times of the system, regenerating an information data stream through the steps M1-M3 to extract a password, and then sending the password to the mobile phone terminal bound by the user;
step P3: when the input key is correct, acquiring a time point t1 of the key input by the user; the duration of obtaining the key is Ty = t1-t0 through t1 and t 0; when Ty is less than or equal to T, the secret key is not expired, and the data stream is decrypted through the secret key; and when Ty is more than T, if the key is overdue, locking the data stream and sending prompt information to the mobile phone terminal bound by the user.
It should be further noted that, the data stream is classified according to the nature of the data stream, so that the data stream is divided into the platform data stream and the personal data stream, the personal data stream is divided into the conventional personal data stream and the encrypted personal data stream, and then the encrypted personal data stream is passed through the encryption module to generate the key, thereby completing the processes of data encryption and data decryption of the encrypted personal data stream, so that the data encryption module only needs to encrypt the data stream which needs to be encrypted, thereby improving the effectiveness of the system in encrypting the data stream, reducing the unnecessary processes of data encryption and decryption, and improving the work efficiency of the system.
The foregoing is illustrative and explanatory of the structure of the invention, and various modifications, additions or substitutions in a similar manner to the specific embodiments described may be made by those skilled in the art without departing from the structure or scope of the invention as defined in the claims. Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.

Claims (7)

1. A data analysis system based on a block chain is characterized by comprising a database, a login verification module, a data acquisition module, a data preprocessing module, a data distribution node, a data storage module, a data encryption module and a cloud platform;
the database is used for establishing a data identification string code sequence library;
the data acquisition module is used for acquiring data streams;
the data preprocessing module is used for preprocessing the data acquired by the data acquisition module and acquiring an identification data stream by combining the data identification string code group in the data identification string code sequence library with the data stream;
the data distribution node is used for classifying the data flow according to the property of the data flow;
the data encryption module is used for encrypting and decrypting personal data streams needing to be encrypted, and setting data streams to be transmitted through the data encryption module to extract passwords, so that data encryption and data decryption of the data streams are realized, and the data encryption process comprises the following steps: setting a data stream extraction password for the content of the data stream, and converting the data stream extraction password into a data decoding sequence; combining the obtained data decoding sequence with the identification data stream to form an encrypted data stream; and generating a key according to the encrypted data stream, sending the key to the mobile phone terminal bound by the user, and recording the sending time of the key as t 0.
2. The blockchain-based data analysis system of claim 1, wherein the building of the database of data identification string sequences comprises: establishing a data matching interval in a database through a block chain technology; the data matching interval acquires a data stream through a data acquisition module and uploads the data stream to the data matching interval; establishing a data identification string code sequence library linked with the data matching interval, wherein the data identification string code sequence library is linked with the data matching interval through an index sequence; and importing a data identification string code group into the data identification string code sequence library, and setting corresponding sub-index sequences for different data identification string code groups.
3. The blockchain-based data analysis system of claim 1, wherein the obtaining of the data stream comprises: building a block chain local area network space, and recording data streams in the local area network space; and marking the types of the acquired data streams, wherein the types of the data streams comprise personal data streams and platform data streams.
4. The blockchain-based data analysis system of claim 1, wherein the preprocessing of the data stream comprises: acquiring the type of the data stream, acquiring a platform protocol of the data stream when the data stream is a platform data stream, and uploading the content of the data stream to a data storage module for storage through the platform protocol; when the data stream is the personal data stream, acquiring the data length of the data stream, and marking the data length of the data stream; establishing a temporary data combination interval, uploading a data stream to the data combination interval, linking the data stream with a data identification string code sequence library with the length corresponding to the length of the data stream through an index sequence according to the data length of the data stream, and retrieving a data identification string code group with the corresponding length through a sub-index sequence; and combining the obtained data identification string code group with the data stream in a temporary data combination interval to form the identification data stream.
5. The system according to claim 1, wherein the classification process for the data stream comprises: acquiring the security requirement of the data stream, and classifying the data stream; acquiring the content of the data stream, judging that the data stream is a conventional personal data stream when the content of the data stream does not contain an encryption instruction, and sending the conventional personal data stream to a data storage module for storage; when the content of the data stream contains an encryption instruction, the data stream is judged to be an encrypted personal data stream, and the encrypted personal data stream is sent to a data encryption module to encrypt the encrypted personal data stream.
6. The blockchain-based data analysis system of claim 1, wherein the data decryption process comprises: after a user logs in the system, selecting an encrypted personal data stream to acquire decryption authority; inputting a key in the system, returning to the encrypted personal data stream selection when the key input by a user is incorrect, and invalidating the key of the data stream when the key input by the user exceeds the preset times of the system, regenerating an information data stream, extracting a password, and then sending the password to a mobile phone terminal bound by the user; when the input key is correct, acquiring a time point t1 of the key input by the user; the duration of obtaining the key is Ty = t1-t0 through t1 and t 0; when Ty is less than or equal to T, the secret key is not expired, and the data stream is decrypted through the secret key; and when Ty is more than T, if the key is overdue, locking the data stream and sending prompt information to the mobile phone terminal bound by the user.
7. The system according to claim 1, wherein the login verification module is configured to register personal information of a user, the personal information of the user includes a name, an age, a sex, and a telephone number of real-name authentication, the telephone number of real-name authentication is set as a login account, and the personal information of the user is uploaded to the data storage module for storage after the user registration is completed; when a user needs to log in the system, the user can log in the system by verifying the bound mobile phone number, and after the user inputs the mobile phone number, the user can log in the system by inputting the login verification code received by the mobile phone.
CN202110910325.3A 2021-08-09 2021-08-09 Data analysis system based on block chain Active CN113360936B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110910325.3A CN113360936B (en) 2021-08-09 2021-08-09 Data analysis system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110910325.3A CN113360936B (en) 2021-08-09 2021-08-09 Data analysis system based on block chain

Publications (2)

Publication Number Publication Date
CN113360936A CN113360936A (en) 2021-09-07
CN113360936B true CN113360936B (en) 2021-11-02

Family

ID=77540817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110910325.3A Active CN113360936B (en) 2021-08-09 2021-08-09 Data analysis system based on block chain

Country Status (1)

Country Link
CN (1) CN113360936B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113794743B (en) * 2021-11-18 2022-02-11 湖南和信安华区块链科技有限公司 Industrial data supervisory systems based on block chain
CN114244615A (en) * 2021-12-20 2022-03-25 海特尔机电工程技术(马鞍山)有限公司 Signal self-encryption system of communication equipment
CN116304228A (en) * 2023-05-25 2023-06-23 中国信息通信研究院 Block chain-based data storage method, device, equipment and medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10554394B1 (en) * 2016-09-30 2020-02-04 William Krut Toggle mute
CN110958273B (en) * 2019-12-26 2021-09-28 山东公链信息科技有限公司 Block chain detection system based on distributed data stream
CN111639363B (en) * 2020-05-24 2020-12-25 深圳市诚意信科技有限公司 Data analysis method based on block chain and edge computing server
CN112100265A (en) * 2020-09-17 2020-12-18 博雅正链(北京)科技有限公司 Multi-source data processing method and device for big data architecture and block chain
CN112333186B (en) * 2020-11-03 2022-11-29 平安普惠企业管理有限公司 Data communication method, device, equipment and storage medium
CN112347495B (en) * 2020-11-15 2023-05-26 北京物资学院 Trusted privacy intelligent service computing system and method based on blockchain
CN112615881B (en) * 2020-12-28 2022-09-30 中软数智信息技术(武汉)有限公司 Data flow detection system based on block chain

Also Published As

Publication number Publication date
CN113360936A (en) 2021-09-07

Similar Documents

Publication Publication Date Title
CN113360936B (en) Data analysis system based on block chain
CN113572614B (en) Security method and system for data transmission
CN100533456C (en) Security code production method and methods of using the same, and programmable device therefor
CN109145540B (en) Intelligent terminal identity authentication method and device based on block chain
US20080201576A1 (en) Information Processing Server And Information Processing Method
EP3348019A1 (en) Biometric verification of a blockchain database transaction contributor
JP2005010826A (en) Authentication terminal device, biometrics information authentication system and biometrics information acquisition system
CN1439207A (en) A platform and method for establishing provable identities while maintaining privacy
CN110061967B (en) Service data providing method, device, equipment and computer readable storage medium
CN1910531B (en) Method and system used for key control of data resource, related network
CN107196840B (en) Data processing method, device and equipment
CN101170554A (en) Message safety transfer system
JPH10224345A (en) Cipher key authentication method for chip card and certificate
CN101034985A (en) Method and system for the anti-counterfeit of the mobile phone with the dynamic code
CN107241184A (en) Personal identification number generation and management method based on improvement AES
WO2019196866A1 (en) Anonymization processing method, apparatus and device, and storage medium
WO2015196642A1 (en) Data encryption method, decryption method and device
Kuvonchbek Method Authentication of Objects Information Communication
CN110535630B (en) Key generation method, device and storage medium
CN105072136B (en) A kind of equipment room safety certifying method and system based on virtual drive
CN116340908A (en) Multi-factor electronic watermark generation and tracing method
KR101809976B1 (en) A method for security certification generating authentication key combinating multi-user element
CN115119200A (en) Information transfer method for 5G communication environment
CN111464570B (en) New energy automobile detection data encryption method and device
TWI640887B (en) User verification system implemented along with a mobile device and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230829

Address after: Room 306, Comprehensive Building, No. 1318 Kaiyuan East Road, Xingsha Industrial Base, Changsha Economic and Technological Development Zone, Changsha City, Hunan Province, 410600

Patentee after: Hunan Hexin Blockchain Research Institute

Address before: 410000 No. 401, Xingsha blockchain Industrial Park, No. 1 Lantian North Road, Xingsha industrial base, Changsha Economic and Technological Development Zone, Hunan Province

Patentee before: Hunan Hexin Anhua blockchain Technology Co.,Ltd.

TR01 Transfer of patent right