CN111131412B - Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation - Google Patents

Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation Download PDF

Info

Publication number
CN111131412B
CN111131412B CN201911260879.2A CN201911260879A CN111131412B CN 111131412 B CN111131412 B CN 111131412B CN 201911260879 A CN201911260879 A CN 201911260879A CN 111131412 B CN111131412 B CN 111131412B
Authority
CN
China
Prior art keywords
mobile terminal
calculation
operator
cloud server
computation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911260879.2A
Other languages
Chinese (zh)
Other versions
CN111131412A (en
Inventor
贺伟
史楠迪
汪昌帅
张小虎
严永峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Electronic Commerce Co Ltd
Original Assignee
Tianyi Electronic Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Electronic Commerce Co Ltd filed Critical Tianyi Electronic Commerce Co Ltd
Priority to CN201911260879.2A priority Critical patent/CN111131412B/en
Publication of CN111131412A publication Critical patent/CN111131412A/en
Application granted granted Critical
Publication of CN111131412B publication Critical patent/CN111131412B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a 5G mobile terminal computing node method, a system, a mobile terminal and a cloud server, wherein when the 5G mobile terminal computing node method is applied to the mobile terminal, the method comprises the following steps: receiving a calculation demand instruction of an external node; splitting the calculation demand instruction into a plurality of operators and acquiring a computation power intensive operator in the operators, wherein the other operators are used as local operators; uploading the computationally intensive operator to a cloud server through a 5G channel of a mobile terminal, and receiving a feedback cloud computing result from the cloud server; calculating a local operator to obtain a local calculation result, and integrating the local calculation result and the cloud calculation result to form an instruction calculation result; and feeding back the instruction calculation result to the external node or the designated node according to a preset rule. The application can make the mobile phone (mobile terminal) of the user become a high-performance computing node, realize the general computing task of the block chain link point, homomorphic encryption, zero knowledge proof and other advanced password privacy protocols.

Description

Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation
Technical Field
The application relates to the technical field of mobile communication, in particular to the technical field of 5G mobile terminal development, and specifically relates to a method, a system, a mobile terminal and a cloud server for realizing 5G mobile terminal calculation.
Background
Mobile devices (e.g., cell phones) suffer from limited processor computing power, limited memory space, and limited battery capacity, resulting in mobile devices that cannot meet the application scenario requirements of intensive computing, such as mining calculations required as blockchain mobile end nodes, or massive privacy parameter algorithms required to implement advanced privacy protocols, or data preprocessing calculations required to be completed as edge computing nodes.
As mobile internet financial business goes deep into the life of common people, financial business can easily obtain a large amount of user data, and data risk events are increased. The GDPR of the general data protection regulations implemented by the european union committee 2018 makes stringent regulations on user privacy management. Today, with increasingly stringent regulatory regulations, existing mobile gold services are urgently required to adopt new technologies to solve the data privacy risk problem of businesses. With the improvement of the performance and the enrichment of the functions of the mobile phone, the mobile phone has started to bear more and more important computing tasks in an inter-gold network, and particularly, the key parameter generation and computation of a large number of privacy algorithm protocols are involved. Limited battery capacity, CPU computing power and memory capacity, high frequency privacy algorithms are difficult to support strongly in cell phones. In particular to privacy algorithms with high calculation power, large storage application, such as block chain link point calculation tasks, zero knowledge proof, homomorphic encryption and the like; the mobile phone terminal is used as an Edge Computing node of the Internet of things to preprocess and calculate data; the mobile phone is used as a content delivery network CDN terminal to store a large amount of data, and the like. Therefore, the existing technical problem is that the mobile device (such as a mobile phone) is limited in computing power of a processor, limited in storage space and limited in battery capacity, so that the mobile device cannot meet the application scene requirement of intensive computation.
Content of the application
In view of the above drawbacks of the prior art, an object of the present application is to provide a method, a system, a mobile terminal and a cloud server for implementing computing of a 5G mobile terminal, which are used for improving computing processing capability of the mobile terminal, so as to meet application scenario requirements of dense computing of the mobile terminal.
To achieve the above and other related objects, the present application provides a method for implementing 5G mobile terminal calculation, applied to a mobile terminal, the method comprising: receiving a calculation demand instruction of an external node; splitting the calculation demand instruction into a plurality of operators and acquiring a computation power intensive operator in the operators, wherein the other operators are used as local operators; uploading the computationally intensive operator to a cloud server through a 5G channel of a mobile terminal, and receiving a feedback cloud computing result from the cloud server; calculating a local operator to obtain a local calculation result, and integrating the local calculation result and the cloud calculation result to form an instruction calculation result; and feeding back the instruction calculation result to the external node or the designated node according to a preset rule.
In one embodiment of the application, uploading the computationally intensive operator to a cloud server comprises: generating a computation request comprising the computationally intensive operator; encrypting and packaging the calculation request to form encrypted data; and signing the encrypted data and the calculation request and then sending the encrypted data and the calculation request to the cloud server.
In an embodiment of the application, the computation request includes the computationally intensive operator, a read set of the computationally intensive operator, a state of the computationally intensive operator.
In an embodiment of the application, the method further comprises: acquiring a first computation force intensive operator with the earliest time sequence, and setting a reading set of the first computation force intensive operator; after a cloud computing result of the computation force intensive operator is obtained, a second computation force intensive operator reading set with a time sequence behind is obtained according to the reading set of the first computation force intensive operator; repeating the steps, and sequentially obtaining cloud computing results of the computationally intensive operators and corresponding reading sets.
To achieve the above object and other related objects, the present application further provides a method for implementing 5G mobile terminal computing, applied to a cloud server, where the method includes: receiving a calculation request of a calculation power intensive operator from a mobile terminal; and calculating the computation force intensive operator according to the calculation request, obtaining a cloud end calculation result, and feeding back the cloud end calculation result to the mobile terminal.
In an embodiment of the present application, the received computing request is stored in a trusted execution environment TEE, and the cloud computing result is generated by computing a computationally intensive operator through an algorithm built in the trusted execution environment TEE.
In an embodiment of the present application, the method for implementing 5G mobile terminal computing further includes: generating a writing set of the computation force intensive operator and a feedback result; wherein, the feedback result includes: a write set of the computation power intensive operator, a read set of the computation power intensive operator, a cloud computing result and a signature.
To achieve the above and other related objects, the present application also provides a mobile terminal, including a processor and a memory, where the memory stores program instructions; the processor executes program instructions to implement the method as described above for application to a mobile terminal.
To achieve the above and other related objects, the present application also provides a cloud server, including a processor and a memory, where the memory stores program instructions; the processor runs program instructions to implement the method applied to the cloud server as described above.
In order to achieve the above objective and other related objectives, the present application further provides a system for implementing 5G mobile terminal computing, including the mobile terminal and the cloud server as described above.
As described above, the method, the system, the mobile terminal and the cloud server for realizing the 5G mobile terminal calculation have the following beneficial effects:
compared with the application scene requirement that the existing mobile equipment cannot meet the intensive computing, the mobile terminal can enable the mobile phone (mobile terminal) of the user to be a high-performance computing node, realize the general computing task of block link points, encrypt homomorphic, zero knowledge proof and other advanced password privacy protocols, and finally meet the high-strength and high-privacy requirement at the mobile terminal of the user.
Drawings
Fig. 1 is a schematic flow chart of a method for implementing 5G mobile terminal calculation in an embodiment of the application when applied to a mobile terminal;
fig. 2 is a schematic flow chart of a method for implementing 5G mobile terminal computing in an embodiment of the present application when applied to a cloud server;
FIG. 3 is a diagram showing an interaction architecture for implementing a method of 5G mobile end computing in an embodiment of the present application;
FIG. 4 is a schematic diagram illustrating instruction splitting in a method for implementing 5G mobile terminal computing according to an embodiment of the present application;
fig. 5 is a simplified diagram illustrating an interaction process between a mobile terminal and a cloud server in a method for implementing 5G mobile terminal calculation according to an embodiment of the present application;
FIG. 6 is a detailed example diagram of the interaction process between the mobile terminal and the cloud server in the method for implementing the 5G mobile terminal calculation according to an embodiment of the application;
FIG. 7 is a diagram of a network architecture for implementing a method for 5G mobile-side computing in accordance with one embodiment of the present application;
fig. 8 shows an embodiment of a method for implementing 5G mobile terminal computing applied to a mobile phone network privacy payment system according to an embodiment of the present application;
fig. 9 shows an embodiment of the present application in which a method for implementing 5G mobile terminal computing is applied to a heterogeneous identity interworking system.
Detailed Description
Other advantages and effects of the present application will become apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present application with reference to specific examples. The application may be practiced or carried out in other embodiments that depart from the specific details, and the details of the present description may be modified or varied from the spirit and scope of the present application. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict.
As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, operations, elements, components, items, categories, and/or groups. The terms "or" and/or "as used herein are to be construed as inclusive, or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" mean "any of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; A. b and C). An exception to this definition will occur only when a combination of elements, functions or operations are in some way inherently mutually exclusive.
The embodiment provides a method, a system, a mobile terminal and a cloud server for realizing 5G mobile terminal calculation, which are used for improving the calculation processing capacity of the mobile terminal so as to meet the application scene requirement of intensive calculation of the mobile terminal.
The 5G mobile terminal computing node method and the system related to the embodiment are suitable for the intensive computing and large storage task operation of mobile equipment; such as mining calculations required as blockchain mobile end nodes, or massive privacy parameter algorithms required to implement advanced privacy protocols, or data preprocessing calculations required to be completed as edge computing nodes.
The method and the system for realizing the 5G mobile terminal calculation provide that the mobile phone is communicated with cloud equipment, a 'mobile terminal +5G+cloud' high-performance mobile terminal node is constructed, cloud resources can be virtualized as mobile phone background resources, intensive calculation and large storage tasks required to be completed by the mobile terminal are completed in real time through a high-bandwidth and low-delay 5G channel proxy to the cloud, and calculation results are fed back.
The following will explain in detail the principle and implementation manner of a method, a system, a mobile terminal and a cloud server for implementing 5G mobile terminal calculation in this embodiment, so that those skilled in the art can understand the method, the system, the mobile terminal and the cloud server for implementing 5G mobile terminal calculation without creative labor.
Fig. 1 is a flowchart of a method for implementing 5G mobile-end computing according to an embodiment of the present application.
As shown in fig. 1, in this embodiment, when the method is applied to a mobile terminal, the method includes steps S110 to S150.
Step S110, receiving a calculation demand instruction of an external node;
step S120, splitting the calculation demand instruction into a plurality of operators and acquiring a computation force intensive operator in the operators, wherein the rest operators are used as local operators;
step S130, uploading the computationally intensive operator to a cloud server through a 5G channel of a mobile terminal, and receiving a feedback cloud computing result from the cloud server;
step S140, a local operator is calculated to obtain a local calculation result, and the local calculation result and the cloud calculation result are integrated to form an instruction calculation result;
and step S150, feeding back the instruction calculation result to the external node or the designated node according to a preset rule.
As shown in fig. 2, in this embodiment, when the method for implementing 5G mobile terminal computing is applied to a cloud server, steps S210 to S220 are included.
Step S210, receiving a calculation request for calculating the computationally intensive operator from the mobile terminal;
step S220, calculating the computationally intensive operator according to the calculation request, obtaining a cloud end calculation result, and feeding back the cloud end calculation result to the mobile terminal.
The method for realizing the 5G mobile terminal calculation aims at providing a mobile terminal high-computation-power cloud proxy calculation implementation scheme realized by integrating the characteristics of 5G, a mobile terminal, a safe execution environment TEE, cloud storage/cloud calculation and the like.
The value of the method is as follows: the high bandwidth, low delay and mass access characteristics brought by the 5G mobile channel enable high-density computation or large data volume storage carried by the mobile terminal to be efficiently carried out to the cloud end and fed back to the mobile terminal in real time, and meanwhile, cloud server computation is completed in a safe execution environment TEE, so that cloud resources are virtualized as mobile phone self-resources. The improvement of the performance can realize the application capability of the mobile phone in the scenes of block chain mobile terminal light node calculation, mobile terminal privacy algorithm, mobile terminal edge calculation, content distribution network and the like.
The method for implementing 5G mobile terminal calculation in this embodiment is described in detail below.
Step S110, receiving a computation demand instruction of an external node.
As shown in fig. 3, the mobile terminal is used as an independent node to receive instructions sent by other nodes.
Step S120, splitting the calculation demand instruction into a plurality of operators and acquiring a computation force intensive operator in the operators, wherein the rest operators are used as local operators.
The computationally intensive operator is a data processing request calculation requiring high-density calculation, for example, mining calculation required as a block chain mobile end node, massive privacy parameter algorithm required for realizing an advanced privacy protocol, data preprocessing calculation required to be completed as an edge calculation node, and the like.
The instruction splitting is to split an external instruction acquired by the mobile terminal into a plurality of operators through an instruction compiling mode, and strip out a large amount of algorithm parts consuming computing power, as shown in an example of fig. 4, an instruction req_a is split into n operators Op through local compiling of the mobile terminal, wherein Op3 and Opi are operators consuming computing power, and are uploaded to a cloud server to complete calculation, and the rest of computing power lightweight operators can be locally completed at the mobile terminal.
Splitting principle:
common cured algorithms split as independent operators, such as:
1) Hash calculation performed by using a mobile phone node as a workload certification (Proof-of-Work) in a blockchain scene;
2) A number of signature verification (Signature Verification) computations required to verify the node;
3) Zero knowledge in privacy scenarios justifies the elliptic curve pairing algorithm (Elliptic Curve Pairing) employed, etc.
Step S130, uploading the computationally intensive operator to a cloud server through a 5G channel of the mobile terminal, and receiving a feedback cloud computing result from the cloud server.
And uploading the computation force intensive operator to the cloud server through the 5G channel, and completing computation on the cloud server by the uploaded computation force intensive operator.
To facilitate understanding of the details of this embodiment, the operational symbols involved and their description are shown in table 1 below:
TABLE 1
In this embodiment, uploading the computationally intensive operator to a cloud server includes:
generating a computation request Rin containing the computationally intensive operator;
encrypting and packaging the calculation request to form encrypted data Hin;
and signing the encrypted data and the calculation request, and then sending the encrypted data and the calculation request to the cloud server.
Wherein, in the present embodiment, the computation request includes the computationally intensive operator, a read set of the computationally intensive operator, a state of the computationally intensive operator.
Specifically, the mobile terminal pre-processes the instruction, splits the instruction into independent operators, calculates rin=cin (R, op, si), hin=hash (Rin), sig=sign (Rin, hin), wherein Op is a computationally intensive operator, and Rin, hin is uploaded to the cloud server.
The mobile terminal uploads the computationally intensive operator Op, the state Si, and the read set R to a cloud server (specifically, a processor chip TEE of the cloud) through a 5G network.
In step S210, the cloud server receives a calculation request of the computationally intensive operator from the mobile terminal.
Step S220, calculating the computationally intensive operator according to the calculation request, obtaining a cloud end calculation result, and feeding back the cloud end calculation result to the mobile terminal.
In this embodiment, the cloud server stores the received calculation request in the trusted execution environment TEE, and calculates the computationally intensive operator through an algorithm built in the trusted execution environment TEE to generate the cloud calculation result.
The trusted execution environment (Trusted Execution Environment, TEE) can isolate a trusted execution environment from an untrusted execution environment through hardware, and sensitive data and corresponding execution programs can be stored in the trusted execution environment, so that security characteristics such as privacy protection, integrity protection and the like are realized while the data processing function requirements are realized. The latest CPU architecture is usually built with trusted execution environments such as Intel SGX and ARM TrustZone.
The TEE can realize the safe processing of private data and the trusted execution of codes, and the security level can ensure that instructions and data can be stored and executed in a memory space with double isolation of software and hardware, so that the execution process is extremely difficult to attack and the data is extremely difficult to tamper. Meanwhile, the TEE (such as SGX of Intel corporation) can sign the security of instruction execution, and the outside verifies the signature to confirm that the instruction result is obtained by trusted execution.
In this embodiment, the TEE is used as an execution environment of a computationally intensive operation algorithm uploaded to the cloud server by the mobile terminal.
In this embodiment, the method for a 5G mobile computing node further includes: generating a writing set of the computation force intensive operator and a feedback result; wherein the feedback results include, but are not limited to: a write set of the computation power intensive operator, a read set of the computation power intensive operator, a cloud computing result and a signature.
Step S140, calculating a local operator to obtain a local calculation result, and integrating the local calculation result and the cloud calculation result to form an instruction calculation result.
And step S150, feeding back the instruction calculation result to the external node or the designated node according to a preset rule. According to the protocol, the mobile terminal returns the instruction result to the instruction issuing node or transmits the instruction result to other nodes.
As shown in fig. 5, the overall simple flow of steps S110 to S150 and steps S210 to S220 is as follows:
1. receiving an external instruction;
2. mobile terminal instruction preprocessing, namely dividing an instruction into a plurality of independent operators, calculating rin=cin (R, op), packaging hin=hash (Rin), and taking Op as a computationally intensive operator in a base;
3. rin, hin is uploaded to a cloud server;
4. the cloud server instruction executes, and a calculation result rout=cout (R/W, op), hout=hash (Rout), and a TEE signature SigTee;
5. rout, hout, sig is downloaded to the mobile terminal;
6. after the mobile terminal obtains the cloud agent calculation result, unpacking, verifying SigTee, verifying Hash, loading Ri/Wi after verification, refreshing Wi data, and finishing a calculation instruction;
7. and finishing instruction execution and outputting a result.
In this embodiment, the method for a 5G mobile computing node further includes:
acquiring a first computation force intensive operator with the earliest time sequence, and setting a reading set of the first computation force intensive operator; after a cloud computing result of the computation force intensive operator is obtained, a second computation force intensive operator reading set with a time sequence behind is obtained according to the reading set of the first computation force intensive operator; repeating the steps, and sequentially obtaining cloud computing results of the computationally intensive operators and corresponding reading sets.
That is, in this embodiment, after the last computationally intensive operator returns to the local area in the cloud computing result, the read set of the next computationally intensive operator can be deduced and uploaded to the cloud server for computing.
For example, if the same instruction is split into multiple computationally intensive operators Opi, opj, a round of cloud agent computation is performed on the computationally intensive operator Opi with the front time sequence, after the computation result Wi is obtained, the read set Rj of the computationally intensive operator Opj with the rear time sequence is deduced at the mobile end, and then the cloud agent computation of the second round Opj is completed, so that all the computationally intensive operators are completed in sequence.
For example, the read set R3 of the computationally intensive operator Op3 may be obtained by computation of the computationally intensive operator Op 2; the read set Ri of the computationally intensive operator Opi may be computationally derived by the computationally intensive operator Opi-1. And the write set W3 of the computation force intensive operator and Wi are obtained after the computation of the cloud server is completed.
As shown in fig. 6, a detailed interaction process between the mobile terminal and the cloud server in this embodiment is shown. And (3) accessing the mMTC channel in a mass manner through the high bandwidth eMBB and the low-delay uRLLC endowed by the 5G communication, connecting the mobile terminal with a cloud server, constructing a mobile terminal +5G+cloud high-performance mobile terminal node, enabling cloud resources to be virtualized as mobile terminal background resources, enabling intensive calculation and large storage tasks to be completed by the mobile terminal to be completed in real time through the high bandwidth and low-delay 5G channel proxy to the cloud, and feeding back calculation results. The scheme can enable the household mobile phone of the user to be a high-performance computing node, realize the general computing task of block chain link points, homomorphic encryption, zero knowledge proof and other advanced password privacy protocols, and finally meet the high-strength and high-privacy requirements at the mobile terminal of the user.
The embodiment also provides a mobile terminal, which comprises a processor and a memory, wherein the memory stores program instructions; the processor executes the program instructions to implement the method applied to the mobile terminal as described above (steps S110 to S150). Wherein, the mobile terminal is a tablet personal computer, a smart phone and the like.
The embodiment also provides a cloud server, which comprises a processor and a memory, wherein the memory stores program instructions; the processor executes the program instructions to implement the method applied to the cloud server as described above (step S210 to step S220).
The embodiment also provides a server system, which comprises the mobile terminal and the cloud server. The foregoing details of the mobile terminal and the cloud server are not described herein.
The practicality of this embodiment is as follows:
today, operators are accelerating deployment of 5G communication networks, and high bandwidth, low latency communication between the cloud and the terminal devices is feasible. The cloud resources required by the mobile phone terminal have three main sources:
1. provided by the handset manufacturer. Under the condition that the storage technology and the battery utilization rate reach the limit, the manufacturer has a wish to configure the cloud resources or external cloud resources of the manufacturer for the user, so that the mobile phone can support more business scene requirements with high resource consumption. The high-speed 5G network enables local collaborative calculation and storage of cloud resources and mobile phones to be possible;
2. the user configures himself. In order to adapt to special application requirements, such as payment transactions, sales transactions, business bill processing transactions and the like, users have requirements to configure own cloud resources for mobile phones. The system designed by the embodiment can support heterogeneous node network access, and a user can quickly join an existing mobile network only by running scripts at the cloud end and the mobile end;
3. and the service party provides the service. To implement privacy services such as financial transactions, related operators may provide 5G accessed cloud resources for the service customers to implement node virtualization of customer handsets and clouds.
The technical scheme of the embodiment can cover the payment service of the mobile phone terminal, edge calculation and heterogeneous privacy identity authentication. And by customizing different intelligent contracts, the technology can be extended to Internet financial scenes of a plurality of mobile terminals, and provides a highly-reliable and private transaction mode for scenes such as payment, insurance, financial management, credit investigation and the like, so that user data ownership is ensured, occurrence of data abuse is reduced, and compliance management of mobile mutual funds is realized.
With the multi-mobile end node of the present embodiment, a network frame constructed by combining with a 5G mobile channel and a cloud TEE environment can form a decentralised blockchain network, as shown in fig. 7. The mobile terminal and the cloud environment coupled by the 5G channel can be regarded as a virtual super mobile phone terminal with high computing power and large storage, and special computing tasks which cannot be completed by common mobile phones are completed.
Specific application example 1:
as shown in FIG. 8, in this example, a multitude of merchants, users, make up a financial payment network under a blockchain architecture. The mobile terminal of the user mobile phone adopts the scheme and cloud resources to form a virtual super mobile phone terminal through a 5G channel, and the computing power is greatly improved:
1. transfer transactions between users;
2. the payment transaction between the user and the merchant can adopt a high-strength privacy transaction algorithm, such as zero knowledge proof, homomorphic encryption and multi-party security calculation, so as to protect the transaction from being acquired by non-transaction correlation.
The conventional operator with intensive computation power adopted by the privacy algorithm is preconfigured in the trusted execution environment of the cloud TEE, is subjected to high-efficiency computation by the agent to the cloud through the 5G channel algorithm, and is fed back to the mobile terminal of the user mobile phone in real time.
Because the computationally intensive algorithm is executed at the cloud, the mobile phone side does not bring performance pressure, thereby ensuring that the mobile phone can bear the full node function in the blockchain.
Specific application example 2:
as shown in fig. 9, this example implements an identification and interworking scheme for blockchain-based heterogeneous systems.
The blockchain is a chain type data processing and storage structure which packages transactions occurring within a certain time into transaction blocks and concatenates the transaction blocks in a time sequence in a cryptographic manner. The blockchain is based on a distributed architecture, running intelligent contracts that are common to multiple parties to achieve trusted execution of predetermined logic. Blockchains serve as a base device distinct from the centralization scheme, and the resulting characteristics include:
1) Distrust: trusted execution of a given contract logic can be achieved without a centralized system (or with a somewhat centralized weak centralized system).
2) Distributed multiparty billing: the parties maintain a unified book together.
3) Consensus protocol: the account can be checked by the consensus of multiple parties to each transaction, so that the account has stronger capability of resisting malicious attacks.
4) Non-tamperable: transaction posting may not be altered.
Heterogeneous system identity recognition is a difficult problem of identity management, such as the fact that personal users cannot uniformly manage and communicate with each other in Internet of vehicles, banking systems, social contact, insurance, government affairs and the like. The example adopts a blockchain scheme to realize intelligent contracts with heterogeneous identities in the contracts, and the contracts adopt a privacy algorithm ZK-Snark based on zero knowledge proof to identify user identity information and realize verification in an encryption state. The generation of ZK-Snark proving data which involves extremely high expenditure of labor cannot be realized at a common mobile phone mobile terminal.
By adopting the scheme of the embodiment, the virtual super mobile phone node of the mobile terminal can be constructed through the 5G+ cloud, so that the mobile terminal can effectively execute the ZK-Snark algorithm. Thereby supporting blockchain privacy contract identification transactions at the mobile end.
The identification of different system identities can uniformly and effectively manage heterogeneous identities of the user, the privacy of the user is ensured, and the KYC cost is reduced.
In summary, compared with the situation that the existing mobile device cannot meet the application scene requirement of intensive computing, the mobile terminal can enable the mobile phone (mobile terminal) of the user to be a high-performance computing node, realize the general computing task of block link points, encrypt homomorphic, prove zero knowledge and other advanced cryptographic privacy protocols, and finally meet the high-strength and high-privacy requirement at the mobile terminal of the user. Therefore, the application effectively overcomes various defects in the prior art and has high industrial utilization value.
The above embodiments are merely illustrative of the principles of the present application and its effectiveness, and are not intended to limit the application. Modifications and variations may be made to the above-described embodiments by those skilled in the art without departing from the spirit and scope of the application. Accordingly, it is intended that all equivalent modifications and variations of the application be covered by the claims, which are within the ordinary skill of the art, be within the spirit and scope of the present disclosure.

Claims (8)

1. A method for realizing 5G mobile terminal calculation is applied to a mobile terminal and is characterized in that: the method comprises the following steps:
receiving a calculation demand instruction of an external node;
splitting the calculation demand instruction into a plurality of operators and acquiring a computation power intensive operator in the operators, wherein the other operators are used as local operators; uploading the computationally intensive operator to a cloud server through a 5G channel of a mobile terminal, and receiving a feedback cloud computing result from the cloud server;
calculating a local operator to obtain a local calculation result, and integrating the local calculation result and the cloud calculation result to form an instruction calculation result;
feeding back the instruction calculation result to the external node or the designated node according to a preset rule;
the uploading the computationally intensive operator to a cloud server through a 5G channel of the mobile terminal, and receiving a feedback cloud computing result from the cloud server comprises:
acquiring a first computation force intensive operator with the earliest time sequence, setting a read set of the first computation force intensive operator, and uploading the first computation force intensive operator to the cloud server;
after the mobile terminal obtains the cloud computing result of the first computation power intensive operator, the mobile terminal calculates a second computation power intensive operator reading set with a rear time sequence according to the cloud computing result of the first computation power intensive operator and uploads the second computation power intensive operator reading set to the cloud server, so that the cloud computing result and the corresponding reading set of the computation power intensive operator are sequentially obtained, and the computation power intensive operator is sequentially uploaded to the cloud server.
2. The method for implementing 5G mobile terminal computing according to claim 1, wherein: uploading the computationally intensive operator to a cloud server includes:
generating a computation request comprising the computationally intensive operator;
encrypting and packaging the calculation request to form encrypted data;
and signing the encrypted data and the calculation request and then sending the encrypted data and the calculation request to the cloud server.
3. The method for implementing 5G mobile terminal computing according to claim 2, wherein: the computation request includes the computationally intensive operator, a read set of the computationally intensive operator, a state of the computationally intensive operator.
4. The method for realizing 5G mobile terminal calculation is applied to a cloud server and is characterized in that: the method comprises the following steps:
receiving calculation requests of the computationally intensive operators from the mobile terminal one by one according to a time sequence;
calculating the computation force intensive operator according to the calculation request to generate a writing set and a feedback result of the computation force intensive operator; wherein, the feedback result includes: the writing set of the computation force intensive operator, the reading set of the computation force intensive operator, the cloud computing result and the signature are sequentially fed back to the mobile terminal one by one, and the mobile terminal calculates and acquires a second computation force intensive operator reading set with a later time sequence according to the cloud computing result of the previous computation force intensive operator.
5. The method for implementing 5G mobile terminal computing according to claim 4, wherein: and storing the received calculation request in a Trusted Execution Environment (TEE), and calculating the computation intensive operator through an algorithm built in the Trusted Execution Environment (TEE) to generate the cloud computing result.
6. A mobile terminal comprising a processor and a memory, the memory storing program instructions; the processor executing program instructions to implement the method of any one of claims 1 to 3.
7. A cloud server comprising a processor and a memory, wherein the memory stores program instructions; the processor executing program instructions to implement the method of any one of claims 4 or 5.
8. A system for implementing 5G mobile computing, characterized by: comprising a mobile terminal as claimed in claim 6 and a cloud server as claimed in claim 7.
CN201911260879.2A 2019-12-10 2019-12-10 Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation Active CN111131412B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911260879.2A CN111131412B (en) 2019-12-10 2019-12-10 Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911260879.2A CN111131412B (en) 2019-12-10 2019-12-10 Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation

Publications (2)

Publication Number Publication Date
CN111131412A CN111131412A (en) 2020-05-08
CN111131412B true CN111131412B (en) 2023-08-11

Family

ID=70498152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911260879.2A Active CN111131412B (en) 2019-12-10 2019-12-10 Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation

Country Status (1)

Country Link
CN (1) CN111131412B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230276430A1 (en) * 2020-06-03 2023-08-31 Beijing Xiaomi Mobile Software Co., Ltd. Resource scheduling method and apparatus, communication device and storage medium
CN114090222A (en) * 2020-07-29 2022-02-25 展讯半导体(南京)有限公司 Computing power sharing method and related equipment
CN112492005B (en) * 2020-11-18 2022-03-29 中国联合网络通信集团有限公司 Migration method, device and system of edge equipment
CN113011238A (en) * 2020-11-24 2021-06-22 腾讯科技(深圳)有限公司 Data processing method, device, server, terminal and storage medium
CN112347517B (en) * 2021-01-07 2021-03-26 南京区盟链信息科技有限公司 KYC compliance supervision system based on multi-party safety calculation
CN113328863B (en) * 2021-08-03 2021-11-02 北京电信易通信息技术股份有限公司 Mobile equipment data acquisition method and system based on zero-knowledge proof
CN116934576A (en) 2022-03-31 2023-10-24 脸萌有限公司 Terminal-cloud collaborative media data processing method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105843685A (en) * 2016-03-17 2016-08-10 哈尔滨理工大学 Mobile terminal calculation unloading method based on task distribution
WO2017067586A1 (en) * 2015-10-21 2017-04-27 Deutsche Telekom Ag Method and system for code offloading in mobile computing
CN107295109A (en) * 2017-08-16 2017-10-24 重庆邮电大学 Task unloading and power distribution joint decision method in self-organizing network cloud computing
CN109725949A (en) * 2018-12-25 2019-05-07 南京邮电大学 A kind of mobile edge calculations uninstalling system and method based on mobile agent
CN110298190A (en) * 2019-04-19 2019-10-01 矩阵元技术(深圳)有限公司 Decentralization Secure data processing method, device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017067586A1 (en) * 2015-10-21 2017-04-27 Deutsche Telekom Ag Method and system for code offloading in mobile computing
CN105843685A (en) * 2016-03-17 2016-08-10 哈尔滨理工大学 Mobile terminal calculation unloading method based on task distribution
CN107295109A (en) * 2017-08-16 2017-10-24 重庆邮电大学 Task unloading and power distribution joint decision method in self-organizing network cloud computing
CN109725949A (en) * 2018-12-25 2019-05-07 南京邮电大学 A kind of mobile edge calculations uninstalling system and method based on mobile agent
CN110298190A (en) * 2019-04-19 2019-10-01 矩阵元技术(深圳)有限公司 Decentralization Secure data processing method, device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
移动云计算中任务卸载及虚拟机调度策略的研究;汤海燕;《中国优秀硕士论文全文数据库》;20170930;正文第1-4章 *

Also Published As

Publication number Publication date
CN111131412A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN111131412B (en) Method, system, mobile terminal and cloud server for realizing 5G mobile terminal calculation
EP3721603B1 (en) System and method for creating decentralized identifiers
US10824701B2 (en) System and method for mapping decentralized identifiers to real-world entities
EP3788522B1 (en) System and method for mapping decentralized identifiers to real-world entities
TWI701623B (en) Logistics information transmission method, system and device based on blockchain
EP3688633A2 (en) System and method for verifying verifiable claims
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
CN111047443B (en) User scoring method and device, electronic equipment and computer readable storage medium
US20160294794A1 (en) Security System For Data Communications Including Key Management And Privacy
TW202029044A (en) Block chain transaction generation method and device
CN111476572B (en) Block chain-based data processing method, device, storage medium and equipment
Chen et al. A blockchain-based intelligent anti-switch package in tracing logistics system
CN111461723A (en) Data processing system, method and device based on block chain
CN109995781A (en) Transmission method, device, medium and the equipment of data
CN112600830B (en) Service data processing method and device, electronic equipment and storage medium
US11811934B2 (en) Distributed machine learning via secure multi-party computation and ensemble learning
WO2022156594A1 (en) Federated model training method and apparatus, electronic device, computer program product, and computer-readable storage medium
CN114519197A (en) Data storage architecture and method based on block chain and cloud service
US11922404B2 (en) Method and system for payment for central bank digital currency
CN114331437A (en) Block chain-based digital seal using method and device
Parandhaman A Secured Mobile Payment Transaction Handling System using Internet of Things with Novel Cipher Policies
US10326833B1 (en) Systems and method for processing request for network resources
Khanji et al. Boosting iot efficiency and security through blockchain: blockchain-based car insurance process-a case study
Bargavi et al. Exploring the Integration of Blockchain in 6G Networks for Improved Security and Efficiency
Salleras Citadel: Self-Sovereign Identities on Dusk Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant