CN109947777A - A kind of data acquisition and local secure storage method based on serial ports mode - Google Patents

A kind of data acquisition and local secure storage method based on serial ports mode Download PDF

Info

Publication number
CN109947777A
CN109947777A CN201910228131.8A CN201910228131A CN109947777A CN 109947777 A CN109947777 A CN 109947777A CN 201910228131 A CN201910228131 A CN 201910228131A CN 109947777 A CN109947777 A CN 109947777A
Authority
CN
China
Prior art keywords
data
identity
block
secure storage
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910228131.8A
Other languages
Chinese (zh)
Inventor
陈继
韩雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910228131.8A priority Critical patent/CN109947777A/en
Publication of CN109947777A publication Critical patent/CN109947777A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of data acquisition and local secure storage method based on serial ports mode, are related to Data acquisition and storage field;It the described method comprises the following steps that: S1 is parsed and identified to user identity when the data initial manipulation based on serial ports mode starts;S2 records identity resolution management information by block chain mode using block chain common recognition and non-repudiation mechanism, establishes ZK identity pool of blocks;S3, on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to the identification of the legitimacy of user identity.Piecemeal storing data is realized from acquisition, acquisition, verification, index, five links of scheduling, break original data encryption mindset, by data fragmentation and distributed storage is to multiple databases, to be the uniquely tagged for obtaining information to the certificate parameter that the identification parameters of data are calculated when storing data, guarantee the safety of acquisition of information, so that the difficulty that hacker gives data for change again improves.

Description

A kind of data acquisition and local secure storage method based on serial ports mode
Technical field
It is acquired the present invention relates to Data acquisition and storage field more particularly to a kind of data based on serial ports mode and local Method for secure storing.
Background technique
With technological means development and related mating similar means and methods it is improved day by day, in extraneous and production ring Collected initial data in border, because because of the introducing of human interference factor in storing process, it can be to acquired original data Cause interference or damage in a way, because initial data is tampered, destroyed, made so as to cause the authenticity of data The final result for obtaining business associated with it can be influenced because of the damage of initial data by negative sense.It is current for this mode There are no very effective technological means can fundamentally solve problems, to the side of a large amount of artificial treatments after only passing through Formula is traced to the authenticity of acquired original to data and is confirmed judgement, lacks the data safety since data acquisition sources head Treatment mechanism.
Summary of the invention
The purpose of the present invention is to provide a kind of data acquisition and local secure storage method based on serial ports mode, thus Solve foregoing problems existing in the prior art.
To achieve the goals above, The technical solution adopted by the invention is as follows:
A kind of data acquisition and local secure storage method based on serial ports mode, the described method comprises the following steps:
S1, ZK identity resolution management: the data initial manipulation based on serial ports mode parses user identity when starting And identification;
S2 establishes ZK identity pool of blocks: recording body by block chain mode using block chain common recognition and non-repudiation mechanism Part parsing management information, establishes ZK identity pool of blocks;
S3 identifies ZK identity: on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to user The legitimacy of identity identifies.
Preferably, step S1 specifically:
In data initial operation, include when data of the legitimate user to serial ports mode are handled data fragmentation, with And the data after parsing fragment;The identification parameters of data are obtained after parsing fragment data and are passed to the ZK identity block Library;
The identification parameters include five elements relevant to operation: hardware information, information equipment mark TI (i), movement mark Know AI (i), user identifier UI (i) and target data mark DI (i).
Be preferably based on serial ports mode data carry out fragment method the following steps are included:
S11 parses source data, generates binary array;
S12 carries out the binary array of generation to jump position reading, obtains multiple slicing files;Wherein, when jumping position reading, The quantity for jumping position is controlled, and according to tail portion zero padding of the quantity in the binary array for jumping position, two after making zero padding The digit of system array is the integral multiple for jumping bit quantity;
Condition code, serial number and the end mark position for giving operation for change of current slice file is arranged in S13;
All slicing files distributions are deposited into multiple databases by S14.
Preferably, step S2 specifically:
Identification parameters calculating generation is represented the user by calculating and is moved from the equipment using this by S21, ZK identity pool of blocks ZKID (i) and DI (i) is confirmed result as this data manipulation by the unique ZKID (i) for making the access data object;
S22, all areas while continuing this data manipulation, into the ZK identity chained list established based on block chain technology Block node broadcasts confirm result record request;
After all block nodes receive broadcast request in S23, ZKILT, qualified block hash value H (i) is calculated;
In S24, ZKIL all block nodes to H (i) confirm it is errorless after, on the block chain that itself is saved, creation Block, and H (i) and ZKBI information are recorded wherein;
Qualified hash value is that preceding 10 bytes are necessary for 0 in 32 bytes in step S23.
Preferably, it is calculated in step S21 by hash algorithm;
The method of qualified block hash value H (i) is calculated in step S23 specifically: starting ZKBS service calculates Block hash value, until wherein some block node ZB (i) calculating produces qualified block hash value H (i).
Preferably, further including block node ZB (i) between step S23 and step S24 broadcasts calculated result H (i) to the whole network Block information BI is corresponded to it.
Preferably, step S3 specifically:
S31, user or terminal, which issue, directly issues number to ZKISA (ZK Identification Service Agent) According to acquisition request;
The data information that S32, ZKISA are transmitted when backstage is issued and requested by request of data side is without manual intervention situation Under parsed, obtain be used for data initiator proof of identification four element of identity;
S33 calculates the identity five elements got, obtains ZKID (n), and regard ZKID (n) and DI (n) as body Part certificate parameter passes to ZKII;
S34, ZKII retrieve all block informations in ZKIL according to ZKID (n) and DI (n), and inquiry, which whether there is, meets item The ZB (m) of part then proves that the request of data is lawful acts if there is corresponding ZB (m), and it is dynamic can to continue follow-up data operation Make;If not having the ZB comprising corresponding information in block, this time request of data is considered as hazardous act.
Preferably, the identity five elements are hardware information, device identification TI (n), action identification AI (n), Yong Hubiao Know UI (n), target data mark DI (n).
Preferably, further include in the step S34, when the request of data is considered as hazardous act, follow-up data operation row For that will be prohibited, while this unauthorized access is operated and is recorded by log.
Preferably, when there is the block node that can not temporarily work, the block information saved on other nodes equally can be with The identity legitimacy of data access initiator is verified.
The beneficial effects of the present invention are:
The present invention provides a kind of method based on serial ports mode data acquisition and local secure storage, from acquisition, acquisition, school It tests, index, dispatching five links realization piecemeal storing data, breaking original data encryption mindset, by data fragmentation and divide Cloth storage is to multiple databases, to be to obtain information to the certificate parameter that the identification parameters of data are calculated when storing data Uniquely tagged, guarantee the safety of acquisition of information so that hacker give for change again data difficulty improve.
Detailed description of the invention
Fig. 1 is the method flow schematic diagram in the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing, to the present invention into Row is further described.It should be appreciated that the specific embodiments described herein are only used to explain the present invention, it is not used to Limit the present invention.
English abbreviation letter is explained:
ZK, Zero Knowledge, zero-knowledge proof;
ZKID, Zero Knowledge Identification, Zero Knowledge identity;
ZKIA, Zero Knowledge Identification Analysis, ZK identity resolution management;
ZKISA, ZK Identification Service Agent, Zero Knowledge proof of identification service broker;
ZKII, ZK ID Identification, ZK identification;
ZKILT, Zero Knowledge Identification Link Table, Zero Knowledge identity chained list;
ZKIL, ZK ID Library, ZK identity pool of blocks;
ZKBS, Zero Knowledge Blockchain Service, Zero Knowledge block chain service;
ZKBI, Zero Knowledge Block Information, Zero Knowledge block information;
ZB, ZKIL Block, Zero Knowledge block node;
TI, Terminal ID, device identification;
AI, Action ID, action identification;
UI, User ID, user identifier;
DI, Device Identification, device identification;
Embodiment
The present embodiment provides a kind of data acquisition and local secure storage method based on serial ports mode, this method is based on ZK ID authentication mechanism bottom authentication service is constructed by C, realize communication intercept and interaction, pass through the industry that Java realizes application layer Business processing logic, mainly comprises the steps that
S1, ZK identity resolution management: user identity is parsed and is identified since data initial manipulation;
S2 establishes ZK identity pool of blocks: recording body by block chain mode using block chain common recognition and non-repudiation mechanism Part parsing management information, establishes ZK identity pool of blocks;
S3 identifies ZK identity: on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to user The legitimacy of identity identifies.
Wherein, in step S1 when legitimate user carries out data fragmentation processing to serial ports mode data, ZKIA passes through parsing, It obtains and operates associated five elements: hardware information, device identification TI (i) (Terminal ID), action identification AI (i) (Action ID), user identifier UI (i) (User ID), target data mark DI (i) (Data ID), then ZKIA is called Four elements are passed to ZK identity pool of blocks by ZKIL.
Include: when carrying out fragment processing to serial data
S11 parses source data, generates binary array;
S12 carries out the binary array of generation to jump position reading, obtains multiple slicing files;Wherein, when jumping position reading, The quantity for jumping position is controlled, and according to tail portion zero padding of the quantity in the binary array for jumping position, two after making zero padding The digit of system array is the integral multiple for jumping bit quantity;
Condition code, serial number and the end mark position for giving operation for change of current slice file is arranged in S13;
All slicing files distributions are deposited into multiple databases by S14.
Step S2 specifically: ZK identity pool of blocks by calculate by each identification parameters calculate generate represent the user from this Equipment accesses unique ZKID (i) of the data object using the movement, and ZKID (i) and DI (i) is true as this data manipulation Recognize result;All block sections while continuing this data manipulation, into the ZK identity chained list established based on block chain technology Point broadcast acknowledgements result record request;After all block nodes receive broadcast request in ZK identity pool of blocks, calculates and meet item The block hash value H (i) of part;ZB (i) corresponds to block information BI with it to the whole network broadcast calculated result H (i);Own in the library ZKIL Block node to H (i) confirm it is errorless after, on the block chain that itself is saved, create block, and H (i) and BI information are remembered Record is wherein;
Qualified hash value is that preceding 10 bytes are necessary for 0 in 32 bytes (256 characters).
When needing to obtain data, does not need user and carry out Password Input behavior, user or terminal issue directly to ZKISA (ZK Identification Service Agent) issues data acquisition request;
The data information that ZK proof of identification service broker transmits when backstage is issued and requested by request of data side is without people It is parsed in the case of work intervention, obtains the identity five elements for being used for data initiator proof of identification: hardware information, device identification TI (n), action identification AI (n), user identifier UI (n), target data mark DI (n);
Four element of identity got is calculated, is obtained ZKID (n), and ZKID (n) and DI (n) are tested as identity Card parameter passes to ZKII;
ZKII retrieves all block informations in ZKIL according to authentication parameter ZKID (n) and DI (n), and whether inquiry deposits Then prove that the request of data is lawful acts, Ke Yiji if there is corresponding block ZB (m) in qualified block ZB (m) Continuous follow-up data operational motion;If not having the ZB comprising corresponding information in block, this time request of data is considered as dangerous row For follow-up data operation behavior will be prohibited, while operate to this unauthorized access and being recorded by log.
It is worth noting that, the block chain used in this method is because of the common recognition account book characteristic of its own, that is, on block chain The block information that each block includes is identical, even certain block nodes can not work, as long as being not less than 51% block Still available, then other nodes all can serve as the node of verifying identity legitimacy, it equally can be to data access initiator Identity legitimacy verified.
By using above-mentioned technical proposal disclosed by the invention, following beneficial effect has been obtained:
The present invention provides a kind of method based on serial ports mode data acquisition and local secure storage, from acquisition, acquisition, school It tests, index, dispatching five links realization piecemeal storing data, breaking original data encryption mindset, by data fragmentation and divide Cloth storage is to multiple databases, to be to obtain information to the certificate parameter that the identification parameters of data are calculated when storing data Uniquely tagged, guarantee the safety of acquisition of information so that hacker give for change again data difficulty improve.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered Depending on protection scope of the present invention.

Claims (10)

1. it is a kind of based on serial ports mode data acquisition and local secure storage method, which is characterized in that the method includes with Lower step:
S1, ZK identity resolution management: user identity is parsed and is known when the data initial manipulation based on serial ports mode starts Not;
S2 establishes ZK identity pool of blocks: recording identity solution by block chain mode using block chain common recognition and non-repudiation mechanism Management information is analysed, ZK identity pool of blocks is established;
S3 identifies ZK identity: on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to user identity Legitimacy identification.
2. data acquisition according to claim 1 and local secure storage method, which is characterized in that step S1 specifically:
It include data fragmentation and solution when data of the legitimate user to serial ports mode are handled in data initial operation Data after analysing fragment;The identification parameters of data are obtained after parsing and are passed to the ZK identity pool of blocks;
The identification parameters include five elements relevant to operation: hardware information, information equipment identify TI (i), action identification AI (i), user identifier UI (i) and target data mark DI (i).
3. data acquisition according to claim 2 and local secure storage method, which is characterized in that based on serial ports mode Data carry out fragment method include:
S11 parses source data, generates binary array;
S12 carries out the binary array of generation to jump position reading, obtains multiple slicing files;Wherein, when jumping position reading, to jump The quantity of position is controlled, and the binary system according to tail portion zero padding of the quantity in the binary array for jumping position, after making zero padding The digit of array is the integral multiple for jumping bit quantity;
Condition code, serial number and the end mark position for giving operation for change of current slice file is arranged in S13.
4. data acquisition according to claim 1 and local secure storage method, which is characterized in that step S2 specifically:
Identification parameters calculating generation is represented the user by calculating and is visited from the equipment using the movement by S21, ZK identity pool of blocks ZKID (i) and DI (i) is confirmed result as this data manipulation by the unique ZKID (i) for asking the data object;
S22, all block sections while continuing this data manipulation, into the ZK identity chained list established based on block chain technology Point broadcast acknowledgements result record request;
After all block nodes receive broadcast request in S23, ZKILT, qualified block hash value H (i) is calculated;
In S24, ZKIL all block nodes to H (i) confirm it is errorless after, on the block chain that itself is saved, create block, And H (i) and ZKBI information are recorded wherein;
Qualified hash value is that preceding 10 bytes are necessary for 0 in 32 bytes in step S23.
5. data acquisition according to claim 4 and local secure storage method, which is characterized in that pass through in step S21 Hash algorithm is calculated;
The method of qualified block hash value H (i) is calculated in step S23 specifically: starting ZKBS service, calculation block Hash value, until wherein some block node ZB (i) calculating produces qualified block hash value H (i).
6. data acquisition according to claim 4 and local secure storage method, which is characterized in that step S23 and step Further include block node ZB (i) between S24 to the whole network broadcast calculated result H (i) and its correspond to block information BI.
7. data acquisition according to claim 1 and local secure storage method, which is characterized in that step S3 specifically:
S31, user or terminal, which issue, directly issues data acquisition request to ZKISA;
The data information that S32, ZK proof of identification service broker transmit when backstage is issued and requested by request of data side is without people It is parsed in the case of work intervention, obtains four element of identity for being used for data initiator proof of identification;
S33 calculates the identity five elements got, obtains ZKID (n), and ZKID (n) and DI (n) are tested as identity Card parameter passes to ZKII;
S34, ZKII retrieve all block informations in ZKIL, inquiry is with the presence or absence of qualified according to ZKID (n) and DI (n) ZB (m) then proves that the request of data is lawful acts, can continue follow-up data operational motion if there is corresponding ZB (m); If not having the ZB comprising corresponding information in block, this time request of data is considered as hazardous act.
8. data acquisition according to claim 7 and local secure storage method, which is characterized in that the identity five is wanted Element is hardware information, device identification TI (n), action identification AI (n), user identifier UI (n), target data mark DI (n).
9. data acquisition according to claim 7 and local secure storage method, which is characterized in that in the step S34 It further include that when the request of data is considered as hazardous act, follow-up data operation behavior will be prohibited, while to this unauthorized access Operation is recorded by log.
10. data according to claim 7 acquisition and local secure storage method, which is characterized in that when exist temporarily without The block node of method work, the block information saved on other nodes, equally can identity to data access initiator it is legal Property is verified.
CN201910228131.8A 2019-03-25 2019-03-25 A kind of data acquisition and local secure storage method based on serial ports mode Pending CN109947777A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910228131.8A CN109947777A (en) 2019-03-25 2019-03-25 A kind of data acquisition and local secure storage method based on serial ports mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910228131.8A CN109947777A (en) 2019-03-25 2019-03-25 A kind of data acquisition and local secure storage method based on serial ports mode

Publications (1)

Publication Number Publication Date
CN109947777A true CN109947777A (en) 2019-06-28

Family

ID=67011472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910228131.8A Pending CN109947777A (en) 2019-03-25 2019-03-25 A kind of data acquisition and local secure storage method based on serial ports mode

Country Status (1)

Country Link
CN (1) CN109947777A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108389046A (en) * 2018-02-07 2018-08-10 西安交通大学 Secret protection method of commerce based on block chain technology in a kind of e-commerce
CN108712264A (en) * 2018-06-12 2018-10-26 陈继 A kind of identity identifying method based on zero-knowledge proof
CN108710702A (en) * 2018-05-25 2018-10-26 吴卓航 A method of data safety storage is realized based on frament reassembling technology
WO2018205729A1 (en) * 2017-05-11 2018-11-15 上海点融信息科技有限责任公司 Blockchain data processing based on zero-knowledge proof
CN109189857A (en) * 2018-09-17 2019-01-11 北京京东尚科信息技术有限公司 Data-sharing systems, method and apparatus based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018205729A1 (en) * 2017-05-11 2018-11-15 上海点融信息科技有限责任公司 Blockchain data processing based on zero-knowledge proof
CN108389046A (en) * 2018-02-07 2018-08-10 西安交通大学 Secret protection method of commerce based on block chain technology in a kind of e-commerce
CN108710702A (en) * 2018-05-25 2018-10-26 吴卓航 A method of data safety storage is realized based on frament reassembling technology
CN108712264A (en) * 2018-06-12 2018-10-26 陈继 A kind of identity identifying method based on zero-knowledge proof
CN109189857A (en) * 2018-09-17 2019-01-11 北京京东尚科信息技术有限公司 Data-sharing systems, method and apparatus based on block chain

Similar Documents

Publication Publication Date Title
US11336455B2 (en) Consensus protocol for blockchain DAG structure
AU2017269734B2 (en) Cryptologic rewritable blockchain
CN115210741B (en) Partially ordered blockchain
CN112507391B (en) Block chain-based electronic signature method, system, device and readable storage medium
CN110826111B (en) Test supervision method, device, equipment and storage medium
JP2023501152A (en) Random node selection for permissioned blockchains
Lee et al. Modifiable public blockchains using truncated hashing and sidechains
SE541713C2 (en) Method and system for registering digital documents
CN113495920B (en) Content auditing system, method and device based on blockchain and storage medium
CN101004805A (en) Digital document management system, digital document management method, and digital document management program
CN108880820B (en) Code management method and device
CN114372296B (en) Block chain-based user behavior data auditing method and system
JP2022541048A (en) Security layer for configuring blockchain
CN111881109B (en) Database mergeable ledgers
JP2023513420A (en) Index structure for blockchain ledger
CN115345618B (en) Block chain transaction verification method and system based on mixed quantum digital signature
CN112052474A (en) Blu-ray copy service
JP2023530594A (en) Permitted Event Processing in Distributed Databases
CN111817859A (en) Data sharing method, device, equipment and storage medium based on zero knowledge proof
CN110555682B (en) Multi-channel implementation method based on alliance chain
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN109947777A (en) A kind of data acquisition and local secure storage method based on serial ports mode
JP2023520634A (en) Maintaining contextual integrity
CN111125745A (en) Block chain-based data management system for Internet
CN112634040B (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190628