CN109918946B - big data security processing system and method based on block chain technology - Google Patents

big data security processing system and method based on block chain technology Download PDF

Info

Publication number
CN109918946B
CN109918946B CN201910174333.9A CN201910174333A CN109918946B CN 109918946 B CN109918946 B CN 109918946B CN 201910174333 A CN201910174333 A CN 201910174333A CN 109918946 B CN109918946 B CN 109918946B
Authority
CN
China
Prior art keywords
data
address
big
processor
input module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201910174333.9A
Other languages
Chinese (zh)
Other versions
CN109918946A (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yunhe Intelligent Equipment Co., Ltd.
Original Assignee
Zhejiang Yunhe Intelligent Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yunhe Intelligent Equipment Co Ltd filed Critical Zhejiang Yunhe Intelligent Equipment Co Ltd
Priority to CN201910174333.9A priority Critical patent/CN109918946B/en
Publication of CN109918946A publication Critical patent/CN109918946A/en
Application granted granted Critical
Publication of CN109918946B publication Critical patent/CN109918946B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The big data safety processing system based on the block chain technology comprises at least five nodes (100), wherein each node (100) comprises an input module (200), a big database, a data transceiver module and a processor (300), the big database and the data transceiver module are compared according to a first address and a second address, and if the first address and the second address are consistent, the first data are converted into second data to be stored in the big database. According to the invention, the second data and the second address in the large database of the node (100) of the original block chain can be used as trusted data and addresses, and the addresses are compared with the first data and the first address newly input by the node (100), wherein the address screening is used as strong screening, namely the address is trusted and the data is trusted, so that the safety of the whole block chain is enhanced.

Description

Big data security processing system and method based on block chain technology
Technical Field
The present invention relates to a block chain big data system, and more particularly, to a big data security processing system based on a block chain technology.
Background
The Blockchain (Blockchain) is an important concept of bitcoin, which is essentially a decentralized database, and is used as the underlying technology of bitcoin, and is a series of data blocks which are generated by using a cryptographic method to be related, wherein each data block contains information of a batch of bitcoin network transactions.
each node in the block chain is an important information input port in the large database of the block chain, and the large database of the whole block chain may be paralyzed if each node has an input security problem, so that a large data processing system for improving the block chain security is urgently needed at present.
Disclosure of Invention
The invention aims to provide a big data security processing system based on a block chain technology, which improves the block chain security.
the invention relates to a big data safety processing system based on a block chain technology, which comprises
The blockchain includes at least five nodes including
The input module is used for inputting first data and a first address corresponding to the input module;
a big database for storing second data and second addresses corresponding to the second data;
a data transmitting/receiving module for transmitting/receiving first data and a first address where an input module corresponding to the first data is located to another node;
A processor to compare the first address to the second address,
If the first data are consistent with the second data, converting the first data into second data and storing the second data into a large database; if not, comparing the first data with the second data,
If the number of the first data and the second data which are consistent exceeds a first preset threshold value within first preset time, converting the first data into second data and storing the second data into a big database, and converting the first address into a second address; and if the number of the first data and the second data which are consistent is below a first preset threshold value within a first preset time, cutting off the connection between the input module of the node and the processor.
the invention relates to a big data safety processing system based on a block chain technology, wherein an input module is also used for collecting first face information of a corresponding registered user when first data is input, second face information of the registered user corresponding to input second data is stored in a big database, a processor is also used for comparing the first face information with the second face information,
if the first address is consistent with the second address, the first data is converted into second data, the second data is stored in a large database, and if the first address is inconsistent with the second address, the connection between the input module of the node and the processor is cut off.
The invention relates to a big data safety processing system based on block chain technology, wherein the input module is also used for collecting the first sound information of the corresponding registered user when inputting the first data, the big database is stored with the second sound information of the registered user corresponding to the input second data, the processor is also used for comparing the first sound information with the second sound information,
if the first address is consistent with the second address, the first data is converted into second data, the second data is stored in a large database, and if the first address is inconsistent with the second address, the connection between the input module of the node and the processor is cut off.
the invention relates to a big data security processing system based on a block chain technology, wherein a node is a notebook computer or a mobile phone or a tablet computer.
the invention relates to a big data safety processing system based on a block chain technology, wherein a processor respectively outputs a first preset time D according to the following formula according to the number A of nodes in a block chain, the number B of second addresses stored in a big database and the number C of first addresses used by an input module within one week:
Wherein the unit of the number A, B, C is one,
The unit of the first preset time D is minutes.
The invention relates to a big data safety processing system based on a block chain technology, wherein a processor respectively outputs a first preset threshold value E according to the following formula according to the number A of nodes in a block chain and the number B of second addresses stored in a big database:
the unit of the number A, B is one, and the number of the first preset threshold is a number of reserved digits according to a further method.
the invention relates to a big data safety processing system based on a block chain technology, wherein a processor opens a camera when an input module inputs first data, and closes the camera and adjusts the camera to be not towards a registered user when the input module does not input the first data.
The invention relates to a big data safety processing system based on a block chain technology, wherein an input module comprises a keyboard plate, press collectors, keycaps, a first electromagnet, a first permanent magnet, a camera, a limiting block, a first connecting rod, a second connecting rod, a third connecting rod and a fourth connecting rod, at least one press collector is arranged on the keyboard plate, each press collector is provided with a keycap, one side of each keycap, which is far away from a registered user, is hinged with one end of the third connecting rod and one end of the fourth connecting rod through a first shaft, the other end of the third connecting rod is hinged with one end of the second connecting rod, the other end of the second connecting rod is hinged with one end of the first connecting rod through a second shaft, the other end of the first connecting rod is hinged with the other end of the fourth connecting rod through a third shaft, wherein the first shaft is connected with the upper surface of the keycap, the third shaft is connected with the upper surface of the keyboard board, a camera is fixed on the surface, close to the keycap, of the third connecting rod, a first permanent magnet is fixed at one end of the second shaft, a first electromagnet is fixed on the upper surface of the keyboard board under the first permanent magnet, a limiting block is fixed at one end, far away from a registered user, of the keycap, and the limiting block is used for limiting the maximum rotating position of the third connecting rod;
wherein, the power module, the camera and the pressing collector of the first electromagnet are all connected with the processor,
the invention relates to a big data safety processing system based on a block chain technology, wherein a fourth connecting rod comprises a first section rod, a first spring and a second section rod, one end of the first section rod is hinged with the third connecting rod, one end of the second section rod is hinged with the first connecting rod, and the other end of the first section rod and the other end of the second section rod are fixed with two ends of the first spring.
The invention relates to a big data safety processing system based on a block chain technology, which comprises the following steps:
S100, storing second data and a second address corresponding to the second data;
s200, acquiring first data and a first address corresponding to the first data;
S300, comparing the first address with the second address,
if the first data are consistent with the second data, converting the first data into second data and storing the second data into a large database; if not, comparing the first data with the second data,
If the number of the first data and the second data which are consistent exceeds a first preset threshold value within first preset time, converting the first data into second data and storing the second data into a big database, and converting the first address into a second address; and if the number of the first data and the second data which are consistent is below a first preset threshold value within a first preset time, cutting off the connection between the input module of the node and the processor.
The invention relates to a big data safety processing system based on a block chain technology, which is different from the prior art in that the invention can use second data and second addresses in a big database of a node of an original block chain as trustable data and addresses through the mode, and compare the addresses with first data and first addresses newly input by the node, wherein, address screening is used as strong screening, namely, the addresses are trustable and the data is trustable, but the addresses are inconsistent, the credibility is greatly reduced, the number of coincided data input by the data of the node in a certain time and original data in the big database needs to be verified, if more, the address and the data of the node are upgraded to be trustable and the data, if inconsistent, the signal input between the node and other nodes of the whole block chain is cut off as soon as possible, the security of the entire blockchain is enhanced.
The invention further relates to a big data security processing system based on the block chain technology, which is described in the following with reference to the accompanying drawings.
Drawings
FIG. 1 is a circuit diagram of a big data security processing system based on block chain technology;
FIG. 2 is a front view of a first state of an input module of a big data security processing system based on a blockchain technique;
FIG. 3 is a front view of a second state of an input module of a big data security processing system based on a blockchain technique;
Fig. 4 is a schematic view of the modified structure of fig. 2.
Detailed Description
referring to fig. 1, as shown in fig. 1 to 4, a big data security processing system based on the block chain technology of the present invention includes
The blockchain includes at least five nodes 100, the nodes 100 including
an input module 200 for inputting first data and a first address corresponding to the input module;
a big database for storing second data and second addresses corresponding to the second data;
A data transmitting/receiving module for transmitting/receiving first data and a first address where the input module 200 corresponding to the first data is located, to the other node 100;
A processor 300 that compares the first address with the second address,
if the first data are consistent with the second data, converting the first data into second data and storing the second data into a large database; if not, comparing the first data with the second data,
if the number of the first data and the second data which are consistent exceeds a first preset threshold value within first preset time, converting the first data into second data and storing the second data into a big database, and converting the first address into a second address; if the number of the first data and the second data is equal to or less than the first preset threshold within the first preset time, the input module 200 of the node 100 is disconnected from the processor 300.
according to the invention, the second data and the second address in the large database of the node 100 of the original block chain can be used as trustable data and addresses, and the addresses are compared with the first data and the first address newly input by the node 100, wherein the address screening is used as strong screening, namely the addresses are trustable and the data is trustable, but the addresses are inconsistent, so that the trustable is greatly reduced, the number of coincidences between the data input by the node 100 and the original data in the large database within a certain time period needs to be verified, if the number is more, the address and the data of the node 100 are upgraded into trustable addresses and data, and if the addresses are inconsistent, the signal input between the node and other nodes of the whole block chain is cut off as soon as possible, so that the safety of the whole block chain is enhanced.
the invention avoids the influence on the whole block chain large database caused by the fact that a hacker inputs hacker data by taking one node 100 as a terminal in a block chain, and avoids the situation that the data input by the input module 200 of the untrusted node 100 occupies other nodes 100 of the block chain in a messy way, on one hand, the safety of the block chain large database is improved, and on the other hand, the operational efficiency and the operational speed of the whole block chain are also improved.
The first data and the second data may be a certain period, that is, each period is compared, and within one hour, if the number of periods in which the first data and the second data are repeated exceeds 8, the first data input by the node 100 and the first address where the node 100 is located may all be set as trusted addresses, and the first data and the first address input by the node are used as comparison objects and comparison criteria for evaluating whether the data input by other nodes are authentic.
the first address and the second address may be an IP address or a MAC address where a node is located.
Preferably, the input module 200 is further configured to collect first face information of a corresponding registered user when the first data is input, the large database stores second face information of the corresponding registered user when the second data is input, the processor 300 is further configured to compare the first face information with the second face information,
if the first address is consistent with the second address, the first data is converted into second data, the second data is stored in a large database, and if the first address is inconsistent with the second address, the connection between the input module 200 of the node 100 and the processor 300 is cut off.
according to the invention, when the registered user inputs the first data, the first face information of the user is collected in real time, and the first face information is consistent with the second face information, the first data first address input by the input module 200 is converted into the second address, the first data is converted into the second data and stored in the large database, so that the whole block chain compares the face information of the user before detecting the comparison address, the safety of the block chain is further increased, foreign people are prevented from using the calculation resources of the node 100 disorderly, and the calculation speed of the whole block chain is increased.
preferably, the input module 200 is further configured to collect first voice information of a corresponding registered user when the first data is input, the big database stores second voice information of a corresponding registered user when the second data is input, the processor 300 is further configured to compare the first voice information with the second voice information,
if the first address is consistent with the second address, the first data is converted into second data, the second data is stored in a large database, and if the first address is inconsistent with the second address, the connection between the input module 200 of the node 100 and the processor 300 is cut off.
According to the invention, when the registered user inputs the first data, the first voice information of the user is collected in real time, and the first voice information is consistent with the second voice information, the first data first address input by the input module 200 is converted into the second address, the first data is converted into the second data and stored in the big database, so that the voice information of the user is compared before the whole block chain detects the compared address, the safety of the block chain is further increased, and the foreign people are prevented from using the calculation resources of the node 100 disorderly, thereby increasing the calculation speed of the whole block chain.
the processor 300 determines whether the first text information converted from the first sound information is consistent with the second text information converted from the second sound information according to the comparison between the voiceprint of the first sound information and the voiceprint of the second sound information.
Preferably, the node 100 is a notebook computer, a mobile phone or a tablet computer.
the node 100 in the invention can be a notebook computer, a mobile phone or a tablet computer, so as to directly collect the face information and the voice information of the user.
Preferably, the processor 300 respectively outputs the first preset time D according to the following formula, based on the number a of the nodes 100 in the block chain, the number B of the second addresses stored in the big database, and the number C of the first addresses used by the input module 200 in one week:
wherein the unit of the number A, B, C is one,
The unit of the first preset time D is minutes.
According to the invention, the number A is in direct proportion to the first preset time D, a longer first preset time D is manufactured when more nodes 100 exist in the block chain, the proportion of the first preset threshold is diluted, the number B is in inverse proportion to the first preset time D, the possibility of the times of the first address and the second address which are matched accidentally due to the fact that B is too large can be reduced, and the number C is in inverse proportion to the first preset time D, the input module 200 can be used infrequently in the last short time, so that the contrast time is increased, and the possibility of accidental factors is reduced.
The number C of the first addresses used by the input module 200 in one week includes the first address used this time, that is, in one week, the input module 200 only inputs this time, that is, only one first address exists, and then C is 1.
the number B of the second addresses stored in the large database is at least larger than or equal to A, A is larger than or equal to 5, namely B is larger than or equal to 5.
The value range of the first preset time D may be (0.0167H, 100H), and is preferably 1H, that is, 1 hour.
the value range of the first preset threshold C may be (3, 1000), and is preferably 20.
Preferably, the processor 300 outputs the first preset threshold E according to the number a of the nodes 100 in the block chain and the number B of the second addresses stored in the big database, respectively, as follows:
the unit of the number A, B is one, and the number of the first preset threshold is a number of reserved digits according to a further method.
according to the invention, the first preset threshold value E can be dynamically adjusted according to the number A of the nodes 100 in the block chain and the number B of the second addresses through the formula, so that the first preset time D can be better matched.
Preferably, referring to fig. 2 and 3, the processor 300 turns on the camera 206 when the input module 200 inputs the first data, and the processor 300 turns off the camera 206 and adjusts the camera 206 to be not directed to the registered user when the input module 200 does not input the first data.
According to the invention, the camera 206 can be kept away from the user when not working, so that the bad photos of the user can be prevented from being stolen through the camera 206 when a certain node 100 of the block chain is controlled by a hacker, and the safety of the block chain and the registered user can be ensured.
Preferably, the input module 200 includes a keyboard board 201, a pressing collector 202, a key cap 203, a first electromagnet 204, a first permanent magnet 205, a camera 206, a limiting block 207, a first connecting rod 211, a second connecting rod 212, a third connecting rod 213, and a fourth connecting rod 214, at least one pressing collector 202 is disposed on the keyboard board 201, a key cap 203 is disposed on each pressing collector 202, one side of the key cap 203 away from a registered user is hinged to one end of the third connecting rod 213 and one end of the fourth connecting rod 214 through a first shaft 221, the other end of the third connecting rod 213 is hinged to one end of the second connecting rod 212, the other end of the second connecting rod 212 is hinged to one end of the first connecting rod 211 through a second shaft 222, the other end of the first connecting rod 211 is hinged to the other end of the fourth connecting rod 214 through a third shaft 223, wherein the first shaft 221 is connected to an upper surface of the key cap 203, the third shaft 223 is connected with the upper surface of the keyboard board 201, a camera 206 is fixed on the surface of the third connecting rod 213 close to the key cap 203, a first permanent magnet 205 is fixed at one end of the second shaft 222, a first electromagnet 204 is fixed on the upper surface of the keyboard board 201 under the first permanent magnet 205, a limit block 207 is not fixed at one end of the key cap 203 far away from the registered user, and the limit block 207 is used for limiting the maximum rotation position of the third connecting rod 213;
wherein, the power module of the first electromagnet 204, the camera 206 and the pressing collector 202 are all connected with the processor 300,
according to the invention, the four-bar linkage bracket drives the third linkage 213 to rotate to a specified angle through the attraction and repulsion of the first electromagnet 204 and the first permanent magnet 205, so that the orientation angle of the camera 206 can be controlled at any time, and the use of the function of inputting the second data of the input module 200 by the registered user is not influenced. Moreover, the camera 206 is always oriented towards the keycap 203 when not in use, so that the camera 206 can not take an elegant picture of the registered user when the registered user does not want to take the picture, thereby providing security for the privacy of the registered user and the privacy of the blockchain. In addition, the four-bar linkage structure makes the routing of the camera 206 easier, and the routing is not easy to break.
Of course, the camera 206 can use a battery as a power module and is connected to the processor 300 through a wireless communication module, so that the camera 206 can be fixed on the third link 213 as a flexible and independent component, thereby avoiding unstable factors such as breaking of cables.
When the user presses the key cap 203, the key cap 203 presses down the movable end of the press collector 202, so that the processor 300 acquires an input signal corresponding to a letter of the key cap 203.
What is mentioned is that, regarding the problem that the fourth link 214 affects the up-and-down movement of the keycap 203 and the keycap 203 cannot be pressed down, the present invention can make the angle of the fourth link 214 as flat as possible, and utilize the clearance of the keycap 203 and the pressing collector 202 in the front-and-back direction to make the keycap 203 move up and down smoothly, thereby not affecting the normal operation of the keycap 203 and the pressing collector 202.
wherein the first shaft 221 can be directly bearing-mounted on the upper surface of the key cap 203, and the third shaft 223 can be directly bearing-mounted on the upper surface of the keyboard board 201.
Of course, the first shaft 221 may be mounted on the upper end of the first rod, the lower end of the first rod is fixed to the upper surface of the key cap 203, and the third shaft 223 may be mounted on the upper end of the second rod, the lower end of the second rod is fixed to the upper surface of the keyboard board 201.
The pressing collector 202 can be understood as a red axis collector and a green axis collector of the keyboard to collect whether the user presses, and the upper ends of the pressing collectors are provided with keycaps 203.
Wherein, the power module of the first electromagnet 204, the camera 206, and the pressing collector 202 are all connected with the processor 300, and it is worth mentioning that the bending angle of the flat cable of the camera 206 is smaller due to the camera 206 supported by the four-bar structure, thereby avoiding the breakage of the flat cable and ensuring the service life of the camera 206.
The third link 213 may be a rod or a plate, and the camera 206 is fixed on the surface of the plate-shaped third link 213.
Preferably, referring to fig. 4, the fourth link 214 includes a first segment lever 241, a first spring 243, and a second segment lever 242, one end of the first segment lever 241 is hinged to the third link 213, one end of the second segment lever 242 is hinged to the first link 211, and the other end of the first segment lever 241 and the other end of the second segment lever 242 are fixed to both ends of the first spring 243.
The fourth connecting rod 214 connected by the spring can further facilitate the key cap 203 to press down, so that the normal use of the key cap 203 and the pressing collector 202 is not influenced.
The invention relates to a big data safety processing system based on a block chain technology, which comprises the following steps:
S100, storing second data and a second address corresponding to the second data;
s200, acquiring first data and a first address corresponding to the first data;
S300, comparing the first address with the second address,
If the first data are consistent with the second data, converting the first data into second data and storing the second data into a large database; if not, comparing the first data with the second data,
If the number of the first data and the second data which are consistent exceeds a first preset threshold value within first preset time, converting the first data into second data and storing the second data into a big database, and converting the first address into a second address; if the number of the first data and the second data is equal to or less than the first preset threshold within the first preset time, the input module 200 of the node 100 is disconnected from the processor 300.
According to the invention, the second data and the second address in the large database of the node 100 of the original block chain can be used as trustable data and addresses, and the addresses are compared with the first data and the first address newly input by the node 100, wherein the address screening is used as strong screening, namely the addresses are trustable and the data is trustable, but the addresses are inconsistent, so that the trustable is greatly reduced, the number of coincidences between the data input by the node 100 and the original data in the large database within a certain time period needs to be verified, if the number is more, the address and the data of the node 100 are upgraded into trustable addresses and data, and if the addresses are inconsistent, the signal input between the node and other nodes of the whole block chain is cut off as soon as possible, so that the safety of the whole block chain is enhanced.
The above-mentioned embodiments are merely illustrative of the preferred embodiments of the present invention, and do not limit the scope of the present invention, and various modifications and improvements of the technical solution of the present invention by those skilled in the art should fall within the protection scope defined by the claims of the present invention without departing from the spirit of the present invention.

Claims (10)

1. A big data security processing system based on block chain technology is characterized in that: the block chain comprises at least five nodes (100), the nodes (100) comprising
The input module (200) is used for inputting first data and a first address corresponding to the input module;
A big database for storing second data and second addresses corresponding to the second data;
A data transmission/reception module for transmitting/receiving first data and a first address where an input module (200) corresponding to the first data is located, to another node (100);
A processor (300) that compares the first address to the second address,
If the first data are consistent with the second data, converting the first data into second data and storing the second data into a large database; if not, comparing the first data with the second data,
If the number of the first data and the second data which are consistent exceeds a first preset threshold value within first preset time, converting the first data into second data and storing the second data into a big database, and converting the first address into a second address; and if the number of the first data and the second data which are consistent is below a first preset threshold value within a first preset time, disconnecting the input module (200) of the node (100) from the processor (300).
2. the big data security processing system based on the blockchain technology as claimed in claim 1, wherein: the input module (200) is further configured to collect first face information of a corresponding registered user when first data is input, the large database stores second face information of the corresponding registered user when second data is input, the processor (300) is further configured to compare the first face information with the second face information,
and if the first address is consistent with the second address, converting the first data into second data and storing the second data into a large database, and if the first address is inconsistent with the second address, disconnecting the input module (200) of the node (100) from the processor (300).
3. the big data security processing system based on the blockchain technology as claimed in claim 2, wherein: the input module (200) is further configured to collect first voice information of a registered user corresponding to input of first data, the big database stores second voice information of the registered user corresponding to input of second data, the processor (300) is further configured to compare the first voice information with the second voice information,
and if the first address is consistent with the second address, converting the first data into second data and storing the second data into a large database, and if the first address is inconsistent with the second address, disconnecting the input module (200) of the node (100) from the processor (300).
4. The big data security processing system based on the blockchain technology as claimed in claim 3, wherein: the node (100) is a notebook computer, a mobile phone or a tablet computer.
5. The big data security processing system based on the blockchain technology as claimed in claim 4, wherein: the processor (300) respectively outputs a first preset time D according to the following formula according to the number A of the nodes (100) in the block chain, the number B of second addresses stored in the big database and the number C of first addresses used in one week of the input module (200):
Wherein the unit of the number A, B, C is one,
The unit of the first preset time D is minutes.
6. the big data security processing system based on the blockchain technology as claimed in claim 5, wherein: the processor (300) respectively outputs a first preset threshold value E according to the number A of the nodes (100) in the block chain and the number B of second addresses stored in the big database according to the following formula:
The unit of the number A, B is one, and the number of the first preset threshold is a number of reserved digits according to a further method.
7. the big data security processing system based on the blockchain technology as claimed in claim 6, wherein: the processor (300) turns on the camera (206) when the input module (200) inputs the first data, and the processor (300) turns off the camera (206) and adjusts the camera (206) to be not oriented to the direction of the registered user when the input module (200) does not input the first data.
8. The big data security processing system based on the blockchain technology as claimed in claim 7, wherein: the input module (200) comprises a keyboard plate (201), pressing collectors (202), keycaps (203), first electromagnets (204), first permanent magnets (205), cameras (206), limiting blocks (207), first connecting rods (211), second connecting rods (212), third connecting rods (213) and fourth connecting rods (214), wherein at least one pressing collector (202) is arranged on the keyboard plate (201), each pressing collector (202) is provided with a keycap (203), one side of each keycap (203), which is far away from a registered user, is hinged with one end of each of the third connecting rod (213) and the fourth connecting rod (214) through a first shaft (221), the other end of each third connecting rod (213) is hinged with one end of each of the second connecting rods (212), and the other end of each second connecting rod (212) is hinged with one end of each of the first connecting rods (211) through a second shaft (222), the other end of the first connecting rod (211) is hinged to the other end of the fourth connecting rod (214) through a third shaft (223), wherein the first shaft (221) is connected with the upper surface of a keycap (203), the third shaft (223) is connected with the upper surface of a keyboard plate (201), a camera (206) is fixed on the surface, close to the keycap (203), of the third connecting rod (213), a first permanent magnet (205) is fixed at one end of the second shaft (222), a first electromagnet (204) is fixed on the upper surface of the keyboard plate (201) under the first permanent magnet (205), a limit block (207) is fixed at one end, far away from a registered user, of the keycap (203), and the limit block (207) is used for limiting the maximum rotating position of the third connecting rod (213);
The power module of the first electromagnet (204), the camera (206) and the pressing collector (202) are all connected with the processor (300).
9. The big data security processing system based on the blockchain technology as claimed in claim 8, wherein: the fourth connecting rod (214) comprises a first section of rod (241), a first spring (243) and a second section of rod (242), one end of the first section of rod (241) is hinged to the third connecting rod (213), one end of the second section of rod (242) is hinged to the first connecting rod (211), and the other end of the first section of rod (241), the other end of the second section of rod (242) and two ends of the first spring (243) are fixed.
10. The big data security processing system based on the blockchain technology as claimed in claim 9, comprising the steps of:
S100, storing second data and a second address corresponding to the second data;
S200, acquiring first data and a first address corresponding to the first data;
S300, comparing the first address with the second address,
if the first data are consistent with the second data, converting the first data into second data and storing the second data into a large database; if not, comparing the first data with the second data,
if the number of the first data and the second data which are consistent exceeds a first preset threshold value within first preset time, converting the first data into second data and storing the second data into a big database, and converting the first address into a second address; and if the number of the first data and the second data which are consistent is below a first preset threshold value within a first preset time, disconnecting the input module (200) of the node (100) from the processor (300).
CN201910174333.9A 2019-03-08 2019-03-08 big data security processing system and method based on block chain technology Expired - Fee Related CN109918946B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910174333.9A CN109918946B (en) 2019-03-08 2019-03-08 big data security processing system and method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910174333.9A CN109918946B (en) 2019-03-08 2019-03-08 big data security processing system and method based on block chain technology

Publications (2)

Publication Number Publication Date
CN109918946A CN109918946A (en) 2019-06-21
CN109918946B true CN109918946B (en) 2019-12-10

Family

ID=66963877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910174333.9A Expired - Fee Related CN109918946B (en) 2019-03-08 2019-03-08 big data security processing system and method based on block chain technology

Country Status (1)

Country Link
CN (1) CN109918946B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110727964B (en) * 2019-10-22 2023-10-31 北京国联视讯信息技术股份有限公司 Block chain big data processing method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10158479B2 (en) * 2017-02-06 2018-12-18 Northern Trust Corporation Systems and methods for generating, uploading and executing code blocks within distributed network nodes
CN107391298B (en) * 2017-07-06 2021-02-09 上海策链信息科技有限公司 Data storage state detection method and device and computer readable storage medium
CN108769173B (en) * 2018-05-21 2021-11-09 阿里体育有限公司 Block chain implementation method and equipment for running intelligent contracts

Also Published As

Publication number Publication date
CN109918946A (en) 2019-06-21

Similar Documents

Publication Publication Date Title
US10387460B2 (en) Method and apparatus for processing text information
CN102685025B (en) A kind of multiple terminals business switch method, terminal and system
CN103037319A (en) Communication transferring method, mobile terminal and server
CA2471831A1 (en) User interface and method of viewing unified communications events on a mobile device
CN113163406B (en) Threat detection system for mobile communication system, central device and local device thereof
EP2348682B1 (en) Interface for PDA and computing device
CN104967634A (en) File upload method and apparatus thereof
CN109918946B (en) big data security processing system and method based on block chain technology
WO2023065931A1 (en) Method for charging electronic device, and electronic device
CN104683301A (en) Password saving method and password saving device
CN102685167B (en) A kind of multiple terminals business switch method and system
CN101286806A (en) Method, system and device for monitoring multiple host by a single submachine
CN111800794B (en) Method and equipment for determining demodulation reference signal position
CN107708115B (en) Redirection control method and device and mobile terminal
CN112888024B (en) Data processing method, data processing device, storage medium and electronic equipment
CN1801047A (en) Remote control system for computer and implementing method thereof
EP2191630B1 (en) Transmitting data respecting different formats at source and required by the receiver
CN111862434A (en) Pedestrian passing control system and method
KR100669579B1 (en) System and method for requesting and providing stored data
CN103237304A (en) Anti-monitoring method, anti-monitoring device and anti-monitoring system
KR20030082722A (en) Method and apparatus for performing united message service in a exclusive terminal
KR100641410B1 (en) Method for Filtering Short Message Edited with Special Letters and Mobile Terminal Using the Same
CN109451498B (en) Network authentication method and related product
CN108052363B (en) Information display method, terminal and computer readable storage medium
EP1779687A1 (en) Mobile station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20191012

Address after: 310051 room 117, floor 1, building 1, No. 33, Puyan Road, Puyan street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Zhejiang Yunhe Intelligent Equipment Co., Ltd.

Address before: 100061 Beijing Fangshan District Chengguan Street Guba Road Area 1-Q115

Applicant before: Beijing Marmara Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191210

Termination date: 20200308