CN110324148A - It is a kind of most according to routing signature distribution method based on block chain - Google Patents

It is a kind of most according to routing signature distribution method based on block chain Download PDF

Info

Publication number
CN110324148A
CN110324148A CN201910413306.2A CN201910413306A CN110324148A CN 110324148 A CN110324148 A CN 110324148A CN 201910413306 A CN201910413306 A CN 201910413306A CN 110324148 A CN110324148 A CN 110324148A
Authority
CN
China
Prior art keywords
data
block chain
algorithm
signature
routing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910413306.2A
Other languages
Chinese (zh)
Other versions
CN110324148B (en
Inventor
马成龙
金兆康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yibi Technology Co Ltd
Original Assignee
Hangzhou Yibi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yibi Technology Co Ltd filed Critical Hangzhou Yibi Technology Co Ltd
Priority to CN201910413306.2A priority Critical patent/CN110324148B/en
Publication of CN110324148A publication Critical patent/CN110324148A/en
Application granted granted Critical
Publication of CN110324148B publication Critical patent/CN110324148B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

It is most according to routing signature distribution method based on block chain that the invention discloses a kind of, encryption including data source, majority is according to routing signature distribution method processing, area is handled according to chain, distribution return, it is wherein most to use the transmitting to data source according to routing signature distribution method processing, calculating of the function routing to data source, possession, which routes, distributes the ownership place of data source, the processing of block chain uses verification algorithm, common recognition algorithm, processing of the signature algorithm to data, finally it is distributed return, it is of the invention based on block chain it is most according to routing signature distribution method solve all sides of data can not select data multithread to, data side does not have the problem of Channel Selection sexual openness data, with Information Security height, the high advantage of data flow tropism.

Description

It is a kind of most according to routing signature distribution method based on block chain
Technical field
The present invention relates to a kind of distribution methods, and in particular to a kind of most according to routing signature distributor based on block chain Method.
Background technique
In traditional data route technology, rarely platform has the ability to provide the data routing means based on block chain, quick The flow direction of sense data, use can not be audited and be supervised, and result in sensitive data leakage, as information-based construction deepens continuously, The especially confidential informations leakage such as enterprises research and development data, intellectual property file, denial of the client to signature are pacified to company information Great threat is brought entirely.It is stored therefore, it is necessary to a kind of based on the multirouting of block chain signature discharge device, as subsequent Analyze the foundation of retrospect.
Summary of the invention
The technical problem to be solved in the present invention is that being provided a kind of based on block chain for the above-mentioned deficiency of the prior art Most sign distribution method according to routing.
The present invention is through the following technical solutions to achieve the above objectives: a kind of most according to routing signature point based on block chain Forwarding method, in which: the following steps are included:
Step 1: it is opposite with data source that Encryption Algorithm processing generation is respectively adopted to multiple data sources in the encryption of data source The upper chain logo answered, multiple data sources and upper chain logo, which wait, to be distributed;
Step 2: it is most according to routing signature distribution method processing, the upper chain logo in step 1 is sent at most with data source In data routing signature diostribution device, majority is according to routing signature diostribution device by data analyzing system to data source and cochain mark Will carries out data parsing, generates data A, data B, data C, data A, data B, data C etc. are to be allocated;
Step 3: area is handled according to chain, by data A, data B, the data C in step 2 be respectively allocated to block chain network A, Algorithm process is carried out in block chain network B, block chain network C, generates retrieval symbol A, retrieval symbol B, retrieval symbol C;
Step 4: distribution return, block chain network A, block chain network B, respectively will be raw in step 3 in block chain network C At retrieval symbol A, retrieval symbol B, retrieval symbol C be distributed return, it is most to receive receipt according to routing signature diostribution device, Complete signature distribution.
As a further optimization solution of the present invention, block chain network A, block chain network B, block chain network in step 3 It includes the processing of verification algorithm, know together algorithm, signature algorithm that C, which uses algorithm process,.
Further, verification algorithm is Merkel's tree algorithm, common recognition algorithm is practical Byzantine failure tolerance algorithm, signature algorithm For elliptic curve digital signature algorithm.
As a further optimization solution of the present invention, in step 2 data parsing include data routing to the transmitting of data, Function routing routes the calculating of data, possession and distributes the ownership place of data.
The beneficial effects of the present invention are:
By carrying out Encryption Algorithm processing to data source, show that data are corresponding and uniquely go up chain logo, guarantee data Safety;
According to the connection of network flow and each node, load state and it can arrive user's in real time by data routing The integrated informations such as distance and response time re-direct the request of user on the service node nearest from user.
After analyzing function field data, data can be routed to automatically the differences such as notarization, arbitration, law court by function routing On functional field chain.
Possession field data can be grabbed by possession routing, realizes that data route to the proprietary property location of data Or on the chain where habitual residence.
By the way that Merkel tree verification algorithm is arranged, the retrospect to data is realized, according to the state under different blocks, energy Conveniently inquire the historical information of account under block at that time.
It is known together algorithm by the way that practical Byzantine failure tolerance is arranged, can do evil in a small number of nodes and reach common understanding in scene, it is adopted Ensure the tamper-resistance properties in message process with cryptographic algorithms such as signature, signature verification, Hash, anti-counterfeiting, can not support Lai Xing.
By the way that elliptic curve is arranged
Digital Signature Algorithm realizes speed faster, and intensity is higher, and shorter advantage of signing is very suitable to distributed ring Signature scene under border.
Detailed description of the invention
Fig. 1 is a kind of most flow diagrams according to routing signature distribution method based on block chain of the invention;
Fig. 2 is the specific embodiment flow diagram of Fig. 1.
Specific embodiment
The application is described in further detail with reference to the accompanying drawing, it is necessary to it is indicated herein to be, implement in detail below Mode is only
For the application to be further detailed, it should not be understood as the limitation to the application protection scope, the field Technical staff some nonessential modifications and adaptations can be made to the application according to above-mentioned application content.
Embodiment 1
As shown in Figure 1 is a kind of most according to routing signature distribution method based on block chain, comprising the following steps:
Step 1: it is opposite with data source that Encryption Algorithm processing generation is respectively adopted to multiple data sources in the encryption of data source The upper chain logo answered, multiple data sources and upper chain logo, which wait, to be distributed;
Step 2: it is most according to routing signature distribution method processing, the upper chain logo in step 1 is sent at most with data source In data routing signature diostribution device, majority is according to routing signature diostribution device by data analyzing system to data source and cochain mark Will carries out data parsing, generates data A, data B, data C, data A, data B, data C etc. are to be allocated;
Step 3: area is handled according to chain, by data A, data B, the data C in step 2 be respectively allocated to block chain network A, Algorithm process is carried out in block chain network B, block chain network C, generates retrieval symbol A, retrieval symbol B, retrieval symbol C;
Step 4: distribution return, block chain network A, block chain network B, respectively will be raw in step 3 in block chain network C At retrieval symbol A, retrieval symbol B, retrieval symbol C be distributed return, it is most to receive receipt according to routing signature diostribution device, Complete signature distribution.
As shown in Fig. 2, data source A, data source B, data source C, data source D carry out Encryption Algorithm processing respectively, generate with The corresponding upper chain logo A of data source A, data source B, data source C, data source D, upper chain logo B, upper chain logo C, upper chain logo D, Data source A, data source B, data source C, data source D and upper chain logo A, upper chain logo B, upper chain logo C, upper chain logo D are sent At most data, which route, uses majority to distribute dress according to signature is routed according to distribution method processing of signing, majority is routed in signature diostribution device It sets to data source A, data source B, data source C, data source D and upper chain logo A, upper chain logo B, upper chain logo C, upper chain logo D Carry out data parsing, including data route processing, can only route processing, possession route processing, generate data A, data B, Data A, data B, data C are distributed and are carried out algorithm into block chain network A, block chain network B, block chain network C by data C Processing generates retrieval symbol A, retrieval symbol B, inspection including card algorithm process, common recognition algorithm process, signature algorithm processing Retrieval symbol A, retrieval symbol B, retrieval symbol C and retrieval status are sent to most evidences by rope mark C, final block chain network In routing signature diostribution device.
Majority based on block chain of the invention, which solves all sides of data according to routing signature distribution method, can not select number According to multithread to data side does not have the problem of Channel Selection sexual openness data, high excellent of, data flow tropism high with Information Security Point.
Embodiment 2
As described in Example 1 is a kind of most according to routing signature distribution method based on block chain, and difference is only that, step Block chain network A, block chain network B, block chain network C include verification algorithm, common recognition algorithm, label using algorithm process in rapid three The processing of name algorithm.And verification algorithm is Merkel's tree algorithm, common recognition algorithm is practical Byzantine failure tolerance algorithm, signature algorithm is Elliptic curve digital signature algorithm.
Embodiment 3
As described in Example 1 is a kind of most according to routing signature distribution method based on block chain, and difference is only that, this In embodiment, data parsing includes transmitting, the functional calculating that routes to data, possession road of the data routing to data in step 2 By the ownership place distribution to data.
The above-described embodiments are merely illustrative of preferred embodiments of the present invention, not to structure of the invention Think and range is defined.Without departing from the design concept of the invention, ordinary people in the field is to technology of the invention The all variations and modifications that scheme is made, should all drop into protection scope of the present invention, the claimed technology contents of the present invention, It is all described in the claims.

Claims (3)

1. a kind of most according to routing signature distribution method based on block chain, it is characterised in that: the following steps are included:
Step 1: it is corresponding with data source that Encryption Algorithm processing generation is respectively adopted to multiple data sources in the encryption of data source Upper chain logo, multiple data sources and upper chain logo, which wait, to be distributed;
Step 2: it is most according to routing signature distribution method processing, the upper chain logo in step 1 is sent at most data with data source In routing signature diostribution device, it is most according to routing signature diostribution device by data analyzing system to data source and upper chain logo into The parsing of row data, generates data A, data B, data C, data A, data B, data C etc. are to be allocated;
Step 3: area is handled according to chain, and data A, data B, the data C in step 2 are respectively allocated to block chain network A, block Algorithm process is carried out in chain network B, block chain network C, generates retrieval symbol A, retrieval symbol B, retrieval symbol C;
Step 4: block chain network A, block chain network B, distribution return will generate in block chain network C in step 3 respectively Retrieval symbol A, retrieval symbol B, retrieval symbol C are distributed return, most to receive receipt according to routing signature diostribution device, complete Signature distribution.
2. as described in claim 1 a kind of most according to routing signature distribution method based on block chain, it is characterised in that: step Block chain network A, block chain network B, block chain network C include verification algorithm processing, common recognition algorithm using algorithm process in three Processing, signature algorithm processing.
3. as claimed in claim 2 a kind of most according to routing signature distribution method based on block chain, it is characterised in that: verifying Algorithm is Merkel's tree algorithm, common recognition algorithm is practical Byzantine failure tolerance algorithm, signature algorithm is that digital signature of elliptic curve is calculated Method.
CN201910413306.2A 2019-05-17 2019-05-17 Multi-data routing signature distribution method based on block chain Active CN110324148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910413306.2A CN110324148B (en) 2019-05-17 2019-05-17 Multi-data routing signature distribution method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910413306.2A CN110324148B (en) 2019-05-17 2019-05-17 Multi-data routing signature distribution method based on block chain

Publications (2)

Publication Number Publication Date
CN110324148A true CN110324148A (en) 2019-10-11
CN110324148B CN110324148B (en) 2022-05-10

Family

ID=68113139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910413306.2A Active CN110324148B (en) 2019-05-17 2019-05-17 Multi-data routing signature distribution method based on block chain

Country Status (1)

Country Link
CN (1) CN110324148B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework
US20190044714A1 (en) * 2017-08-04 2019-02-07 Truss Financial, LLC Secure data distribution protocol using blockchains
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222482A (en) * 2017-06-01 2017-09-29 黑龙江卓亚科技有限公司 A kind of data management system and method based on compound block chain network
US20190044714A1 (en) * 2017-08-04 2019-02-07 Truss Financial, LLC Secure data distribution protocol using blockchains
CN108876370A (en) * 2018-06-12 2018-11-23 北京航空航天大学 The architectural framework of the shared open data of transregional piece of chain under a kind of isomery multichain framework
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network

Also Published As

Publication number Publication date
CN110324148B (en) 2022-05-10

Similar Documents

Publication Publication Date Title
Han et al. An efficient key distribution system for data fusion in V2X heterogeneous networks
CN109918878B (en) Industrial Internet of things equipment identity authentication and safe interaction method based on block chain
Wang et al. Offloading in internet of vehicles: A fog-enabled real-time traffic management system
CN112532705B (en) Smart city service system based on big data
CN106503995A (en) A kind of data sharing method, source node, destination node and system
US10505708B2 (en) Blockchain transaction speeds using global acceleration nodes
Rawat et al. Blockchain enabled named data networking for secure vehicle-to-everything communications
US11042535B2 (en) Accelerating transaction deliveries in blockchain networks using acceleration nodes
Singh et al. BIIoVT: Blockchain-based secure storage architecture for intelligent internet of vehicular things
Chaeikar et al. AI-enabled cryptographic key management model for secure communications in the internet of vehicles
CN111311932B (en) Intelligent traffic light timing method based on vehicle networking block chain
CN114390051B (en) Logistics edge gateway-based data management equipment and control method thereof
CN106685903A (en) Data transmission method based on SDN, SDN controller and SDN system
Zhao et al. Authentication scheme based on hashchain for space-air-ground integrated network
Sajid et al. Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor‐Based Systems Using Blockchain
CN111342952B (en) Safe and efficient quantum key service method and system
Ali et al. VABLOCK: A blockchain-based secure communication in V2V network using icn network support technology
CN115884110B (en) Method and system for judging short message verification code
Jamjoom et al. [Retracted] Lightweight Authenticated Privacy‐Preserving Secure Framework for the Internet of Vehicles
US20220398683A1 (en) Method for supporting sharing of travel history of travelers in airports
Javed et al. Secure message handling in vehicular energy networks using blockchain and artificially intelligent IPFS
CN110324148A (en) It is a kind of most according to routing signature distribution method based on block chain
Dungan et al. Blockchain-based solutions for smart mobility sustainability assurance
Agarwal et al. Forecasting-based Authentication Schemes for Network Resource Management in Vehicular Communication Network
CN115277690A (en) Industrial data supervisory systems based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant