CN111404692B - Block chain identity information confirmation system and confirmation method based on big data - Google Patents

Block chain identity information confirmation system and confirmation method based on big data Download PDF

Info

Publication number
CN111404692B
CN111404692B CN202010146277.0A CN202010146277A CN111404692B CN 111404692 B CN111404692 B CN 111404692B CN 202010146277 A CN202010146277 A CN 202010146277A CN 111404692 B CN111404692 B CN 111404692B
Authority
CN
China
Prior art keywords
data
identity information
information
module
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010146277.0A
Other languages
Chinese (zh)
Other versions
CN111404692A (en
Inventor
刘合安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan City University
Original Assignee
Hunan City University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan City University filed Critical Hunan City University
Priority to CN202010146277.0A priority Critical patent/CN111404692B/en
Publication of CN111404692A publication Critical patent/CN111404692A/en
Application granted granted Critical
Publication of CN111404692B publication Critical patent/CN111404692B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of data information verification, and discloses a block chain identity information confirmation system and a confirmation method based on big data, wherein the block chain identity information confirmation system based on the big data comprises the following components: the system comprises a registration login module, a block chain storage module, an information encryption module, an identity information acquisition module, an information decryption module, an information identification module, an information confirmation module, an information management module, an abnormity early warning module and a display module. The invention verifies the stored identity information in a mode of identity information identification and confirmation, can ensure the integrity of data information in the block chain node, prevents the data information from being attacked by a network and avoids the occurrence of serious property loss; the encryption and decryption method can ensure that the generated information is not tampered, can reduce the economic burden of identity confirmation, and greatly improves the efficiency and the safety; and the data to be acquired is processed in batches according to the data storage index data, so that the operator data can be quickly acquired.

Description

Block chain identity information confirmation system and confirmation method based on big data
Technical Field
The invention belongs to the technical field of data information verification, and particularly relates to a block chain identity information confirmation system and a block chain identity information confirmation method based on big data.
Background
At present, a blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, and an encryption algorithm. The rapid development of internet technology has also brought about the rapid development of some disciplines, such as information security and cryptography. Identity authentication is a basic technical means for confirming the identity of an operator in a computer and a network system at present, and is a process for judging whether the identity of an authenticated object is real and effective. The existing authentication method has a third party mechanism which is trusted by both authentication parties, identity information is issued to both authentication parties through the third party mechanism, and the identity information is used as a basis for confirming the identity of the other party between the authentication parties. The identity authentication based on the CA authentication center is a safe and reliable authentication scheme, but the scheme is based on a trusted third party and needs to issue an identity certificate of a user, the maintenance of the certificate is completely based on a CA authentication center platform, and when two parties of the user communicate, the two parties of the user need to be under a CA system, so that two aspects of problems exist in interaction, on one hand, the communication efficiency is low, and the price is high; on the other hand, once the third-party server is broken, huge loss is caused to both communication parties.
In summary, the problems and disadvantages of the prior art are: the identity authentication method based on the CA authentication center has the problems of low communication efficiency and high price, and the third-party server is broken to cause huge loss to both communication parties.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a block chain identity information confirmation system and a block chain identity information confirmation method based on big data.
The invention is realized in such a way that a block chain identity information confirmation method based on big data comprises the following steps:
and step one, a registration login dialog box of the block chain identity information confirmation system is realized through a registration login program, and further the registration and login operation of the user is realized.
And secondly, generating a random number and a pair of public key and private key by the system based on the identity information registered by the user, and storing the identity information and the generated key on each block link point through the cloud server.
Thirdly, encrypting the acquired user identity information data through a data encryption program:
(I) Acquiring data to be encrypted through a data acquisition program, wherein the data to be encrypted is a character string to be encrypted;
(II) randomly selecting an encryption method and generating random numbers, selecting a designated character string and designated characters according to the random numbers, encrypting the designated character string according to the randomly selected encryption method and generating an encrypted designated character string;
(III) encrypting the rest characters in the character string to be encrypted;
and (IV) sequentially arranging and combining the plurality of encrypted specified character strings to generate an encrypted character string.
Step four, the user requests to enter the system, and the system acquires the identity information data of the user who finishes system registration and encryption through the identity information acquisition program and based on big data: (a) Acquiring data storage index data of user identity information to be acquired through an identity information acquisition program;
(b) Determining a data batch of the acquired data according to the data storage index data;
(c) And establishing a corresponding relation between the data to be collected and the data batch, and acquiring the identity information data of the user to be collected, which is registered and encrypted by the system, in batches according to the data batch and the corresponding relation.
Step five, the system acquires a public key of the user, performs signature and encryption by combining a stored private key and then sends the public key to the user, and the system decrypts the encrypted user identity information data through a data decryption program to acquire the public key; the user combines the acquired public key with the private key of the user to decrypt the data:
(1) Acquiring data to be decrypted, wherein the data to be decrypted is a character string to be decrypted;
(2) Reading the identification character and judging the encryption method adopted by the character string to be decrypted;
(3) Encrypting the residual characters in the data to be decrypted;
(4) And sequentially arranging and combining the plurality of the appointed character strings to be decrypted after the encryption processing to generate the decrypted character strings.
And step six, identifying the user identity information data after data decryption through a data identification program, and comparing and confirming the identified user identity information through a data confirmation program.
Further, after the sixth step, the following steps are also performed:
step 1, modifying, adding, removing and inquiring user personal information through a data management program;
step 2, early warning the abnormal identity information of the block chain identity information confirmation system through an acousto-optic early warning device;
and 3, displaying a login registration interface, user identity information, a confirmation result and system early warning information of the block chain identity information confirmation system through a display.
Further, in step three, the encryption method in step (II) includes: a character adding encryption method and a transposition encryption method; the appointed character string is a part selected from an editing position of the character string to be encrypted according to the value of the random number, and the appointed character is a character corresponding to the value of the random number in the appointed character string.
Further, in the fourth step, the method for acquiring, by the identity information acquisition program and based on the big data, the identity information data of the user who has completed system registration and encryption further includes:
establishing a data request log, wherein the data request log is used for recording the acquisition state of the data to be acquired;
updating the data request log according to the acquisition state of the data to be acquired;
checking the data volume of the data batch according to the data request log;
and checking the repeated data of the data to be acquired according to the data request log.
Further, in the fifth step, the to-be-decrypted character string in the step (1) includes a plurality of to-be-decrypted designated character strings, an identification character and a random number are added before a first character of each to-be-decrypted designated character string, and the to-be-decrypted designated character string is a part selected from an editing position of the to-be-decrypted data according to a value of the random number.
Further, in the fifth step, the decryption method in the step (2) includes a character deletion decryption method and a transposition decryption method;
the decryption method specifically comprises the following steps: and reading the random number, selecting the appointed character string to be decrypted and the appointed character according to the random number, decrypting the appointed character string to be decrypted by correspondingly using a decryption method according to the encryption method, and generating the appointed decrypted character string.
Further, in the sixth step, the method for identifying the user identity information data whose data decryption has been completed by the data identification program includes:
1) Acquiring time series data information of M or more pieces of 3 rd information in which 1 st information related to identity information and 2 nd information indicating a time observation point of the 1 st information are mutually corresponding, wherein M is a natural number of 3 or more;
2) Calculating an absolute value of a time difference between the observation points using the 2 nd information included in each of the N3 rd information included in the time-series data information, and generating a set of the calculated time differences as a 1 st set; wherein N is a natural number of 3 or more;
3) Calculating, for each group of the 3 rd information for which the absolute value of the time difference is calculated, an autocorrelation coefficient that indicates a correlation between the value of the 1 st information at the 1 st time and the value of the 1 st information at the 2 nd time after a predetermined time has elapsed from the 1 st time, and generating a set of the calculated autocorrelation coefficients as a 2 nd set;
4) Calculating an autocorrelation function representing a relationship between the set of time differences and the set of autocorrelation coefficients based on the 1 st set and the 2 nd set;
5) Analyzing the 1 st information chronologically based on the autocorrelation function; and 4. Outputting the 4 th information related to the analysis result.
Another object of the present invention is to provide a big-data-based blockchain identity information verification system using the big-data-based blockchain identity information verification method, the big-data-based blockchain identity information verification system including:
the system comprises a registration login module, a block chain storage module, an information encryption module, an identity information acquisition module, an information decryption module, an information identification module, an information confirmation module, an information management module, an abnormality early warning module and a display module.
The registration login module is used for realizing a registration login dialog box of the block chain identity information confirmation system through a registration login program so as to realize the registration and login operation of the user;
the block chain storage module is used for storing the identity information and the generated key on each block chain link point through the cloud server;
the information encryption module is used for encrypting the acquired user identity information data through a data encryption program;
the identity information acquisition module is used for acquiring identity information data of users who have finished system registration through an identity information acquisition program and based on big data;
the information decryption module is used for decrypting the encrypted user identity information data through a data decryption program;
the information identification module is used for identifying the user identity information data after the data decryption through a data identification program;
the information confirmation module is used for comparing and confirming the identified user identity information through a data confirmation program;
the information management module is used for modifying, adding, removing and inquiring the personal information of the user through a data management program;
the abnormity early warning module is used for early warning the abnormal identity information of the block chain identity information confirmation system through the acousto-optic early warning device;
and the display module is used for displaying a login registration interface, user identity information, a confirmation result and system early warning information of the block chain identity information confirmation system through a display.
Another object of the present invention is to provide a computer program product stored on a computer readable medium, which includes a computer readable program for providing a user input interface to implement the big data based block chain identity information confirmation method when the computer program product is executed on an electronic device.
Another object of the present invention is to provide a computer-readable storage medium storing instructions which, when executed on a computer, cause the computer to execute the method for confirming big-data-based blockchain identity information.
In summary, the advantages and positive effects of the invention are as follows: the invention verifies the stored identity information in a mode of identity information identification and confirmation, can ensure the integrity of data information in the block chain node, prevents the data information from being attacked by a network and avoids the occurrence of serious property loss; the encryption and decryption method can ensure that the generated information is not tampered, not only can the economic burden of identity confirmation be lightened, but also the efficiency and the safety can be greatly improved. The data acquisition method provided by the invention processes the data to be acquired in batches according to the data storage index data, and can realize the rapid acquisition of operator data.
Drawings
Fig. 1 is a flowchart of a method for confirming big-data-based blockchain identity information according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a big-data-based blockchain identity information verification system according to an embodiment of the present invention;
in the figure: 1. registering a login module; 2. a block chain storage module; 3. an information encryption module; 4. an identity information acquisition module; 5. an information decryption module; 6. an information identification module; 7. an information confirmation module; 8. an information management module; 9. an anomaly early warning module; 10. and a display module.
Fig. 3 is a flowchart of a method for encrypting acquired user identity information data by a data encryption program according to an embodiment of the present invention.
Fig. 4 is a flowchart of a method for acquiring, by an identity information acquisition program and based on big data, identity information data of a user who has completed system registration according to an embodiment of the present invention.
Fig. 5 is a flowchart of a method for decrypting encrypted user identification information data by a data decryption program according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a system and a method for confirming block chain identity information based on big data, and the following describes the present invention in detail with reference to the accompanying drawings.
As shown in fig. 1, the method for confirming the identity information of the block chain based on big data according to the embodiment of the present invention includes the following steps:
s101, a login dialog box of the block chain identity information confirmation system is realized through a login program, and then the login and login operations of the user are realized.
S102, storing the identity information and the generated key on each block link point through a cloud server; and encrypting the acquired user identity information data through a data encryption program.
S103, acquiring identity information data of the user who finishes system registration through an identity information acquisition program based on big data; and decrypting the encrypted user identity information data through a data decryption program.
S104, identifying the user identity information data after data decryption through a data identification program; and comparing and confirming the identified user identity information through a data confirmation program.
S105, modifying, adding, removing and inquiring the personal information of the user through the data management program; and early warning the abnormal identity information of the block chain identity information confirmation system through an acousto-optic early warning device.
And S106, displaying a login registration interface, user identity information, a confirmation result and system early warning information of the block chain identity information confirmation system through a display.
As shown in fig. 2, the system for confirming identity information of a big data-based blockchain according to an embodiment of the present invention includes: the system comprises a registration login module 1, a block chain storage module 2, an information encryption module 3, an identity information acquisition module 4, an information decryption module 5, an information identification module 6, an information confirmation module 7, an information management module 8, an abnormity early warning module 9 and a display module 10.
And the registration login module 1 is used for realizing a registration login dialog box of the block chain identity information confirmation system through a registration login program so as to realize the registration and login operations of the user.
And the block chain storage module 2 is used for storing the identity information and the generated key on each block chain link point through the cloud server.
And the information encryption module 3 is used for encrypting the acquired user identity information data through a data encryption program.
And the identity information acquisition module 4 is used for acquiring the identity information data of the user who finishes system registration through the identity information acquisition program and based on the big data.
And the information decryption module 5 is used for decrypting the encrypted user identity information data through a data decryption program.
And the information identification module 6 is used for identifying the user identity information data subjected to data decryption through a data identification program.
And the information confirmation module 7 is used for comparing and confirming the identified user identity information through a data confirmation program.
And the information management module 8 is used for modifying, adding, removing and inquiring the personal information of the user through the data management program.
And the abnormity early warning module 9 is used for early warning the abnormal identity information of the block chain identity information confirmation system through the acousto-optic early warning device.
And the display module 10 is used for displaying a login registration interface, user identity information, a confirmation result and system early warning information of the block chain identity information confirmation system through a display.
The invention is further described with reference to specific examples.
As shown in fig. 3, the method for encrypting the acquired user identity information data by using a data encryption program according to an embodiment of the present invention includes:
s201, data to be encrypted is obtained through a data obtaining program, and the data to be encrypted is a character string to be encrypted.
S202, randomly selecting an encryption method and generating random numbers, selecting a designated character string and designated characters according to the random numbers, encrypting the designated character string according to the randomly selected encryption method and generating an encrypted designated character string.
S203, the rest characters in the character string to be encrypted are encrypted.
And S204, sequentially arranging and combining the plurality of encrypted designated character strings to generate an encrypted character string.
The encryption method of step S202 provided in the embodiment of the present invention includes: a character adding encryption method and a transposition encryption method. The appointed character string is a part selected from an editing position of the character string to be encrypted according to the value of the random number, and the appointed character is a character corresponding to the value of the random number in the appointed character string.
As shown in fig. 4, as a preferred embodiment, the method for acquiring, by an identity information acquisition program and based on big data, identity information data of a user who has completed system registration and encryption by using a system according to an embodiment of the present invention includes:
s301, acquiring data storage index data of the user identity information to be acquired through an identity information acquisition program.
S302, determining the data batch of the acquired data according to the data storage index data.
S303, establishing a corresponding relation between the data to be collected and the data batch, and acquiring the identity information data of the user to be collected, which is registered and encrypted by the system, in batches according to the data batch and the corresponding relation.
The method for acquiring the identity information data of the user who has finished system registration and encryption through the identity information acquisition program and based on the big data, provided by the embodiment of the invention, further comprises the following steps:
and establishing a data request log, wherein the data request log is used for recording the acquisition state of the data to be acquired.
And updating the data request log according to the acquisition state of the data to be acquired.
And checking the data volume of the data batch according to the data request log.
And checking the repeated data of the data to be acquired according to the data request log.
As shown in fig. 5, as a preferred embodiment, the method for decrypting, by a data decryption program, encrypted user identity information data by the system according to the embodiment of the present invention includes:
s401, data to be decrypted is obtained, and the data to be decrypted is a character string to be decrypted.
S402, reading the identification character and judging the encryption method adopted by the character string to be decrypted.
S403, encrypting the residual characters in the data to be decrypted.
S404, sequentially arranging and combining the plurality of the specified character strings to be decrypted after the encryption processing to generate decrypted character strings.
The to-be-decrypted character string of step S401 provided in the embodiment of the present invention includes a plurality of to-be-decrypted designated character strings, and an identification character and a random number are added before a first character of each of the to-be-decrypted designated character strings, where the to-be-decrypted designated character string is a part selected from an edit bit of the to-be-decrypted data according to a value of the random number.
The decryption method of step S402 provided by the embodiment of the present invention includes a character deletion decryption method and a transposition decryption method; the decryption method specifically comprises the following steps: and reading the random number, selecting the appointed character string to be decrypted and the appointed character according to the random number, decrypting the appointed character string to be decrypted by correspondingly using a decryption method according to the encryption method, and generating the appointed decrypted character string.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When used in whole or in part, can be implemented in a computer program product that includes one or more computer instructions. When loaded or executed on a computer, cause the flow or functions according to embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.)). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. A big data-based block chain identity information confirmation method is characterized by comprising the following steps of:
step one, a registration login dialog box of a block chain identity information confirmation system is realized through a registration login program, and then registration and login operations are realized;
secondly, the system generates a random number and a pair of public key and private key based on the registered identity information, and stores the identity information and the generated key on each block link point through the cloud server;
step three, the identity information data obtained in the step two is encrypted through a data encryption program, and the method specifically comprises the following steps:
(I) Acquiring data to be encrypted through a data acquisition program, wherein the data to be encrypted is a character string to be encrypted;
(II) randomly selecting an encryption method and generating random numbers, selecting a designated character string and designated characters according to the random numbers, encrypting the designated character string according to the randomly selected encryption method and generating an encrypted designated character string;
(III) encrypting the rest characters in the character string to be encrypted;
(IV) sequentially arranging and combining the plurality of encrypted specified character strings to generate encrypted character strings;
step four, after the identity information data is encrypted based on the step three, the system requests to enter the system, and the system acquires the identity information data of the user who finishes system registration and encryption through an identity information acquisition program and based on big data: (a) Acquiring data storage index data of user identity information to be acquired through an identity information acquisition program;
(b) Determining a data batch of the acquired data according to the data storage index data;
(c) Establishing a corresponding relation between data to be collected and the data batch, and acquiring identity information data of the user to be collected, which is registered and encrypted by the system, in batches according to the data batch and the corresponding relation;
in the fifth step, the step of,
(1) Acquiring data to be decrypted, wherein the data to be decrypted is a character string to be decrypted;
(2) Reading the identification character and judging the encryption method adopted by the character string to be decrypted; the character string to be decrypted comprises a plurality of appointed character strings to be decrypted, an identification character and a random number are added in front of the first character of each appointed character string to be decrypted, and the appointed character string to be decrypted is a part selected from an editing position of the data to be decrypted according to the value of the random number;
(3) Decrypting the residual characters in the decrypted data;
(4) Sequentially arranging and combining the decrypted designated character strings to generate decrypted character strings;
and step six, based on the data decrypted in the step five, identifying the identity information data after the data decryption by a data identification program, and comparing and confirming the identified identity information by a data confirmation program.
2. The method for confirming big-data-based blockchain identity information according to claim 1, further comprising the following steps after the sixth step:
step 1, modifying, adding, removing and inquiring personal information through a data management program;
step 2, early warning the abnormal identity information of the block chain identity information confirmation system through an acousto-optic early warning device;
and 3, displaying a login registration interface, user identity information, a confirmation result and system early warning information of the block chain identity information confirmation system through a display.
3. The method for confirming big-data-based block chain identity information of claim 1, wherein in step three, the encryption method of step (II) comprises: a character adding encryption method and a transposition encryption method; the appointed character string is a part selected from an editing position of the character string to be encrypted according to the value of the random number, and the appointed character is a character corresponding to the value of the random number in the appointed character string.
4. The method for confirming big-data-based blockchain identity information of claim 1, wherein in step four, the method for obtaining the identity information data that has completed system registration and is encrypted through the identity information obtaining program and based on the big data further comprises:
establishing a data request log, wherein the data request log is used for recording the acquisition state of the data to be acquired;
updating the data request log according to the acquisition state of the data to be acquired;
checking the data volume of the data batch according to the data request log;
and checking the repeated data of the data to be acquired according to the data request log.
5. The method for confirming blockchain identity information based on big data according to claim 1, wherein in the fifth step, the decryption method of the step (2) includes a character deletion decryption method, a transposition decryption method;
the decryption method specifically comprises the following steps: and reading the random numbers, selecting the appointed character string to be decrypted and the appointed character according to the random numbers, decrypting the appointed character string to be decrypted by correspondingly using a decryption method according to the encryption method, and generating the appointed decryption character string.
6. The method for confirming big-data-based blockchain identity information according to claim 1, wherein in the sixth step, the method for identifying the user identity information data of which the data decryption is completed through the data identification program comprises:
1) Acquiring time series data information of M or more pieces of 3 rd information in which 1 st information related to identity information and 2 nd information indicating a time observation point of the 1 st information are mutually corresponding, wherein M is a natural number of 3 or more;
2) Calculating an absolute value of a time difference between the observation points using the 2 nd information included in each of the N3 rd information included in the time-series data information, and generating a set of the calculated time differences as a 1 st set; wherein N is a natural number of 3 or more;
3) Calculating an autocorrelation coefficient indicating a correlation between a value of the 1 st information at a 1 st time and a value of the 1 st information at a 2 nd time after a predetermined time has elapsed from the 1 st time, for each group of the 3 rd information for which the absolute value of the time difference is calculated, and generating a set of the calculated autocorrelation coefficients as a 2 nd set;
4) Calculating an autocorrelation function representing a relationship between the set of time differences and the set of autocorrelation coefficients based on the 1 st set and the 2 nd set;
5) Analyzing the 1 st information chronologically based on the autocorrelation function; and 4. Outputting the 4 th information related to the analysis result.
7. A big-data-based block chain identity information confirmation system applying the big-data-based block chain identity information confirmation method according to any one of claims 1 to 6, the big-data-based block chain identity information confirmation system being provided with:
the registration login module is used for realizing a registration login dialog box of the block chain identity information confirmation system through a registration login program so as to realize the registration and login operations of the user;
the block chain storage module is used for storing the identity information and the generated key on each block chain link point through the cloud server;
the information encryption module is used for encrypting the acquired identity information data through a data encryption program;
the identity information acquisition module is used for acquiring identity information data which is registered by the system through an identity information acquisition program and based on big data;
the information decryption module is used for decrypting the encrypted identity information data through a data decryption program;
the information identification module is used for identifying the identity information data after the data decryption through a data identification program;
the information confirmation module is used for comparing and confirming the identified identity information through a data confirmation program;
the information management module is used for modifying, adding, removing and inquiring the personal information through a data management program;
the abnormity early warning module is used for early warning the abnormal identity information of the block chain identity information confirmation system through the acousto-optic early warning device;
and the display module is used for displaying a login registration interface, user identity information, a confirmation result and system early warning information of the block chain identity information confirmation system through a display.
8. A computer-readable storage medium storing instructions which, when executed on a computer, cause the computer to execute the big-data based block link identity information confirmation method according to any one of claims 1 to 6.
CN202010146277.0A 2020-03-05 2020-03-05 Block chain identity information confirmation system and confirmation method based on big data Active CN111404692B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010146277.0A CN111404692B (en) 2020-03-05 2020-03-05 Block chain identity information confirmation system and confirmation method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010146277.0A CN111404692B (en) 2020-03-05 2020-03-05 Block chain identity information confirmation system and confirmation method based on big data

Publications (2)

Publication Number Publication Date
CN111404692A CN111404692A (en) 2020-07-10
CN111404692B true CN111404692B (en) 2023-04-07

Family

ID=71432201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010146277.0A Active CN111404692B (en) 2020-03-05 2020-03-05 Block chain identity information confirmation system and confirmation method based on big data

Country Status (1)

Country Link
CN (1) CN111404692B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113076554B (en) * 2021-03-12 2022-10-11 广西东信易联科技有限公司 Physical examination data safe storage method based on block chain
CN113469854A (en) * 2021-06-22 2021-10-01 光载互联(杭州)科技有限公司 Information sharing system and method, medium and electronic device
CN114221792B (en) * 2021-11-23 2023-06-16 杭州天宽科技有限公司 Internet data transmission encryption system
CN116667993A (en) * 2023-04-28 2023-08-29 江苏芯信电子科技有限公司 Block chain identity confirmation system based on big data and using device thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789971A (en) * 2016-12-06 2017-05-31 广州市科恩电脑有限公司 A kind of encrypted transmission method of power carrier data
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A kind of decentralization identity authorization system and method based on block chain
CN109218319A (en) * 2018-09-21 2019-01-15 四川长虹电器股份有限公司 A kind of identity authorization system and authentication method based on block chain
CN109862041A (en) * 2019-03-27 2019-06-07 深圳市网心科技有限公司 A kind of digital identification authentication method, unit, system and storage medium
CN110493189A (en) * 2019-07-12 2019-11-22 深圳壹账通智能科技有限公司 Insurance data acquisition methods, device and storage medium, server
CN110740128A (en) * 2019-09-27 2020-01-31 武汉虹识技术有限公司 off-line data encryption method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075999B2 (en) * 2009-04-28 2015-07-07 Sandisk Technologies Inc. Memory device and method for adaptive protection of content

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789971A (en) * 2016-12-06 2017-05-31 广州市科恩电脑有限公司 A kind of encrypted transmission method of power carrier data
CN108833114A (en) * 2018-06-13 2018-11-16 上海交通大学 A kind of decentralization identity authorization system and method based on block chain
CN109218319A (en) * 2018-09-21 2019-01-15 四川长虹电器股份有限公司 A kind of identity authorization system and authentication method based on block chain
CN109862041A (en) * 2019-03-27 2019-06-07 深圳市网心科技有限公司 A kind of digital identification authentication method, unit, system and storage medium
CN110493189A (en) * 2019-07-12 2019-11-22 深圳壹账通智能科技有限公司 Insurance data acquisition methods, device and storage medium, server
CN110740128A (en) * 2019-09-27 2020-01-31 武汉虹识技术有限公司 off-line data encryption method and device

Also Published As

Publication number Publication date
CN111404692A (en) 2020-07-10

Similar Documents

Publication Publication Date Title
CN111404692B (en) Block chain identity information confirmation system and confirmation method based on big data
US9892404B2 (en) Secure identity authentication in an electronic transaction
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CN108429638B (en) Server operation and maintenance method, device and system and electronic equipment
CN108921696B (en) Intelligent contract calling and contract transaction verification method based on block chain
CN110995446B (en) Evidence verification method, device, server and storage medium
EP4092984A1 (en) Data processing method and apparatus, device and medium
CN113489710B (en) File sharing method, device, equipment and storage medium
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN110011950A (en) A kind of method for authenticating and device of video flowing address
CN113610526A (en) Data trust method and device, electronic equipment and storage medium
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN116361774A (en) Password cracking method and device
Yahya A security framework to protect data in cloud storage
CN113821820B (en) Method, device, medium and equipment for encrypting and decrypting resources in splitting mode
CN115865495A (en) Data transmission control method and device, electronic equipment and readable storage medium
CN115051816A (en) Privacy protection-based cloud computing method and device and financial data cloud computing method and device
CN112910883A (en) Data transmission method and device and electronic equipment
Rijanandi et al. Implementation of encrypt national ID card in Sinovi application use waterfall methodology
CN117499159B (en) Block chain-based data transaction method and device and electronic equipment
CN111382420A (en) Data transaction method, device, system, electronic equipment and readable storage medium
CN115296821B (en) Data processing system for digital collection management
US12022000B2 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
CN115906142B (en) Enterprise online interaction data management method
US20210243037A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant