CN117955724A - Information security interaction method and system based on consensus protocol - Google Patents

Information security interaction method and system based on consensus protocol Download PDF

Info

Publication number
CN117955724A
CN117955724A CN202410167602.XA CN202410167602A CN117955724A CN 117955724 A CN117955724 A CN 117955724A CN 202410167602 A CN202410167602 A CN 202410167602A CN 117955724 A CN117955724 A CN 117955724A
Authority
CN
China
Prior art keywords
verification
information
interaction
consensus
length
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410167602.XA
Other languages
Chinese (zh)
Inventor
吕伟康
王磊
兰春嘉
刘波
朱中洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lingshuzhonghe Information Technology Co ltd
Original Assignee
Shanghai Lingshuzhonghe Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lingshuzhonghe Information Technology Co ltd filed Critical Shanghai Lingshuzhonghe Information Technology Co ltd
Priority to CN202410167602.XA priority Critical patent/CN117955724A/en
Publication of CN117955724A publication Critical patent/CN117955724A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The disclosure provides an information security interaction method and system based on a consensus protocol, and relates to the technical field of information interaction, wherein the method comprises the following steps: defining participants of information interaction; the user terminal participates in information interaction, and identity authentication is completed according to the interaction key received by the first sender; performing encryption processing according to the interactive key, and determining a plurality of verification parties; establishing a consensus protocol and determining a protocol target; calculating the integrity of the first interaction information, converting according to participation of the first sender, and carrying out authenticity calculation through the first receiver to obtain first consensus verification information; the first consensus verification information is decrypted based on the interaction key, the technical problem that the data transparency is low due to the fact that the traditional vehicle maintenance records possibly have record counterfeiting and inconsistent data in the prior art can be solved, the aim of storing the maintenance records through a block chain is achieved, and the technical effects of improving the transparency and the reliability of vehicle maintenance are achieved.

Description

Information security interaction method and system based on consensus protocol
Technical Field
The disclosure relates to the technical field of information interaction, in particular to an information security interaction method and system based on a consensus protocol.
Background
Based on the trusted evidence of the vehicle maintenance health data, the compliance and accuracy in the second-hand vehicle transaction can be improved. Currently, most of the trusted certificates of the existing vehicle maintenance health data are stored and managed by a third party, and there may be situations of record falsification, inconsistent data and lack of transparency. Therefore, a method is needed to solve the above-mentioned problems.
In summary, in the prior art, there is a technical problem that the transparency of data is low because the conventional vehicle maintenance record may have a condition of record falsification and inconsistent data.
Disclosure of Invention
The disclosure provides an information security interaction method and system based on a consensus protocol, which are used for solving the technical problem of low data transparency caused by the fact that traditional vehicle maintenance records may have record falsification and inconsistent data in the prior art.
According to a first aspect of the present disclosure, there is provided an information security interaction method based on a consensus protocol, comprising: defining a participant of information interaction, wherein the participant comprises a service information center, a user side and a verification side; according to the data request instruction, the user side participates in information interaction, a first sender is determined, identity authentication is carried out on the service information center and the verification side in the participant, if an authentication operator is obtained, the identity authentication is completed according to the first sender receiving the interaction key; based on first interaction information of a first sender, carrying out encryption processing according to the interaction key, distributing the encrypted first interaction information to the service information center and the verification terminal, and determining a plurality of verification parties; establishing a consensus protocol through a block chain network architecture, and determining a protocol target, wherein each verifier corresponds to one block chain; according to the encrypted first interaction information received by a plurality of authenticators, calculating the integrity of the first interaction information through the consensus protocol according to the protocol target, obtaining an authentication operator, if a first data block consensus threshold is met, determining a first receiver according to participation conversion of the first sender, and carrying out authenticity calculation through the first receiver to obtain first consensus authentication information; and decrypting the first identification verification information based on the interaction key to complete the data interaction of the participants.
According to a second aspect of the present disclosure, there is provided an information security interaction system based on a consensus protocol, comprising: the system comprises a participant definition module, a server and a client, wherein the participant definition module is used for defining participants of information interaction, and the participants comprise a service information center, a user side and a verification side; the first sender determining module is used for carrying out user side participation information interaction according to a data request instruction, determining a first sender, carrying out identity authentication on the service information center and the verification end in the participants, and if an authentication operator is obtained, completing the identity authentication according to the first sender receiving an interaction key; the verification party determining module is used for carrying out encryption processing according to the interaction key based on first interaction information of a first sender, distributing the encrypted first interaction information to the service information center and the verification terminal, and determining a plurality of verification parties; the protocol target determining module is used for establishing a consensus protocol through a block chain network architecture to determine a protocol target, wherein each verifier corresponds to one block chain; the first consensus verification information acquisition module is used for receiving the encrypted first interaction information according to a plurality of verifiers, calculating the integrity of the first interaction information according to the protocol target through the consensus protocol to acquire a verification operator, determining a first receiver according to participation conversion of the first sender if a first data block consensus threshold is met, and carrying out authenticity calculation through the first receiver to acquire first consensus verification information; and the data interaction module is used for decrypting the first consensus verification information based on the interaction key to complete the data interaction of the participants.
According to a third aspect of the present disclosure, a computer device comprises a memory storing a computer program and a processor implementing a method capable of performing any one of the embodiments.
According to a fourth aspect of the present disclosure, a computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements a method capable of performing any one of the embodiments.
One or more technical solutions provided in the present disclosure have at least the following technical effects or advantages: according to the participants adopted by the present disclosure, the participants interact through definition information, wherein the participants comprise a service information center, a user side and a verification side; according to the data request instruction, the user side participates in information interaction, a first sender is determined, identity authentication is carried out on the service information center and the verification side in the participant, if an authentication operator is obtained, the identity authentication is completed according to the first sender receiving the interaction key; based on first interaction information of a first sender, carrying out encryption processing according to the interaction key, distributing the encrypted first interaction information to the service information center and the verification terminal, and determining a plurality of verification parties; establishing a consensus protocol through a block chain network architecture, and determining a protocol target, wherein each verifier corresponds to one block chain; according to the encrypted first interaction information received by a plurality of authenticators, calculating the integrity of the first interaction information through the consensus protocol according to the protocol target, obtaining an authentication operator, if a first data block consensus threshold is met, determining a first receiver according to participation conversion of the first sender, and carrying out authenticity calculation through the first receiver to obtain first consensus authentication information; the first consensus verification information is decrypted based on the interaction key to complete data interaction of the participants, so that the technical problem that the transparency of data is low due to the fact that the traditional vehicle maintenance records possibly have record forging and data inconsistency in the prior art is solved, the authenticated maintenance records are stored through the blockchain, the purpose of tamper-proof maintenance records is further formed, the maintenance records are supervised and evaluated by accessing the data on the blockchain, the transparency and the credibility of vehicle maintenance are improved, and the technical effect of user rights is guaranteed.
It should be understood that the description of this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
For a clearer description of the present disclosure or of the prior art, the drawings used in the description of the embodiments or of the prior art will be briefly described, it being obvious that the drawings in the description below are only exemplary and that other drawings may be obtained, without inventive effort, by a person skilled in the art, from the provided drawings.
Fig. 1 is a schematic flow chart of an information security interaction method based on a consensus protocol according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of an information security interaction system based on a consensus protocol according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the disclosure.
Reference numerals illustrate: the system comprises a party definition module 11, a first sender determination module 12, a verifier determination module 13, a protocol target determination module 14, a first consensus verification information acquisition module 15, a data interaction module 16, a computer device 100, a processor 101, a memory 102 and a bus 103.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Example 1
An information security interaction method based on a consensus protocol provided by an embodiment of the present disclosure is described with reference to fig. 1, where the method includes:
Defining a participant of information interaction, wherein the participant comprises a service information center, a user side and a verification side;
Specifically, a plurality of participants to be subjected to information interaction are respectively defined, wherein the plurality of participants respectively comprise a service information center, a user side and a verification side. The service information center is a server network for information interaction, the user side is a vehicle user side for vehicle transaction, and the verification side is a plurality of clients for verifying vehicle maintenance information and evaluating vehicle health information. For example, the verification terminal includes a vehicle transaction store, a vehicle transaction intermediary, and the like.
According to the data request instruction, the user side participates in information interaction, a first sender is determined, identity authentication is carried out on the service information center and the verification side in the participant, if an authentication operator is obtained, the identity authentication is completed according to the first sender receiving the interaction key;
Specifically, a data request instruction is obtained and used for carrying out vehicle transaction, and according to the receipt of the data request instruction, the user side is involved in information interaction, and the sending of the interaction information of the user side is executed, so that the user side is determined to be a first sender, identity authentication is carried out on a service information center and a verification end in the participant, and the right relation between the vehicle information of the first sender and the user is authenticated. When the plurality of verification ends pass the identity authentication of the first sender, an authentication operator is obtained, and then the identity authentication is completed by the first sender receiving the interaction key. Wherein the interactive key is used for encrypting and decrypting the interactive information.
Based on first interaction information of a first sender, carrying out encryption processing according to the interaction key, distributing the encrypted first interaction information to the service information center and the verification terminal, and determining a plurality of verification parties;
specifically, the first interaction information of the first sender is encrypted through the interaction key, and the encrypted first interaction information is obtained. And distributing the encrypted first interaction information to a service information center and an authentication end for information authentication, thereby determining that the service information center and the authentication end are both authentication parties and obtaining a plurality of authentication parties.
Establishing a consensus protocol through a block chain network architecture, and determining a protocol target, wherein each verifier corresponds to one block chain;
Specifically, when the plurality of authenticators receive the first interaction information, the plurality of authenticators are determined to be a blockchain, and a blockchain network architecture is obtained by interconnecting the blockchains. And establishing a common protocol between block chains according to the network architecture, and determining a protocol target, wherein the protocol target is used for verifying the first interaction information and obtaining a verification result.
According to the encrypted first interaction information received by a plurality of authenticators, calculating the integrity of the first interaction information through the consensus protocol according to the protocol target, obtaining an authentication operator, if a first data block consensus threshold is met, determining a first receiver according to participation conversion of the first sender, and carrying out authenticity calculation through the first receiver to obtain first consensus authentication information;
Specifically, according to the encrypted first interaction information received by a plurality of verification parties, a protocol target is taken as an execution target, the integrity of the first interaction information is calculated through a consensus protocol, a verification operator is obtained, when the verification operator is qualified in verification, the integrity calculation result of the first interaction information meets a first data block consensus threshold, the first sender is converted into a first receiver according to participation conversion of the first sender, and further the verification result of the first receiver for obtaining the first interaction information is determined. And carrying out authenticity calculation by the first receiver to obtain first consensus verification information.
And decrypting the first identification verification information based on the interaction key to complete the data interaction of the participants.
Specifically, the first consensus verification information is decrypted according to the interaction key, so that data interaction among the user terminal, the service information center and the verification terminal in the participant is completed.
According to the method and the device for monitoring the vehicle maintenance record, the technical problem that the transparency of data is low due to the fact that the conventional vehicle maintenance record possibly has record forging and inconsistent data in the prior art can be solved, the purpose that the maintenance record is stored through a blockchain and authenticated is achieved, and then the maintenance record which cannot be tampered is formed is achieved, the data on the blockchain are accessed to monitor and evaluate the maintenance record, and the technical effects of improving the transparency and the reliability of vehicle maintenance and guaranteeing the rights and interests of users are achieved.
The method provided by the embodiment of the disclosure further comprises the following steps:
Extracting a vehicle maintenance record of the first sender, and carrying out time sequence processing on the vehicle maintenance record according to time sequence characteristics to obtain a vehicle maintenance time sequence record;
And acquiring a vehicle maintenance time sequence record of the first time sequence and the second time sequence according to the vehicle maintenance time sequence record, and performing verification influence configuration to acquire verification reference of the first interaction information.
Specifically, a vehicle service record of the first sender is extracted, wherein the vehicle service record is vehicle service data of the first sender over a historical time. And carrying out time sequence processing on the vehicle maintenance record according to the time sequence characteristics to obtain the vehicle maintenance time sequence record.
Further, the first time sequence is the last time of the time period in the time sequence characteristic, and the second time sequence is the time node of the first time sequence removed in the time period in the time sequence characteristic. And respectively acquiring a vehicle maintenance time sequence record of the first time sequence and a vehicle maintenance time sequence record of the second time sequence. And verifying and influencing configuration is carried out on the vehicle maintenance time sequence record of the first time sequence and the vehicle maintenance time sequence record of the second time sequence, wherein the vehicle maintenance time sequence record of the first time sequence has a larger influence on the vehicle health, so that a higher influence value is configured on the vehicle maintenance time sequence record of the first time sequence, a lower influence value is configured on the vehicle maintenance time sequence record of the second time sequence, and further, the influence value of the first time sequence and the influence value of the second time sequence are combined, and verification reference of the first interaction information is obtained. The accuracy of obtaining the vehicle health evidence can be improved through verification reference of the first interaction information.
The method provided by the embodiment of the disclosure further comprises the following steps:
extracting fault codes, maintenance measures and accessory replacement information according to the vehicle maintenance records through the extraction of the first interaction information, and respectively performing character length calculation to obtain a first length, a second length and a third length;
transmitting the first interaction information to the verifier, and verifying the character length of the fault code, the maintenance measure and the accessory replacement information according to the blockchain to obtain a first verification length, a second verification length and a third verification length;
And respectively carrying out integrity verification on the first length, the second length and the third length according to the protocol target by using the first verification length, the second verification length and the third verification length to obtain a verification operator.
Specifically, through extracting the first interaction information outside the blockchain, the fault code, the maintenance measure and the accessory replacement information of the vehicle maintenance record in the first interaction information are obtained, wherein the information of the vehicle health degree is obtained through the fault code, the maintenance measure and the accessory replacement information. And respectively carrying out character length calculation on the fault code, the maintenance measure and the accessory replacement information to obtain a first length, a second length and a third length.
Further, the first interactive information is transmitted to the verifier in the blockchain, verification is performed according to the verifier, namely, character length verification of fault codes, maintenance measures and accessory replacement information is performed through the blockchain, and the first verification length, the second verification length and the third verification length are obtained.
Further, according to the verification result of the first interaction information obtained from the protocol target, the integrity verification is respectively carried out on the first verification length to the first length, the second verification length to the second length and the third verification length to the third length, and a verification operator is obtained. The integrity verification can be performed respectively, so that the verification accuracy of the first interaction information can be improved.
The method provided by the embodiment of the disclosure further comprises the following steps:
The verification operator comprises verification passing and verification failing;
The verification failure is that if the integrity verification result does not meet the first data block consensus threshold, the block chain network architecture is obtained for data backup and recovery;
And if the integrity verification result meets the first data block consensus threshold, performing authenticity calculation on the first interaction information according to the verification reference to generate the first consensus verification information.
Specifically, the verification operator includes verification pass and verification fail. If the integrity verification result is not satisfied, the first data consensus threshold indicates that the first verification length, the second verification length, and the third verification length are inconsistent with the verification lengths of the first length, the second length, and the third length, and there may be a defect in data transmission, so as to obtain the blockchain network architecture for data backup and recovery.
Further, the verification qualification is that if the integrity verification result meets the first data block consensus threshold, the first verification length, the second verification length and the third verification length are identical to the verification lengths of the first length, the second length and the third length, the first interaction information is extracted, the first interaction information is weighted according to verification references, the authenticity calculation is carried out, and the first consensus verification information is generated. Wherein, the obtaining verification operator can improve the accuracy degree of obtaining the first consensus verification information.
The method provided by the embodiment of the disclosure further comprises the following steps:
carrying out authenticity voting on the first interaction information according to the verifier to obtain a plurality of authenticity verification voting results;
And weighting the plurality of real verification voting results based on the credibility of the verification party to obtain the first consensus verification information.
Specifically, the authenticity voting is carried out on the first interaction information according to the verification party, namely, the authenticity authentication is carried out on the vehicle maintenance data, the vehicle user information and the like in the first interaction information, if the authentication is qualified, the authenticity voting is carried out, the real result is obtained, and if the authentication is unqualified, the authenticity voting is carried out, and the unrealistic result is obtained.
Further, the credibility of a plurality of verification parties is respectively obtained according to the subjective activity of the verification parties in the information interaction. And weighting according to the credibility of the plurality of real verification voting results and the verification party of the voting to obtain the credibility influence of the voting results, and weighting the credibility influence of the voting results to obtain the first consensus verification information. The method comprises the steps of obtaining an authenticity voting result, wherein the authenticity degree of obtaining the first consensus interaction information can be improved.
The method provided by the embodiment of the disclosure further comprises the following steps:
according to the authenticity voting result in the first consensus verification information, extracting a blockchain to obtain the verifier;
And updating and storing the first common identification verification information according to the verification party, and updating and acquiring the first common identification verification information.
Specifically, according to the authenticity voting result in the first consensus verification information, a blockchain for voting is obtained, namely, a voting verification party for carrying out the authenticity voting result is obtained. Further, according to the updated verification with time by the verification party carrying out the voting, verification results of a plurality of time sequence features are obtained, and the plurality of verification results are updated and stored to obtain first consensus verification information. Wherein, updating and verifying the first consensus verification information can improve the accuracy of obtaining the first consensus verification information.
The method provided by the embodiment of the disclosure further comprises the following steps:
Tracking and monitoring the first consensus verification information in the blockchain, carrying out authenticity correction on the first consensus verification information when first monitoring update information is acquired, and carrying out integrity calculation if correction is unqualified until correction is qualified;
And if the correction is qualified, adding the correction to the first identification verification information.
Specifically, tracking and monitoring are performed on first consensus verification information in a blockchain, a sending block and a receiving block of the first consensus verification information are obtained, and confirmation of completion of receiving and sending of the first consensus verification information is identified. When the receiving and transmitting condition of the first consensus verification information is confirmed, the authenticity correction can be carried out through the current confirmation verification party, the authenticity result is verified, if the correction is unqualified, the updating is carried out, the integrity calculation is carried out until the first consensus verification information is obtained, wherein the updating is indicated that the accuracy of the first consensus verification information is lower. If the correction is qualified, the updating is performed to obtain the first consensus verification information with higher accuracy, and the first consensus verification information is obtained. The accuracy of obtaining the first consensus verification information can be improved by obtaining the first monitoring update information.
Example two
Based on the same inventive concept as the information security interaction method based on the consensus protocol in the first embodiment, as shown in fig. 2, the present disclosure further provides an information security interaction system based on the consensus protocol, where the system includes:
the participant definition module 11 is used for defining a participant of information interaction, wherein the participant comprises a service information center, a user side and a verification side;
The first sender determining module 12 is configured to perform user-side participation information interaction according to a data request instruction, determine a first sender, perform identity authentication on the service information center and the verification end in the participants, and if an authentication operator is obtained, complete identity authentication according to the first sender receiving an interaction key;
the verification party determining module 13 is configured to perform encryption processing according to the interaction key based on first interaction information of a first sender, and distribute the encrypted first interaction information to the service information center and the verification terminal, so as to determine a plurality of verification parties;
A protocol objective determining module 14, where the protocol objective determining module 14 is configured to establish a consensus protocol through a blockchain network architecture to determine a protocol objective, and each verifier corresponds to one blockchain;
The first consensus verification information obtaining module 15 is configured to receive the encrypted first interaction information according to a plurality of verifiers, calculate the integrity of the first interaction information according to the protocol objective by using the consensus protocol, obtain a verification operator, determine a first receiver according to participation conversion of the first sender if a first data block consensus threshold is met, and perform authenticity calculation by using the first receiver to obtain first consensus verification information;
And the data interaction module 16 is used for decrypting the first identification verification information based on the interaction key, so as to complete the data interaction of the participants.
Further, the system further comprises:
The vehicle maintenance time sequence record obtaining module is used for extracting the vehicle maintenance record of the first sender, carrying out time sequence processing on the vehicle maintenance record according to time sequence characteristics and obtaining the vehicle maintenance time sequence record;
The verification reference obtaining module is used for obtaining the vehicle maintenance time sequence records of the first time sequence and the second time sequence according to the vehicle maintenance time sequence records, carrying out verification influence configuration and obtaining the verification reference of the first interaction information.
Further, the system further comprises:
The first length obtaining module is used for extracting fault codes, maintenance measures and accessory replacement information according to the vehicle maintenance records through extraction of the first interaction information, and respectively performing character length calculation to obtain a first length, a second length and a third length;
the first verification length obtaining module is used for transmitting the first interaction information to the verifier, verifying the character length of the fault code, the maintenance measure and the accessory replacement information according to the blockchain, and obtaining a first verification length, a second verification length and a third verification length;
The verification operator obtaining module is used for carrying out integrity verification on the first length, the second length and the third length according to the protocol target by using the first verification length, the second verification length and the third verification length respectively to obtain a verification operator.
Further, the system further comprises:
The verification failure obtaining module is used for obtaining the blockchain network architecture to carry out data backup and recovery if the integrity verification result does not meet the first data block consensus threshold;
And the verification qualification obtaining module is used for carrying out authenticity calculation on the first interaction information according to the verification reference if the verification qualification is that the integrity verification result meets the first data block consensus threshold value, and generating the first consensus verification information.
Further, the system further comprises:
The true verification voting result obtaining module is used for carrying out true voting on the first interaction information according to the verification party to obtain a plurality of true verification voting results;
And the voting result weighting module is used for weighting the plurality of real verification voting results based on the credibility of the verification party to obtain the first consensus verification information.
Further, the system further comprises:
The block chain extraction module is used for extracting a block chain according to the authenticity voting result in the first consensus verification information to acquire the verification party;
And the updating storage module is used for updating and storing the first consensus verification information according to the verification party and updating and acquiring the first consensus verification information.
Further, the system further comprises:
The tracking monitoring module is used for tracking and monitoring the first consensus verification information in the block chain, carrying out authenticity correction on the first consensus verification information when first monitoring update information is acquired, and carrying out integrity calculation if the correction is unqualified until the correction is qualified;
and the correction qualification obtaining module is used for adding the correction qualification to the first identification verification information if the correction qualification is satisfied.
The specific example of the information security interaction method based on the consensus protocol in the foregoing embodiment one is also applicable to the information security interaction system based on the consensus protocol in this embodiment, and by describing the detailed description of the information security interaction method based on the consensus protocol in the foregoing embodiment one, those skilled in the art can clearly know the information security interaction system based on the consensus protocol in this embodiment, so that details will not be described here for brevity of description. For the system disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
Example III
Fig. 3 is a schematic diagram according to a third embodiment of the present disclosure, as shown in fig. 3, a computer device 100 in the present disclosure may include: a processor 101 and a memory 102.
A memory 102 for storing a program; the memory 102 may include a volatile memory (english: volatile memory), such as a random-access memory (RAM), such as a static random-access memory (SRAM), a double data rate synchronous dynamic random-access memory (DDR SDRAM), etc.; the memory may also include a non-volatile memory (English) such as a flash memory (English). The memory 102 is used to store computer programs (e.g., application programs, functional modules, etc. that implement the methods described above), computer instructions, etc., which may be stored in one or more of the memories 102 in partitions. And the above-described computer programs, computer instructions, data, etc. may be invoked by the processor 101.
The computer programs, computer instructions, etc. described above may be stored in one or more of the memories 102 in partitions. And the above-described computer programs, computer instructions, etc. may be invoked by the processor 101.
A processor 101 for executing a computer program stored in a memory 102 to implement the steps of the method according to the above-mentioned embodiment.
Reference may be made in particular to the description of the embodiments of the method described above.
The processor 101 and the memory 102 may be separate structures or may be integrated structures integrated together. When the processor 101 and the memory 102 are separate structures, the memory 102 and the processor 101 may be coupled by a bus 103.
The computer device in this embodiment may execute the technical solution in the above method, and the specific implementation process and the technical principle are the same, which are not described herein again.
According to an embodiment of the present disclosure, the present disclosure further provides a computer readable storage medium having stored thereon a computer program which, when executed, implements the steps provided by any of the above embodiments.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present disclosure may be performed in parallel, may be performed sequentially, or may be performed in a different order, so long as the desired result of the technical solution of the present disclosure is achieved, and the present disclosure is not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (10)

1. The information security interaction method based on the consensus protocol is characterized by comprising the following steps:
Defining a participant of information interaction, wherein the participant comprises a service information center, a user side and a verification side;
according to the data request instruction, the user side participates in information interaction, a first sender is determined, identity authentication is carried out on the service information center and the verification side in the participant, if an authentication operator is obtained, the identity authentication is completed according to the first sender receiving the interaction key;
Based on first interaction information of a first sender, carrying out encryption processing according to the interaction key, distributing the encrypted first interaction information to the service information center and the verification terminal, and determining a plurality of verification parties;
Establishing a consensus protocol through a block chain network architecture, and determining a protocol target, wherein each verifier corresponds to one block chain;
According to the encrypted first interaction information received by a plurality of authenticators, calculating the integrity of the first interaction information through the consensus protocol according to the protocol target, obtaining an authentication operator, if a first data block consensus threshold is met, determining a first receiver according to participation conversion of the first sender, and carrying out authenticity calculation through the first receiver to obtain first consensus authentication information;
And decrypting the first identification verification information based on the interaction key to complete the data interaction of the participants.
2. The method as recited in claim 1, further comprising:
Extracting a vehicle maintenance record of the first sender, and carrying out time sequence processing on the vehicle maintenance record according to time sequence characteristics to obtain a vehicle maintenance time sequence record;
And acquiring a vehicle maintenance time sequence record of the first time sequence and the second time sequence according to the vehicle maintenance time sequence record, and performing verification influence configuration to acquire verification reference of the first interaction information.
3. The method as recited in claim 2, further comprising:
extracting fault codes, maintenance measures and accessory replacement information according to the vehicle maintenance records through the extraction of the first interaction information, and respectively performing character length calculation to obtain a first length, a second length and a third length;
transmitting the first interaction information to the verifier, and verifying the character length of the fault code, the maintenance measure and the accessory replacement information according to the blockchain to obtain a first verification length, a second verification length and a third verification length;
And respectively carrying out integrity verification on the first length, the second length and the third length according to the protocol target by using the first verification length, the second verification length and the third verification length to obtain a verification operator.
4. A method as claimed in claim 3, wherein the validation operator comprises validation pass and validation fail, comprising:
The verification failure is that if the integrity verification result does not meet the first data block consensus threshold, the block chain network architecture is obtained for data backup and recovery;
And if the integrity verification result meets the first data block consensus threshold, performing authenticity calculation on the first interaction information according to the verification reference to generate the first consensus verification information.
5. The method as recited in claim 1, further comprising:
carrying out authenticity voting on the first interaction information according to the verifier to obtain a plurality of authenticity verification voting results;
And weighting the plurality of real verification voting results based on the credibility of the verification party to obtain the first consensus verification information.
6. The method as recited in claim 5, further comprising:
according to the authenticity voting result in the first consensus verification information, extracting a blockchain to obtain the verifier;
And updating and storing the first common identification verification information according to the verification party, and updating and acquiring the first common identification verification information.
7. The method as recited in claim 1, further comprising:
Tracking and monitoring the first consensus verification information in the blockchain, carrying out authenticity correction on the first consensus verification information when first monitoring update information is acquired, and carrying out integrity calculation if correction is unqualified until correction is qualified;
And if the correction is qualified, adding the correction to the first identification verification information.
8. An information security interaction system based on a consensus protocol, characterized in that it is used for implementing the information security interaction method based on a consensus protocol according to any of the claims 1-7, the system comprising:
the system comprises a participant definition module, a server and a client, wherein the participant definition module is used for defining participants of information interaction, and the participants comprise a service information center, a user side and a verification side;
The first sender determining module is used for carrying out user side participation information interaction according to a data request instruction, determining a first sender, carrying out identity authentication on the service information center and the verification end in the participants, and if an authentication operator is obtained, completing the identity authentication according to the first sender receiving an interaction key;
The verification party determining module is used for carrying out encryption processing according to the interaction key based on first interaction information of a first sender, distributing the encrypted first interaction information to the service information center and the verification terminal, and determining a plurality of verification parties;
The protocol target determining module is used for establishing a consensus protocol through a block chain network architecture to determine a protocol target, wherein each verifier corresponds to one block chain;
The first consensus verification information acquisition module is used for receiving the encrypted first interaction information according to a plurality of verifiers, calculating the integrity of the first interaction information according to the protocol target through the consensus protocol to acquire a verification operator, determining a first receiver according to participation conversion of the first sender if a first data block consensus threshold is met, and carrying out authenticity calculation through the first receiver to acquire first consensus verification information;
And the data interaction module is used for decrypting the first consensus verification information based on the interaction key to complete the data interaction of the participants.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1-7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1-7.
CN202410167602.XA 2024-02-05 2024-02-05 Information security interaction method and system based on consensus protocol Pending CN117955724A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410167602.XA CN117955724A (en) 2024-02-05 2024-02-05 Information security interaction method and system based on consensus protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410167602.XA CN117955724A (en) 2024-02-05 2024-02-05 Information security interaction method and system based on consensus protocol

Publications (1)

Publication Number Publication Date
CN117955724A true CN117955724A (en) 2024-04-30

Family

ID=90804869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410167602.XA Pending CN117955724A (en) 2024-02-05 2024-02-05 Information security interaction method and system based on consensus protocol

Country Status (1)

Country Link
CN (1) CN117955724A (en)

Similar Documents

Publication Publication Date Title
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
JP7109569B2 (en) Digital certificate verification method and its device, computer equipment and computer program
US11429967B2 (en) Mechanism for efficient validation of finality proof in lightweight distributed ledger clients
CN110661610B (en) Input acquisition method and device of secure multi-party computing protocol
US20200021439A1 (en) Trust management system and trust management method
Shukla et al. Online voting application using ethereum blockchain
CN109067543A (en) Digital certificate management method, device, computer equipment and storage medium
CN110096903B (en) Asset verification method based on block chain and block chain network system
CN112288434B (en) Privacy transaction method, device, zero knowledge proof system and privacy transaction architecture model
KR102332226B1 (en) Blockchain network system being capable of verifying a blockchain ledger and method for verifying a blockchain ledger
CN111753014B (en) Identity authentication method and device based on block chain
CN110222085B (en) Processing method and device for certificate storage data and storage medium
CN109242481A (en) Information approach, device and computer equipment are pledged based on block chain query
CN109861996B (en) Block chain-based relationship proving method, device, equipment and storage medium
CN111753334A (en) Method and device for verifying consistency of data across alliance chains and electronic equipment
CN111024996A (en) Intelligent electric meter for identity authentication based on block chain technology
CN115208628B (en) Data integrity verification method based on block chain
CN104539636B (en) video evidence service system
CN111277416B (en) Interactive zero knowledge proof method, device, computer equipment and storage medium
CN112347516A (en) Asset certification method and device based on block chain
CN111353780A (en) Authorization verification method, device and storage medium
WO2018219425A1 (en) Method for validating and/or authenticating online curriculum vitae using blockchain distributed ledger technology
CN117955724A (en) Information security interaction method and system based on consensus protocol
WO2022205960A1 (en) Cross-chain data processing method and apparatus
CN111027992A (en) Asset transaction method and device based on blockchain system and hardware equipment

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination