CN110321720A - A kind of across the chain interaction of isomery and authentication method of block chain - Google Patents

A kind of across the chain interaction of isomery and authentication method of block chain Download PDF

Info

Publication number
CN110321720A
CN110321720A CN201910413302.4A CN201910413302A CN110321720A CN 110321720 A CN110321720 A CN 110321720A CN 201910413302 A CN201910413302 A CN 201910413302A CN 110321720 A CN110321720 A CN 110321720A
Authority
CN
China
Prior art keywords
data
isomery
block chain
chain
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910413302.4A
Other languages
Chinese (zh)
Inventor
马成龙
金兆康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yibi Technology Co Ltd
Original Assignee
Hangzhou Yibi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yibi Technology Co Ltd filed Critical Hangzhou Yibi Technology Co Ltd
Priority to CN201910413302.4A priority Critical patent/CN110321720A/en
Publication of CN110321720A publication Critical patent/CN110321720A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Across the chain interaction of isomery and authentication method the invention discloses a kind of block chain, encryption, the processing of isomery multichain parallel method, the processing of block chain including data, wherein, data encryption processing is using Encryption Algorithm and common recognition algorithm, data after encryption are handled through isomery multichain parallel method to be respectively allocated in different block chains, the division of block and the signature of data are carried out in block chain, complete the certification of data.Across the chain interaction of isomery of block chain of the invention and authentication method ensure that the safety of transaction data, have safety, the wide advantage of practicability.

Description

A kind of across the chain interaction of isomery and authentication method of block chain
Technical field
The present invention relates to a kind of interaction and authentication methods, and in particular to a kind of across the chain interaction of isomery of block chain and authenticating party Method.
Background technique
In the problems that block chain is faced, intercommunity high degree limits answering for block chain between block chain With landing.Way of the tradition across chain interaction is that multi-source data is decimated next from each chain, then unifies to provide data interaction clothes Business, certainly exists the process of extraction, cleaning, conversion, merging, integration cost is quite high, with the urgency of data on chain quantity and chain Increase severely and add, it is actually very difficult to carry out large batch of data interaction.
Realized value interconnection therefore, it is necessary to establish across the chain interaction technique of on-demand isomery, be block chain to The bridge of outer expansion and connection.
Summary of the invention
The technical problem to be solved in the present invention is that for the above-mentioned deficiency of the prior art, a kind of the different of block chain is provided Across the chain interaction of structure and authentication method.
The present invention through the following technical solutions to achieve the above objectives: a kind of block chain across the chain interaction of isomery and authenticating party Method, in which: the following steps are included:
Step 1: data are encrypted by algorithm, encrypted data are obtained, under waiting by the encryption of data The processing of one step;
Step 2: the processing of isomery multichain parallel method, data encrypted in step 1 system is parallel using isomery multichain Method is handled, and is waited and being handled in next step;
Step 3: block chain is handled, and the data in step 2 are respectively allocated in a plurality of different block chain, each group of data The signature of distribution and data in block chain through block completes certification.
As a further optimization solution of the present invention, in step 1, data encryption processing includes Encryption Algorithm processing, common recognition Algorithm process.
As a further optimization solution of the present invention, the processing of isomery multichain parallel method includes data interaction plan in step 2 Slightly processing is handled with data check strategy.
As a further optimization solution of the present invention, in step 3, the data information in each block chain is interrelated.
Further, Encryption Algorithm uses Advanced Encryption Standardalgorithm in Encryption Algorithm processing, in algorithm process of knowing together altogether Know algorithm and uses Byzantine failure tolerance algorithm.
The beneficial effects of the present invention are:
It is handled by using isomery multichain parallel method, realizing different chains can be using different common recognition mechanism, together Shi Binghang does not conflict mutually;
It is handled by using data interaction strategy, realizes tidal data recovering, the interaction of each subchain of block chain.
It handles, is realized according to cryptographic Hash compared with being stored in local Merkel tree by using data check strategy, All transaction are verified, ensure that the safety of data.
Detailed description of the invention
Fig. 1 is the flow diagram of isomery across the chain interaction and authentication method of a kind of block chain of the invention;
Fig. 2 is the flow diagram of the specific embodiment of Fig. 1.
Specific embodiment
The application is described in further detail with reference to the accompanying drawing, it is necessary to it is indicated herein to be, implement in detail below Mode is served only for that the application is further detailed, and should not be understood as the limitation to the application protection scope, the field Technical staff can make some nonessential modifications and adaptations to the application according to above-mentioned application content.
Embodiment 1
Across the chain interaction of isomery and authentication method of a kind of block chain as shown in Figure 1, comprising the following steps:
Step 1: data are encrypted by algorithm, encrypted data are obtained, under waiting by the encryption of data The processing of one step;
Step 2: the processing of isomery multichain parallel method, data encrypted in step 1 system is parallel using isomery multichain Method is handled, and is waited and being handled in next step;
Step 3: block chain is handled, and the data in step 2 are respectively allocated in a plurality of different block chain, each group of data The signature of distribution and data in block chain through block completes certification.
As shown in Fig. 2, including data A, data B, tetra- groups of data C, data D data in the present embodiment, by data A, data B, data C, data D be respectively adopted Encryption Algorithm with common recognition algorithm encrypted, obtain encrypted Data Data A, data B, Data C, data D handle the data A after being encrypted, data B, data C, data D using isomery multichain parallel method, wherein Processing including data interaction strategy, the processing of data check strategy, treated data A, data B, data C, data D difference Distribution into block chain A, block chain B, block chain C, block chain D, in block chain A, block chain B, block chain C, block chain D into Data A, data B, data C, data D are divided to block A, block B, block C, block D by the division of row block, finally to data It signs, generates signature A, signature B, signature C, signature D, complete the certification of data.
Embodiment 2
Across the chain interaction of isomery and authentication method of a kind of block chain as described in Example 1 are distinguished and are only that, step 1 In, data encryption is handled including Encryption Algorithm processing, common recognition algorithm process, and wherein Encryption Algorithm uses height in Encryption Algorithm processing Grade Encryption Standard algorithm, know together algorithm process in common recognition algorithm use use Byzantine failure tolerance algorithm.
Embodiment 3
Across the chain interaction of isomery and authentication method of a kind of block chain as described in Example 1 are distinguished and are only that, step 2 Middle isomery multichain parallel method processing includes that the processing of data interaction strategy is handled with data check strategy, by using data interaction Strategy processing, realizes tidal data recovering, the interaction of each subchain of block chain;It is handled by using data check strategy, realizes root According to cryptographic Hash compared with being stored in local Merkel tree, all transaction are verified, ensure that the safety of data.
Embodiment 4
Across the chain interaction of isomery and authentication method of a kind of block chain as described in Example 1 are distinguished and are only that, this implementation In example, in step 3, the data information in each block chain is interrelated.
The above-described embodiments are merely illustrative of preferred embodiments of the present invention, not to structure of the invention Think and range is defined.Without departing from the design concept of the invention, ordinary people in the field is to technology of the invention The all variations and modifications that scheme is made, should all drop into protection scope of the present invention, the claimed technology contents of the present invention, It is all described in the claims.

Claims (5)

1. a kind of across the chain interaction of isomery of block chain and authentication method, it is characterised in that: the following steps are included:
Step 1: the encryption of data encrypts data by algorithm, obtains encrypted data, waits in next step Processing;
Step 2: data encrypted in step 1 system is used isomery multichain parallel method by the processing of isomery multichain parallel method It is handled, waits and handling in next step;
Step 3: block chain is handled, and the data in step 2 are respectively allocated in a plurality of different block chain, and each group of data is in area The signature of distribution and data in block chain through block completes certification.
2. a kind of across the chain interaction of isomery and authentication method of block chain as described in claim 1, it is characterised in that: step 1 In, data encryption processing includes Encryption Algorithm processing, common recognition algorithm process.
3. a kind of across the chain interaction of isomery and authentication method of block chain as claimed in claim 2, it is characterised in that: in step 2 The processing of isomery multichain parallel method includes that the processing of data interaction strategy is handled with data check strategy.
4. a kind of across the chain interaction of isomery and authentication method of block chain as described in claim 1, it is characterised in that: step 3 In, the data information in each block chain is interrelated.
5. a kind of across the chain interaction of isomery and authentication method of block chain as claimed in claim 2, it is characterised in that: Encryption Algorithm Encryption Algorithm uses Advanced Encryption Standardalgorithm in processing, and common recognition algorithm uses Byzantine failure tolerance algorithm in algorithm process of knowing together.
CN201910413302.4A 2019-05-17 2019-05-17 A kind of across the chain interaction of isomery and authentication method of block chain Pending CN110321720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910413302.4A CN110321720A (en) 2019-05-17 2019-05-17 A kind of across the chain interaction of isomery and authentication method of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910413302.4A CN110321720A (en) 2019-05-17 2019-05-17 A kind of across the chain interaction of isomery and authentication method of block chain

Publications (1)

Publication Number Publication Date
CN110321720A true CN110321720A (en) 2019-10-11

Family

ID=68113142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910413302.4A Pending CN110321720A (en) 2019-05-17 2019-05-17 A kind of across the chain interaction of isomery and authentication method of block chain

Country Status (1)

Country Link
CN (1) CN110321720A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111262860A (en) * 2020-01-16 2020-06-09 航天信息股份有限公司 Identity authentication method and device in cross-link mode

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
CN108305056A (en) * 2018-03-27 2018-07-20 搜游网络科技(北京)有限公司 Data processing method, device based on block chain and block chain meshed network
CN108881177A (en) * 2018-05-28 2018-11-23 夸克链科技(深圳)有限公司 A kind of parallel block chain of isomery and its technology are realized
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
CN108305056A (en) * 2018-03-27 2018-07-20 搜游网络科技(北京)有限公司 Data processing method, device based on block chain and block chain meshed network
CN108881177A (en) * 2018-05-28 2018-11-23 夸克链科技(深圳)有限公司 A kind of parallel block chain of isomery and its technology are realized
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111262860A (en) * 2020-01-16 2020-06-09 航天信息股份有限公司 Identity authentication method and device in cross-link mode
CN111262860B (en) * 2020-01-16 2022-10-11 航天信息股份有限公司 Identity authentication method and device in cross-link mode

Similar Documents

Publication Publication Date Title
CN108564471B (en) Energy Internet safety intelligent transaction system based on block chain technology and method thereof
CN106603233B (en) Encryption and decryption method for remote bid opening type bidding system
CN109413174B (en) Cross-department marine data sharing method based on block chain
CN106372533A (en) Block chain technology-based content storage method
CN111899002A (en) Method for efficiently performing cross-chain information transaction interaction in block chain
CN108200208A (en) Logistics block chain common recognition algorithm based on cloud computing
CN108038184A (en) A kind of date storage method and system based on block chain, a kind of intelligent block chain
CN113779607A (en) Industrial data asset management method, system and equipment
CN104717070B (en) A method of being associated with digital certificate using one-way Hash function
CN110321720A (en) A kind of across the chain interaction of isomery and authentication method of block chain
CN109934598A (en) Block chain tobacco traceability anti-fake system
CN111652617B (en) Service processing system of cross-block chain platform
CN102567802A (en) Method and device for signing of electronic contracts in security
CN110611661A (en) Acquired information sharing method and system based on double-authentication multiple-protection measures
CN111797171A (en) Data synchronization system based on block chain cross-chain technology
CN113902384A (en) Tracing method and system based on RFID and intelligent contract
CN115733607A (en) Block chain-based Pedersen secret sharing multi-party aggregation access control method
CN113098693B (en) Memory verification method based on physical unclonable function algorithm
CN106991332A (en) The method and device that a kind of mass data is stored safely
CN102622685A (en) Identity identification method for steel product trading system
CN116527412B (en) Cross-region data interaction method, device, equipment and medium for scheduling data chain
CN116567631B (en) Mobile terminal security authentication method based on segmented block chain
CN113177092A (en) Ship manufacturing inspection data sharing method, alliance chain and system
CN102833754A (en) Digital certificate based mobile equipment trusted access method
CN110324149A (en) A kind of multi-party fixed verification method of the evidence after signing of knowing together

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191011