CN109947777A - A kind of data acquisition and local secure storage method based on serial ports mode - Google Patents
A kind of data acquisition and local secure storage method based on serial ports mode Download PDFInfo
- Publication number
- CN109947777A CN109947777A CN201910228131.8A CN201910228131A CN109947777A CN 109947777 A CN109947777 A CN 109947777A CN 201910228131 A CN201910228131 A CN 201910228131A CN 109947777 A CN109947777 A CN 109947777A
- Authority
- CN
- China
- Prior art keywords
- data
- identity
- block
- secure storage
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of data acquisition and local secure storage method based on serial ports mode, are related to Data acquisition and storage field;It the described method comprises the following steps that: S1 is parsed and identified to user identity when the data initial manipulation based on serial ports mode starts;S2 records identity resolution management information by block chain mode using block chain common recognition and non-repudiation mechanism, establishes ZK identity pool of blocks;S3, on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to the identification of the legitimacy of user identity.Piecemeal storing data is realized from acquisition, acquisition, verification, index, five links of scheduling, break original data encryption mindset, by data fragmentation and distributed storage is to multiple databases, to be the uniquely tagged for obtaining information to the certificate parameter that the identification parameters of data are calculated when storing data, guarantee the safety of acquisition of information, so that the difficulty that hacker gives data for change again improves.
Description
Technical field
It is acquired the present invention relates to Data acquisition and storage field more particularly to a kind of data based on serial ports mode and local
Method for secure storing.
Background technique
With technological means development and related mating similar means and methods it is improved day by day, in extraneous and production ring
Collected initial data in border, because because of the introducing of human interference factor in storing process, it can be to acquired original data
Cause interference or damage in a way, because initial data is tampered, destroyed, made so as to cause the authenticity of data
The final result for obtaining business associated with it can be influenced because of the damage of initial data by negative sense.It is current for this mode
There are no very effective technological means can fundamentally solve problems, to the side of a large amount of artificial treatments after only passing through
Formula is traced to the authenticity of acquired original to data and is confirmed judgement, lacks the data safety since data acquisition sources head
Treatment mechanism.
Summary of the invention
The purpose of the present invention is to provide a kind of data acquisition and local secure storage method based on serial ports mode, thus
Solve foregoing problems existing in the prior art.
To achieve the goals above, The technical solution adopted by the invention is as follows:
A kind of data acquisition and local secure storage method based on serial ports mode, the described method comprises the following steps:
S1, ZK identity resolution management: the data initial manipulation based on serial ports mode parses user identity when starting
And identification;
S2 establishes ZK identity pool of blocks: recording body by block chain mode using block chain common recognition and non-repudiation mechanism
Part parsing management information, establishes ZK identity pool of blocks;
S3 identifies ZK identity: on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to user
The legitimacy of identity identifies.
Preferably, step S1 specifically:
In data initial operation, include when data of the legitimate user to serial ports mode are handled data fragmentation, with
And the data after parsing fragment;The identification parameters of data are obtained after parsing fragment data and are passed to the ZK identity block
Library;
The identification parameters include five elements relevant to operation: hardware information, information equipment mark TI (i), movement mark
Know AI (i), user identifier UI (i) and target data mark DI (i).
Be preferably based on serial ports mode data carry out fragment method the following steps are included:
S11 parses source data, generates binary array;
S12 carries out the binary array of generation to jump position reading, obtains multiple slicing files;Wherein, when jumping position reading,
The quantity for jumping position is controlled, and according to tail portion zero padding of the quantity in the binary array for jumping position, two after making zero padding
The digit of system array is the integral multiple for jumping bit quantity;
Condition code, serial number and the end mark position for giving operation for change of current slice file is arranged in S13;
All slicing files distributions are deposited into multiple databases by S14.
Preferably, step S2 specifically:
Identification parameters calculating generation is represented the user by calculating and is moved from the equipment using this by S21, ZK identity pool of blocks
ZKID (i) and DI (i) is confirmed result as this data manipulation by the unique ZKID (i) for making the access data object;
S22, all areas while continuing this data manipulation, into the ZK identity chained list established based on block chain technology
Block node broadcasts confirm result record request;
After all block nodes receive broadcast request in S23, ZKILT, qualified block hash value H (i) is calculated;
In S24, ZKIL all block nodes to H (i) confirm it is errorless after, on the block chain that itself is saved, creation
Block, and H (i) and ZKBI information are recorded wherein;
Qualified hash value is that preceding 10 bytes are necessary for 0 in 32 bytes in step S23.
Preferably, it is calculated in step S21 by hash algorithm;
The method of qualified block hash value H (i) is calculated in step S23 specifically: starting ZKBS service calculates
Block hash value, until wherein some block node ZB (i) calculating produces qualified block hash value H (i).
Preferably, further including block node ZB (i) between step S23 and step S24 broadcasts calculated result H (i) to the whole network
Block information BI is corresponded to it.
Preferably, step S3 specifically:
S31, user or terminal, which issue, directly issues number to ZKISA (ZK Identification Service Agent)
According to acquisition request;
The data information that S32, ZKISA are transmitted when backstage is issued and requested by request of data side is without manual intervention situation
Under parsed, obtain be used for data initiator proof of identification four element of identity;
S33 calculates the identity five elements got, obtains ZKID (n), and regard ZKID (n) and DI (n) as body
Part certificate parameter passes to ZKII;
S34, ZKII retrieve all block informations in ZKIL according to ZKID (n) and DI (n), and inquiry, which whether there is, meets item
The ZB (m) of part then proves that the request of data is lawful acts if there is corresponding ZB (m), and it is dynamic can to continue follow-up data operation
Make;If not having the ZB comprising corresponding information in block, this time request of data is considered as hazardous act.
Preferably, the identity five elements are hardware information, device identification TI (n), action identification AI (n), Yong Hubiao
Know UI (n), target data mark DI (n).
Preferably, further include in the step S34, when the request of data is considered as hazardous act, follow-up data operation row
For that will be prohibited, while this unauthorized access is operated and is recorded by log.
Preferably, when there is the block node that can not temporarily work, the block information saved on other nodes equally can be with
The identity legitimacy of data access initiator is verified.
The beneficial effects of the present invention are:
The present invention provides a kind of method based on serial ports mode data acquisition and local secure storage, from acquisition, acquisition, school
It tests, index, dispatching five links realization piecemeal storing data, breaking original data encryption mindset, by data fragmentation and divide
Cloth storage is to multiple databases, to be to obtain information to the certificate parameter that the identification parameters of data are calculated when storing data
Uniquely tagged, guarantee the safety of acquisition of information so that hacker give for change again data difficulty improve.
Detailed description of the invention
Fig. 1 is the method flow schematic diagram in the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing, to the present invention into
Row is further described.It should be appreciated that the specific embodiments described herein are only used to explain the present invention, it is not used to
Limit the present invention.
English abbreviation letter is explained:
ZK, Zero Knowledge, zero-knowledge proof;
ZKID, Zero Knowledge Identification, Zero Knowledge identity;
ZKIA, Zero Knowledge Identification Analysis, ZK identity resolution management;
ZKISA, ZK Identification Service Agent, Zero Knowledge proof of identification service broker;
ZKII, ZK ID Identification, ZK identification;
ZKILT, Zero Knowledge Identification Link Table, Zero Knowledge identity chained list;
ZKIL, ZK ID Library, ZK identity pool of blocks;
ZKBS, Zero Knowledge Blockchain Service, Zero Knowledge block chain service;
ZKBI, Zero Knowledge Block Information, Zero Knowledge block information;
ZB, ZKIL Block, Zero Knowledge block node;
TI, Terminal ID, device identification;
AI, Action ID, action identification;
UI, User ID, user identifier;
DI, Device Identification, device identification;
Embodiment
The present embodiment provides a kind of data acquisition and local secure storage method based on serial ports mode, this method is based on ZK
ID authentication mechanism bottom authentication service is constructed by C, realize communication intercept and interaction, pass through the industry that Java realizes application layer
Business processing logic, mainly comprises the steps that
S1, ZK identity resolution management: user identity is parsed and is identified since data initial manipulation;
S2 establishes ZK identity pool of blocks: recording body by block chain mode using block chain common recognition and non-repudiation mechanism
Part parsing management information, establishes ZK identity pool of blocks;
S3 identifies ZK identity: on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to user
The legitimacy of identity identifies.
Wherein, in step S1 when legitimate user carries out data fragmentation processing to serial ports mode data, ZKIA passes through parsing,
It obtains and operates associated five elements: hardware information, device identification TI (i) (Terminal ID), action identification AI (i)
(Action ID), user identifier UI (i) (User ID), target data mark DI (i) (Data ID), then ZKIA is called
Four elements are passed to ZK identity pool of blocks by ZKIL.
Include: when carrying out fragment processing to serial data
S11 parses source data, generates binary array;
S12 carries out the binary array of generation to jump position reading, obtains multiple slicing files;Wherein, when jumping position reading,
The quantity for jumping position is controlled, and according to tail portion zero padding of the quantity in the binary array for jumping position, two after making zero padding
The digit of system array is the integral multiple for jumping bit quantity;
Condition code, serial number and the end mark position for giving operation for change of current slice file is arranged in S13;
All slicing files distributions are deposited into multiple databases by S14.
Step S2 specifically: ZK identity pool of blocks by calculate by each identification parameters calculate generate represent the user from this
Equipment accesses unique ZKID (i) of the data object using the movement, and ZKID (i) and DI (i) is true as this data manipulation
Recognize result;All block sections while continuing this data manipulation, into the ZK identity chained list established based on block chain technology
Point broadcast acknowledgements result record request;After all block nodes receive broadcast request in ZK identity pool of blocks, calculates and meet item
The block hash value H (i) of part;ZB (i) corresponds to block information BI with it to the whole network broadcast calculated result H (i);Own in the library ZKIL
Block node to H (i) confirm it is errorless after, on the block chain that itself is saved, create block, and H (i) and BI information are remembered
Record is wherein;
Qualified hash value is that preceding 10 bytes are necessary for 0 in 32 bytes (256 characters).
When needing to obtain data, does not need user and carry out Password Input behavior, user or terminal issue directly to ZKISA
(ZK Identification Service Agent) issues data acquisition request;
The data information that ZK proof of identification service broker transmits when backstage is issued and requested by request of data side is without people
It is parsed in the case of work intervention, obtains the identity five elements for being used for data initiator proof of identification: hardware information, device identification
TI (n), action identification AI (n), user identifier UI (n), target data mark DI (n);
Four element of identity got is calculated, is obtained ZKID (n), and ZKID (n) and DI (n) are tested as identity
Card parameter passes to ZKII;
ZKII retrieves all block informations in ZKIL according to authentication parameter ZKID (n) and DI (n), and whether inquiry deposits
Then prove that the request of data is lawful acts, Ke Yiji if there is corresponding block ZB (m) in qualified block ZB (m)
Continuous follow-up data operational motion;If not having the ZB comprising corresponding information in block, this time request of data is considered as dangerous row
For follow-up data operation behavior will be prohibited, while operate to this unauthorized access and being recorded by log.
It is worth noting that, the block chain used in this method is because of the common recognition account book characteristic of its own, that is, on block chain
The block information that each block includes is identical, even certain block nodes can not work, as long as being not less than 51% block
Still available, then other nodes all can serve as the node of verifying identity legitimacy, it equally can be to data access initiator
Identity legitimacy verified.
By using above-mentioned technical proposal disclosed by the invention, following beneficial effect has been obtained:
The present invention provides a kind of method based on serial ports mode data acquisition and local secure storage, from acquisition, acquisition, school
It tests, index, dispatching five links realization piecemeal storing data, breaking original data encryption mindset, by data fragmentation and divide
Cloth storage is to multiple databases, to be to obtain information to the certificate parameter that the identification parameters of data are calculated when storing data
Uniquely tagged, guarantee the safety of acquisition of information so that hacker give for change again data difficulty improve.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
Depending on protection scope of the present invention.
Claims (10)
1. it is a kind of based on serial ports mode data acquisition and local secure storage method, which is characterized in that the method includes with
Lower step:
S1, ZK identity resolution management: user identity is parsed and is known when the data initial manipulation based on serial ports mode starts
Not;
S2 establishes ZK identity pool of blocks: recording identity solution by block chain mode using block chain common recognition and non-repudiation mechanism
Management information is analysed, ZK identity pool of blocks is established;
S3 identifies ZK identity: on the basis of the ZK identity pool of blocks, by transparent and exempt from close mode and realize to user identity
Legitimacy identification.
2. data acquisition according to claim 1 and local secure storage method, which is characterized in that step S1 specifically:
It include data fragmentation and solution when data of the legitimate user to serial ports mode are handled in data initial operation
Data after analysing fragment;The identification parameters of data are obtained after parsing and are passed to the ZK identity pool of blocks;
The identification parameters include five elements relevant to operation: hardware information, information equipment identify TI (i), action identification AI
(i), user identifier UI (i) and target data mark DI (i).
3. data acquisition according to claim 2 and local secure storage method, which is characterized in that based on serial ports mode
Data carry out fragment method include:
S11 parses source data, generates binary array;
S12 carries out the binary array of generation to jump position reading, obtains multiple slicing files;Wherein, when jumping position reading, to jump
The quantity of position is controlled, and the binary system according to tail portion zero padding of the quantity in the binary array for jumping position, after making zero padding
The digit of array is the integral multiple for jumping bit quantity;
Condition code, serial number and the end mark position for giving operation for change of current slice file is arranged in S13.
4. data acquisition according to claim 1 and local secure storage method, which is characterized in that step S2 specifically:
Identification parameters calculating generation is represented the user by calculating and is visited from the equipment using the movement by S21, ZK identity pool of blocks
ZKID (i) and DI (i) is confirmed result as this data manipulation by the unique ZKID (i) for asking the data object;
S22, all block sections while continuing this data manipulation, into the ZK identity chained list established based on block chain technology
Point broadcast acknowledgements result record request;
After all block nodes receive broadcast request in S23, ZKILT, qualified block hash value H (i) is calculated;
In S24, ZKIL all block nodes to H (i) confirm it is errorless after, on the block chain that itself is saved, create block,
And H (i) and ZKBI information are recorded wherein;
Qualified hash value is that preceding 10 bytes are necessary for 0 in 32 bytes in step S23.
5. data acquisition according to claim 4 and local secure storage method, which is characterized in that pass through in step S21
Hash algorithm is calculated;
The method of qualified block hash value H (i) is calculated in step S23 specifically: starting ZKBS service, calculation block
Hash value, until wherein some block node ZB (i) calculating produces qualified block hash value H (i).
6. data acquisition according to claim 4 and local secure storage method, which is characterized in that step S23 and step
Further include block node ZB (i) between S24 to the whole network broadcast calculated result H (i) and its correspond to block information BI.
7. data acquisition according to claim 1 and local secure storage method, which is characterized in that step S3 specifically:
S31, user or terminal, which issue, directly issues data acquisition request to ZKISA;
The data information that S32, ZK proof of identification service broker transmit when backstage is issued and requested by request of data side is without people
It is parsed in the case of work intervention, obtains four element of identity for being used for data initiator proof of identification;
S33 calculates the identity five elements got, obtains ZKID (n), and ZKID (n) and DI (n) are tested as identity
Card parameter passes to ZKII;
S34, ZKII retrieve all block informations in ZKIL, inquiry is with the presence or absence of qualified according to ZKID (n) and DI (n)
ZB (m) then proves that the request of data is lawful acts, can continue follow-up data operational motion if there is corresponding ZB (m);
If not having the ZB comprising corresponding information in block, this time request of data is considered as hazardous act.
8. data acquisition according to claim 7 and local secure storage method, which is characterized in that the identity five is wanted
Element is hardware information, device identification TI (n), action identification AI (n), user identifier UI (n), target data mark DI (n).
9. data acquisition according to claim 7 and local secure storage method, which is characterized in that in the step S34
It further include that when the request of data is considered as hazardous act, follow-up data operation behavior will be prohibited, while to this unauthorized access
Operation is recorded by log.
10. data according to claim 7 acquisition and local secure storage method, which is characterized in that when exist temporarily without
The block node of method work, the block information saved on other nodes, equally can identity to data access initiator it is legal
Property is verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910228131.8A CN109947777A (en) | 2019-03-25 | 2019-03-25 | A kind of data acquisition and local secure storage method based on serial ports mode |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910228131.8A CN109947777A (en) | 2019-03-25 | 2019-03-25 | A kind of data acquisition and local secure storage method based on serial ports mode |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109947777A true CN109947777A (en) | 2019-06-28 |
Family
ID=67011472
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910228131.8A Pending CN109947777A (en) | 2019-03-25 | 2019-03-25 | A kind of data acquisition and local secure storage method based on serial ports mode |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109947777A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108389046A (en) * | 2018-02-07 | 2018-08-10 | 西安交通大学 | Secret protection method of commerce based on block chain technology in a kind of e-commerce |
CN108712264A (en) * | 2018-06-12 | 2018-10-26 | 陈继 | A kind of identity identifying method based on zero-knowledge proof |
CN108710702A (en) * | 2018-05-25 | 2018-10-26 | 吴卓航 | A method of data safety storage is realized based on frament reassembling technology |
WO2018205729A1 (en) * | 2017-05-11 | 2018-11-15 | 上海点融信息科技有限责任公司 | Blockchain data processing based on zero-knowledge proof |
CN109189857A (en) * | 2018-09-17 | 2019-01-11 | 北京京东尚科信息技术有限公司 | Data-sharing systems, method and apparatus based on block chain |
-
2019
- 2019-03-25 CN CN201910228131.8A patent/CN109947777A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018205729A1 (en) * | 2017-05-11 | 2018-11-15 | 上海点融信息科技有限责任公司 | Blockchain data processing based on zero-knowledge proof |
CN108389046A (en) * | 2018-02-07 | 2018-08-10 | 西安交通大学 | Secret protection method of commerce based on block chain technology in a kind of e-commerce |
CN108710702A (en) * | 2018-05-25 | 2018-10-26 | 吴卓航 | A method of data safety storage is realized based on frament reassembling technology |
CN108712264A (en) * | 2018-06-12 | 2018-10-26 | 陈继 | A kind of identity identifying method based on zero-knowledge proof |
CN109189857A (en) * | 2018-09-17 | 2019-01-11 | 北京京东尚科信息技术有限公司 | Data-sharing systems, method and apparatus based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11336455B2 (en) | Consensus protocol for blockchain DAG structure | |
AU2017269734B2 (en) | Cryptologic rewritable blockchain | |
CN115210741B (en) | Partially ordered blockchain | |
CN112507391B (en) | Block chain-based electronic signature method, system, device and readable storage medium | |
CN110826111B (en) | Test supervision method, device, equipment and storage medium | |
JP2023501152A (en) | Random node selection for permissioned blockchains | |
Lee et al. | Modifiable public blockchains using truncated hashing and sidechains | |
SE541713C2 (en) | Method and system for registering digital documents | |
CN113495920B (en) | Content auditing system, method and device based on blockchain and storage medium | |
CN101004805A (en) | Digital document management system, digital document management method, and digital document management program | |
CN108880820B (en) | Code management method and device | |
CN114372296B (en) | Block chain-based user behavior data auditing method and system | |
JP2022541048A (en) | Security layer for configuring blockchain | |
CN111881109B (en) | Database mergeable ledgers | |
JP2023513420A (en) | Index structure for blockchain ledger | |
CN115345618B (en) | Block chain transaction verification method and system based on mixed quantum digital signature | |
CN112052474A (en) | Blu-ray copy service | |
JP2023530594A (en) | Permitted Event Processing in Distributed Databases | |
CN111817859A (en) | Data sharing method, device, equipment and storage medium based on zero knowledge proof | |
CN110555682B (en) | Multi-channel implementation method based on alliance chain | |
CN103647650A (en) | Rule definition based automatic signature/signature verification device and method | |
CN109947777A (en) | A kind of data acquisition and local secure storage method based on serial ports mode | |
JP2023520634A (en) | Maintaining contextual integrity | |
CN111125745A (en) | Block chain-based data management system for Internet | |
CN112634040B (en) | Data processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190628 |