CN109284191A - Security protection data balancing method and its system - Google Patents

Security protection data balancing method and its system Download PDF

Info

Publication number
CN109284191A
CN109284191A CN201811109479.7A CN201811109479A CN109284191A CN 109284191 A CN109284191 A CN 109284191A CN 201811109479 A CN201811109479 A CN 201811109479A CN 109284191 A CN109284191 A CN 109284191A
Authority
CN
China
Prior art keywords
security protection
node
data
protection data
agent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811109479.7A
Other languages
Chinese (zh)
Inventor
李红满
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201811109479.7A priority Critical patent/CN109284191A/en
Publication of CN109284191A publication Critical patent/CN109284191A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5083Techniques for rebalancing the load in a distributed system
    • G06F9/5088Techniques for rebalancing the load in a distributed system involving task migration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/1008Server selection for load balancing based on parameters of servers, e.g. available memory or workload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/5013Request control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/508Monitor

Abstract

The present invention relates to load-balancing technique fields, more particularly to a kind of security protection data balancing method and its system.Method includes: whether to detect the sum of itself security protection data access request greater than throughput;If more than triggering the intelligent contract of agent node;The jump request is sent to each security protection data acquisition node, so that network address of the security protection data acquisition node according to additional security protection node, jumps to additional security protection node and request access to;Target security protection node uploads security protection data to agent node, so that security protection data are packaged into block data by agent node, and block data is sent to miner's node and makees common recognition verifying.On the one hand, it is capable of the access request of balanced security protection data acquisition node, so that system more reliably works.On the other hand, can by security protection data sharing in block chain, since block chain has the characteristics that can not to distort, decentralization and highly transparent, be capable of providing reliable security protection data.

Description

Security protection data balancing method and its system
Technical field
The present invention relates to load-balancing technique fields, more particularly to a kind of security protection data balancing method and its system.
Background technique
In field of security technology, each security protection region is provided with server, for receiving each security protection data acquisition node The video information etc. that the environmental smoke information of the safeguard information of acquisition, such as smoke sensor device acquisition, video camera acquire.
Inventor in the implementation of the present invention, has found traditional technology the prior art has at least the following problems: since server connects Enter excessive security protection data acquisition node, causes server to be easy work in overload, influence security system functional reliability.
Summary of the invention
One purpose of the embodiment of the present invention is intended to provide a kind of security protection data balancing method and its system, balanced can pacify The access request of anti-data acquisition node.
In order to solve the above technical problems, the embodiment of the present invention the following technical schemes are provided:
In a first aspect, the embodiment of the present invention provides a kind of security protection data balancing method, applied to target security protection node, institute The method of stating includes:
Whether the sum of target security protection nodal test itself the security protection data access request is greater than the target security protection section The throughput of point;
If more than the intelligent contract of the target security protection node triggering agent node, so that the agent node detects Can balanced access request additional security protection node, and requested to the target security protection node return jump, the jump request is taken With it is described can balanced access request additional security protection node network address;
The target security protection node sends the jump request to each security protection data acquisition node, so that the security protection number According to acquisition node according to the network address of the additional security protection node, jumps to the additional security protection node and request access to;
The target security protection node uploads security protection data to the agent node, so that the agent node is by the security protection Data are packaged into block data, and the block data is sent to miner's node and makees common recognition verifying.
Optionally, the method also includes:
If being less than, the target security protection node uploads security protection data to the agent node.
Optionally, the security protection data acquisition node includes video monitor, smoke sensor device, temperature sensor or humidity Sensor.
Optionally, the security protection data are packaged into block data by the agent node, comprising:
The security protection data are packaged into block data according to Merkel tree mode by the agent node.
Optionally, the agent node detect can balanced access request additional security protection node, comprising:
The agent node obtain the current security protection data access request of each additional security protection node sum with it is described The throughput of each additional security protection node;
The agent node calculates sum and the institute of the current security protection data access request of each additional security protection node State the ratio between the throughput of each additional security protection node;
According to the sequence of each ratio from small to large, it is arranged successively corresponding each additional security protection node;
Select to be arranged in the additional security protection node of forefront preset quantity as can balanced access request additional security protection section Point.
Optionally, share authorisation verification mechanism is supported in the common recognition verifying.
In second aspect, the embodiment of the present invention provides a kind of security protection data balancing system, and the system comprises several security protections Data acquisition node, target security protection node, agent node and miner's node, the security protection data acquisition node and the target Security protection node communication, the target security protection node and the agent node communicate, the agent node also with miner's node Communication;
Whether the sum of target security protection nodal test itself the security protection data access request is greater than the target security protection section The throughput of point;
If more than the intelligent contract of the target security protection node triggering agent node, so that the agent node detects Can balanced access request additional security protection node, and requested to the target security protection node return jump, the jump request is taken With it is described can balanced access request additional security protection node network address;
The target security protection node sends the jump request to each security protection data acquisition node, so that the security protection number According to acquisition node according to the network address of the additional security protection node, jumps to the additional security protection node and request access to;
The target security protection node uploads security protection data to the agent node, so that the agent node is by the security protection Data are packaged into block data, and the block data is sent to miner's node and makees common recognition verifying.
Optionally, if being less than, the target security protection node uploads security protection data to the agent node.
Optionally, the security protection data acquisition node includes video monitor, smoke sensor device, temperature sensor or humidity Sensor.
Optionally, the security protection data are packaged into block data according to Merkel tree mode by the agent node.
In the security protection data balancing method and its system that each embodiment of the present invention provides, firstly, target security protection node Whether the sum for detecting itself security protection data access request is greater than the throughput of target security protection node.Secondly, if more than target peace The intelligent contract of anti-node triggering agent node so that agent node detect can balanced access request additional security protection node, And requested to target security protection node return jump, jump request carries the network address of additional security protection node.Again, target is pacified Anti- node sends jump request to each security protection data acquisition node, so that security protection data acquisition node is according to additional security protection node Network address, jump to additional security protection node and request access to.Finally, target security protection node uploads security protection number to agent node According to so that security protection data are packaged into block data by agent node, and block data is sent to the work common recognition verifying of miner's node. On the one hand, it is capable of the access request of balanced security protection data acquisition node, so that system more reliably works.On the other hand, It can not distort since block chain has by security protection data sharing in block chain, decentralization and highly transparent Therefore feature is capable of providing reliable security protection data.
Detailed description of the invention
One or more embodiments are illustrated by the picture in corresponding attached drawing, these exemplary theorys The bright restriction not constituted to embodiment, the element in attached drawing with same reference numbers label are expressed as similar element, remove Non- to have special statement, composition does not limit the figure in attached drawing.
Fig. 1 is that the embodiment of the present invention provides a kind of framework model schematic diagram of block chain network;
Fig. 2 is that the embodiment of the present invention provides a kind of structural schematic diagram of security protection data balancing system;
Fig. 3 is that the embodiment of the present invention provides a kind of flow diagram of security protection data balancing method;
Fig. 4 is that the embodiment of the present invention provides a kind of structural schematic diagram of block chain node.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
Block chain technology is also known as distributed account book technology, is a kind of distributed interconnection database technology.Based on block The network of chain technology building can be referred to as block chain network, and block chain network includes multiple block chain nodes, each node At least one block chain is corresponded to, contains at least one block on each block chain.Block chain technology has decentralization, openly It is transparent, can not distort, trusted the features such as, therefore, block chain technical applications are more and more extensive.
Referring to Fig. 1, Fig. 1 is that the embodiment of the present invention provides a kind of framework model schematic diagram of block chain network.Such as Fig. 1 institute Show, which includes data Layer 11, network layer 12, common recognition layer 13 and intelligent contract layer 14.
Data Layer 11 encapsulates bottom data block and the basic datas such as relevant data encryption and timestamp and basic Algorithm.Network layer 12 includes distributed networking mechanism, data dissemination mechanism and data authentication mechanism etc..Layer 13 of knowing together encapsulates net All kinds of common recognition algorithms of network node.Intelligent contract layer 14 encapsulates all kinds of scripts, algorithm and intelligent contract.
The security protection data balancing method of the embodiment of the present invention, can in any suitable type, with the block of operational capability It is executed in chain node, such as in server, desktop computer, smart phone, tablet computer and other electronic products.Wherein, Server herein can be a physical server or multiple physical servers it is virtual made of a logical server.Clothes Business device be also possible to it is multiple can interconnected communication server composition server zone, and each functional module can be respectively distributed to take It is engaged on each server in device group.
The security protection data balancing device of the embodiment of the present invention can be used as software systems, be independently arranged at above-mentioned block chain link In point, the one of functional module of integration in the processor can also be used as, the security protection data for executing the embodiment of the present invention are equal Weighing apparatus method.
Block chain provided in an embodiment of the present invention includes such as publicly-owned block chain (Public Block Chains), joint Block chain (Consortium Block Chains) and privately owned block chain (Private Block Chains).
Referring to Fig. 2, Fig. 2 is that the embodiment of the present invention provides a kind of structural schematic diagram of security protection data balancing system.Such as Fig. 2 Shown, security protection data balancing system 200 includes security protection data acquisition node 20, security protection node 21, agent node 22 and miner's section Point 23.
Security protection data acquisition node 20 and security protection node 21 communicate, and communication modes both can be wire communication, can also be Wireless telecommunications.Security protection node 21 and 22 communication connection of agent node, agent node 22 also with 23 communication connection of miner's node.Its In, communication between each block chain node support point-to- point communication mode (Point to point communication, P2P)。
Security protection data acquisition node 20 is for acquiring security protection data, wherein security protection data include video data, smog number According to, voice data, temperature data, humidity data, particulate count according to etc..Correspondingly, security protection data acquisition node 20 can be Any one or more electronic equipment below: video monitor, smoke sensor device, temperature sensor or humidity sensor, it can To be set to any region according to security protection demand.
Security protection data acquisition node 20 acquires the security protection data of preset range, and security protection data are sent to security protection node 21。
Security protection node 21 can analyze processing security protection data, and security protection data are sent to agent node 22 by treated, Security protection node 21 holds the electronic money of circulation, and the right of vote by ballot is possessed in block catenary system.Security protection node 21 can be with Relationship trading operation is carried out, but the not packing book keeping operation power of block, it can only be from the agent node 22 for possessing packing book keeping operation power Synchronous recording block data.
Agent node 22 is encoded with intelligent contract code, and security protection node 21 sends security protection data, triggering to agent node 22 The intelligent contract of agent node 22, so that the intelligent contract of agent node 22 executes security protection data.Wherein, security protection node 21 is safeguarded There is intelligent contract list, which is able to carry out each agent node list of intelligent contract.Whenever security protection When node 21 receives security protection data, security protection node 21 transfers intelligent contract list, finds out from intelligent contract list each The address of agent node, and security protection data are sent to each agent node.
In the present embodiment, agent node 22 can prestore multiple types intelligence contract, can be according to security protection node 21 The trigger request of transmission parses the execution type of intelligent contract.Agent node 22 is held further according to the intelligent contract parsed Row type executes corresponding intelligent contract.
When some agent node falls into failure, remaining agent node by the address broadcast of some agent node to the whole network, Security protection node 21 monitors the broadcast message, and updates intelligent contract list, and when subsequent transmission security protection data, security protection node 21 is not Data are sent to some agent node 22, to improve working efficiency.
The code of intelligent contract is write according to business scenario logic, for example, in safety-security area, intelligent contract can be with Implement automatic alarm according to security protection data.
After agent node 22 executes security protection data according to intelligent contract, block data to be verified is exported.Then, Dai Lijie Point 22 also signs block data to be verified, and the block data after signature is transmitted to miner's node 23.Miner Node 23 is using the block data after the public key verifications signature of agent node 22, if being proved to be successful, then it is assumed that the area after the signature Block number evidence is that lawful agencies node 22 is sent, subsequent then to carry out common recognition processing to the block data.If verifying is failed, Block data after thinking the signature is that illegal agent node 22 is sent.For example, agent node 22 is using own private key to working as The Hash content of preceding block makees signature operation, obtains the signature.
Miner's node 23, which is used to know together, verifies the block data that agent node 22 uploads.Wherein, miner's node 23 can prop up Hold it is following any one common recognition algorithm: proof of work (Proof of Work, PoW), equity prove (Proof of Stake, POS), share authorisation verification (Delegate proof of Stake, DPoS), practical Byzantine failure tolerance (practical Byzantine Fault Tolerance, PBFT), authorization Byzantine failure tolerance (Delegated Byzantine Fault Tolerance, DBFT) etc..
Each miner's node 23 all needs to register in agent node 22, and after success to be registered, which is just legal Miner's node.Registration process is as follows:
1, miner's node 23 submits registration information to agent node 22.
Wherein, which includes one or more of information: equipment Serial Number SN, Yong Huxin of miner's node 23 Breath and miner's wallet address.
2, agent node 22 checks registration information.
Checking process includes: that whether correct, SN whether there is in database detection SN number format, whether SN has been bound Other users etc..
3, agent node 22 records registration information.
4, registering result is returned to miner's node 23 by agent node 22.
5, agent node 22 broadcasts new log-on data to security protection data balancing 200.
In above-mentioned security protection data balancing 200, block is the carrier for storing security protection data, and each block all includes area Build and block body, the information that block head is recorded exist for identifying block itself, the informative abstract of previous block and block Position in entire account book.Block body is not usurped for storing security protection data and verifying security protection data and saving security protection data Change.
Block chain is to connect each block one by one according to the sequence for generating the time, just forms the number of a chain type According to storage organization.In entire block chain, first block is known as creating generation block, and block height is 0, each block later Block height successively add 1, and the cryptographic Hash of previous block head is written in block head.Each block on block chain it Between linked by the upper block head cryptographic Hash on each block.
Therefore, block chain have can not tamper.Based on this, the embodiment of the present invention provides a kind of security protection data balancing side Method.
Referring to Fig. 3, Fig. 3 is that the embodiment of the present invention provides a kind of flow diagram of security protection data balancing method.Such as Fig. 3 Shown, security protection data balancing method S300 includes:
Whether S31, the total of target security protection nodal test itself security protection data access request are greater than target security protection node Throughput, if more than jumping to S32, if being less than, jumping to S35.
In the present embodiment, each security protection node can be target security protection the node, " mesh in " target security protection node " Mark " is not limited to the protection scope of " security protection node ".After security protection node A is selected as target security protection node, relative to peace Anti- node A, other security protection nodes are all additional security protection node.It is similar, after security protection node B is selected as target security protection node, phase For security protection node B, other security protection nodes (including security protection node A) are all additional security protection node.And so on, it does not go to live in the household of one's in-laws on getting married herein It states.
Throughput is the number of request that target security protection node handles security protection data access request within the unit time.When current peace When the sum of anti-data access request is greater than the throughput of target security protection node, the treatment effeciency of target security protection node is by very big It reduces, in order to improve the treatment effeciency of target security protection node, needs to monitor the sum of current security protection data access request.
S32, the intelligent contract that agent node is triggered if more than, target security protection node, so that detect can be equal for agent node The additional security protection node for the access request that weighs, and requested to target security protection node return jump, jump request, which carries, balanced to visit Ask the network address of the additional security protection node of request;
In the present embodiment, if the sum of target security protection nodal test itself security protection data access request is greater than target security protection The throughput of node, target security protection node send trigger request to agent node, and agent node executes intelligence according to the trigger request Can contract, wherein the treaty content of intelligent contract include: detect can balanced access request additional security protection node, and to mesh The request of security protection node return jump is marked, jump request carries the network address of additional security protection node.
During executing intelligent contract, agent node generates detection request, and all additional security protections into block chain Node broadcasts detection request.All additional security protection nodes according to the detection request, to agent node send operating status and Network address, wherein operating status includes overload and normal condition.It is in normal that agent node, which transfers out operating status, The additional security protection node and its network address of state are packaged into jump request, and jump request is sent to target security protection node.
In the present embodiment, can balanced access request additional security protection node be can extra process by target security protection node The additional security protection node of the security protection data access request of transfer.
S33, target security protection node send jump request to each security protection data acquisition node, so that security protection data acquisition section Point jumps to additional security protection node and requests access to according to the network address of additional security protection node;
In the present embodiment, each security protection data acquisition node from jump request parse can balanced access request it is additional The network address of security protection node, and jump to additional security protection node and request access to, then, target security protection node it is avoided that by The access of more security protection data acquisition nodes, thus the phenomenon that avoiding system from collapsing appearance.
S34, target security protection node upload security protection data to agent node, so that security protection data are packaged into area by agent node Block number evidence, and block data is sent to miner's node and makees common recognition verifying;
In some embodiments, security protection data are packaged into block data according to Merkel tree mode by agent node, also that is, Every two security protection data, which merge, generates a cryptographic Hash, so that all security protection data are generated Merkel in a manner of Merkel tree Tree, wherein Merkel's tree root Hash is recorded in the block head of the block data.By the way that security protection data are beaten in a manner of Merkel tree It is bundled into block data, each security protection data of Late Stage Verification can be facilitated.
If S35, being less than, target security protection node uploads security protection data to agent node.
If the sum of target security protection nodal test itself security protection data access request is less than the throughput of target security protection node, Then target security protection node handles security protection data access request there are also power is calculated, and then target security protection node then handles each security protection number According to the security protection data access request of acquisition node.
To sum up, on the one hand, its access request for capableing of balanced security protection data acquisition node, so that system more reliably work Make.On the other hand, can by security protection data sharing in block chain, due to block chain have can not distort, decentralization and Therefore the characteristics of highly transparent, is capable of providing reliable security protection data.
In some embodiments, detect can be first during the additional security protection node of balanced access request for agent node First, agent node obtains sum and each additional security protection of the current security protection data access request of each additional security protection node The throughput of node, for example, additional security protection node is requested according to detection, by the sum of current security protection data access request and certainly The throughput of body is sent to agent node.Secondly, agent node calculates the current security protection data of each additional security protection node Ratio between the sum of access request and the throughput of each additional security protection node;Again, agent node is according to each ratio The sequence of value from small to large, is arranged successively corresponding each additional security protection node;Finally, agent node selection is arranged in forefront The additional security protection node of preset quantity as can balanced access request additional security protection node, for example, additional security protection node A1 Ratio is P1, and the ratio of additional security protection node A2 is P2, and the ratio of additional security protection node A3 is P3, the ratio of additional security protection node A4 Value is P4, wherein P2 is greater than P3, and P4 is greater than P2, and P1 is greater than P4, such as according to the sequence rank results of each ratio from small to large Under: A3, A2, A4, A1.When preset quantity is 2, since A3, A2 are the additional security protection section for being arranged in forefront preset quantity 2 Point, therefore, agent node select additional security protection node A3 and A2 as can balanced access request additional security protection node.
In some embodiments, which is applied to alliance's chain, when using share authorisation verification algorithm When as common recognition mechanism, the share accounting of share authorisation verification algorithm is distributed according to the security protection scale of each safeguard management person.Example Such as, each security protection node of alliance's chain is the server that safeguard management person sets up, and security protection scale includes security protection data acquisition node Quantity and coverage area etc..Wherein, the security protection of safeguard management person A is largest, accounting 10%, and safeguard management person B is 6%, safeguard management person C are 3%......, and so on.
Some miners fall into failure or do evil and (do not sign verifying new block chain data), in order to guarantee block catenary system energy Enough normally to go out block, remaining miner can make view update, stop failure or the common recognition right for the miner that does evil.Therefore, in some realities It applying in example, miner knows together during verifying block data, when detecting that the number of common recognition authentication failed is greater than preset threshold, The common recognition server zone of miner's composition determines that malice miner, malice miner are not sign verifying block data and common recognition is caused to be verified The most node of the frequency of failure.The common recognition server zone of miner's composition forbids malice miner to participate in common recognition verifying, and remaining Miner, which redistributes share and knows together, verifies block data, for example, the miner A that accounting is 10% does evil, then, common recognition is taken first Business device group stops the ballot right of miner A, secondly, common recognition server distributes to the accounting 10% of miner A according to preset rules Remaining miner, for example, giving remaining miner, alternatively, distributing to remaining node according to the work age of miner, the work age is got over Long, distribution accounting is higher, and the work age is shorter, and distribution accounting is lower.
Again, common recognition server zone continues common recognition and tests when the number for detecting common recognition authentication failed is less than preset threshold Demonstrate,prove block data.
Using such mode, guarantee that block catenary system can smoothly go out block.
It should be noted that not necessarily there is centainly successive between above steps in above-mentioned each embodiment Sequentially, those of ordinary skill in the art, according to an embodiment of the present invention to describe to be appreciated that in different embodiments, above-mentioned each step Suddenly there can be the different sequences that executes, also i.e., it is possible to execute parallel, execution etc. can also be exchanged.
As the another aspect of the embodiment of the present invention, the embodiment of the present invention provides a kind of block chain node.Such as Fig. 4 institute Show, which includes: one or more processors 41 and memory 42.Wherein, with a processor in Fig. 4 For 41.
Processor 41 can be connected with memory 42 by bus or other modes, to be connected as by bus in Fig. 4 Example.
Memory 42 is used as a kind of non-volatile computer readable storage medium storing program for executing, can be used for storing non-volatile software journey Sequence, non-volatile computer executable program and module, as the security protection data balancing method in the embodiment of the present invention is corresponding Program instruction/module.Non-volatile software program, instruction and the mould that processor 61 is stored in memory 42 by operation Block, thereby executing the various function application and data processing of security protection data balancing device, i.e. realization above method embodiment peace The function of anti-data balancing method and the modules of above-mentioned apparatus embodiment.
Memory 42 may include high-speed random access memory, can also include nonvolatile memory, for example, at least One disk memory, flush memory device or other non-volatile solid state memory parts.In some embodiments, memory 42 Optional includes the memory remotely located relative to processor 41, these remote memories can pass through network connection to processor 41.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Described program instruction/module is stored in the memory 42, is held when by one or more of processors 41 When row, the security protection data balancing method in above-mentioned any means embodiment is executed.
The embodiment of the invention also provides a kind of nonvolatile computer storage media, the computer storage medium storage There are computer executable instructions, which is executed by one or more processors, such as at one in Fig. 4 Device 41 is managed, may make said one or multiple processors that the security protection data balancing side in above-mentioned any means embodiment can be performed Method.
Device or apparatus embodiments described above is only schematical, wherein it is described as illustrated by the separation member Unit module may or may not be physically separated, and the component shown as modular unit can be or can also Not to be physical unit, it can it is in one place, or may be distributed on multiple network module units.It can basis It is actual to need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It is realized by the mode of software plus general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, above-mentioned technology Scheme substantially in other words can be embodied in the form of software products the part that the relevant technologies contribute, the computer Software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are with directly To computer equipment (can be personal computer, server or the network equipment etc.) execute each embodiment or Method described in certain parts of embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;At this It under the thinking of invention, can also be combined between the technical characteristic in above embodiments or different embodiment, step can be with It is realized with random order, and there are many other variations of different aspect present invention as described above, for simplicity, they do not have Have and is provided in details;Although the present invention is described in detail referring to the foregoing embodiments, the ordinary skill people of this field Member is it is understood that it is still possible to modify the technical solutions described in the foregoing embodiments, or to part of skill Art feature is equivalently replaced;And these are modified or replaceed, each reality of the application that it does not separate the essence of the corresponding technical solution Apply the range of a technical solution.

Claims (10)

1. a kind of security protection data balancing method is applied to target security protection node, which is characterized in that the described method includes:
Whether the sum of target security protection nodal test itself the security protection data access request is greater than the target security protection node Throughput;
If more than, the intelligent contract of target security protection node triggering agent node, so that detect can be equal for the agent node The additional security protection node for the access request that weighs, and requested to the target security protection node return jump, the jump request carries It is described can balanced access request additional security protection node network address;
The target security protection node sends the jump request to each security protection data acquisition node, so that the security protection data are adopted Collect node according to the network address of the additional security protection node, jumps to the additional security protection node and request access to;
The target security protection node uploads security protection data to the agent node, so that the agent node is by the security protection data It is packaged into block data, and the block data is sent to miner's node and makees common recognition verifying.
2. the method according to claim 1, wherein the method also includes:
If being less than, the target security protection node uploads security protection data to the agent node.
3. the method according to claim 1, wherein the security protection data acquisition node include video monitor, Smoke sensor device, temperature sensor or humidity sensor.
4. the method according to claim 1, wherein the security protection data are packaged into block by the agent node Data, comprising:
The security protection data are packaged into block data according to Merkel tree mode by the agent node.
5. method according to any one of claims 1 to 4, which is characterized in that the agent node detects balanced to visit Ask the additional security protection node of request, comprising:
The agent node obtain the current security protection data access request of each additional security protection node sum with it is described each The throughput of a additional security protection node;
The agent node calculates the total and described every of the current security protection data access request of each additional security protection node Ratio between the throughput of one additional security protection node;
According to the sequence of each ratio from small to large, it is arranged successively corresponding each additional security protection node;
Select to be arranged in the additional security protection node of forefront preset quantity as can balanced access request additional security protection node.
6. method according to any one of claims 1 to 4, which is characterized in that share warrant is supported in the common recognition verifying Bright mechanism.
7. a kind of security protection data balancing system, which is characterized in that the system comprises several security protection data acquisition nodes, targets to pacify Anti- node, agent node and miner's node, the security protection data acquisition node and the target security protection node communication, the mesh Security protection node and the agent node is marked to communicate, the agent node also with miner's node communication;
Whether the sum of target security protection nodal test itself the security protection data access request is greater than the target security protection node Throughput;
If more than, the intelligent contract of target security protection node triggering agent node, so that detect can be equal for the agent node The additional security protection node for the access request that weighs, and requested to the target security protection node return jump, the jump request carries It is described can balanced access request additional security protection node network address;
The target security protection node sends the jump request to each security protection data acquisition node, so that the security protection data are adopted Collect node according to the network address of the additional security protection node, jumps to the additional security protection node and request access to;
The target security protection node uploads security protection data to the agent node, so that the agent node is by the security protection data It is packaged into block data, and the block data is sent to miner's node and makees common recognition verifying.
8. system according to claim 7, which is characterized in that if being less than, the target security protection node is saved to the agency Point uploads security protection data.
9. system according to claim 7, which is characterized in that the security protection data acquisition node include video monitor, Smoke sensor device, temperature sensor or humidity sensor.
10. system according to claim 7, which is characterized in that the agent node will be described according to Merkel tree mode Security protection data are packaged into block data.
CN201811109479.7A 2018-09-21 2018-09-21 Security protection data balancing method and its system Pending CN109284191A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811109479.7A CN109284191A (en) 2018-09-21 2018-09-21 Security protection data balancing method and its system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811109479.7A CN109284191A (en) 2018-09-21 2018-09-21 Security protection data balancing method and its system

Publications (1)

Publication Number Publication Date
CN109284191A true CN109284191A (en) 2019-01-29

Family

ID=65181486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811109479.7A Pending CN109284191A (en) 2018-09-21 2018-09-21 Security protection data balancing method and its system

Country Status (1)

Country Link
CN (1) CN109284191A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010430A (en) * 2019-12-05 2020-04-14 江苏荣泽信息科技股份有限公司 Cloud computing security data sharing method based on double-chain structure
CN113726749A (en) * 2021-08-13 2021-11-30 刘应森 Data management system based on big data and intelligent security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741892A (en) * 2008-11-21 2010-06-16 北京易路联动技术有限公司 Method, system and subsystem for setting load balance according to threshold value of specific data service
CN105740074A (en) * 2016-01-26 2016-07-06 中标软件有限公司 Cloud computing based virtual machine load balancing method
CN107465656A (en) * 2017-06-14 2017-12-12 广州宏和网络科技有限公司 A kind of safety monitoring big data processing method and system based on cloud computing
US20180041520A1 (en) * 2015-08-31 2018-02-08 Tencent Technology (Shenzhen) Company Limited Data access method based on cloud computing platform, and user terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741892A (en) * 2008-11-21 2010-06-16 北京易路联动技术有限公司 Method, system and subsystem for setting load balance according to threshold value of specific data service
US20180041520A1 (en) * 2015-08-31 2018-02-08 Tencent Technology (Shenzhen) Company Limited Data access method based on cloud computing platform, and user terminal
CN105740074A (en) * 2016-01-26 2016-07-06 中标软件有限公司 Cloud computing based virtual machine load balancing method
CN107465656A (en) * 2017-06-14 2017-12-12 广州宏和网络科技有限公司 A kind of safety monitoring big data processing method and system based on cloud computing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
奥克拉 马尔: "《系统安全与网络管理指南》", 31 May 2001, 《北京希望电子出版社》 *
张世强: "《中国智能金融产业蓝皮书》", 31 March 2018, 中国发展出版社 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010430A (en) * 2019-12-05 2020-04-14 江苏荣泽信息科技股份有限公司 Cloud computing security data sharing method based on double-chain structure
CN111010430B (en) * 2019-12-05 2022-03-29 江苏荣泽信息科技股份有限公司 Cloud computing security data sharing method based on double-chain structure
CN113726749A (en) * 2021-08-13 2021-11-30 刘应森 Data management system based on big data and intelligent security

Similar Documents

Publication Publication Date Title
JP7205994B2 (en) internet of things
US20190102163A1 (en) System and Method for a Blockchain-Supported Programmable Information Management and Data Distribution System
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN109117097A (en) A kind of date storage method and system based on block chain
CN112527912B (en) Data processing method and device based on block chain network and computer equipment
CN109861992A (en) A kind of information interacting method and across scene method for tracing of monitor terminal
CN111931215B (en) Data management method and device and storage medium
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN112434302B (en) Multitask collaboration vulnerability platform and construction method and service method thereof
CN111698315A (en) Data processing method and device for block and computer equipment
CN108880820A (en) Code administration method and apparatus
CN109284191A (en) Security protection data balancing method and its system
Serena et al. Security analysis of distributed ledgers and blockchains through agent-based simulation
CN111782551A (en) Test method and device for block chain item and computer equipment
CN116827957B (en) Information processing method, device, equipment and medium based on multi-block chain
CN109284630A (en) File editing method and system, agent node
CN109189742B (en) Question extraction method and system
Alam IoT-fog-blockchain framework: Opportunities and challenges
CN109120714A (en) Security protection data reconstruction method and system, node server
Dorri et al. Blockchain for Cyberphysical Systems
CN103997463A (en) Secure multicast method for overlay network at low expenses
CN110166822B (en) Multi-trust-domain trusted video sharing method and system
Dorri A scalable lightweight blockchain-based framework for IoT security and anonymity
CN116975158B (en) Request processing method, apparatus, computer device and storage medium
CN108881156A (en) Inventory records method, system and computer program product based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190129