CN111506667A - Calculation capacity transaction information data storage method based on partition authentication technology - Google Patents

Calculation capacity transaction information data storage method based on partition authentication technology Download PDF

Info

Publication number
CN111506667A
CN111506667A CN202010558560.4A CN202010558560A CN111506667A CN 111506667 A CN111506667 A CN 111506667A CN 202010558560 A CN202010558560 A CN 202010558560A CN 111506667 A CN111506667 A CN 111506667A
Authority
CN
China
Prior art keywords
transaction
node
information
data
trading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010558560.4A
Other languages
Chinese (zh)
Inventor
吴文杰
李学生
董政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Anmaiyun Network Technology Co ltd
Original Assignee
Hainan Anmaiyun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Anmaiyun Network Technology Co ltd filed Critical Hainan Anmaiyun Network Technology Co ltd
Priority to CN202010558560.4A priority Critical patent/CN111506667A/en
Publication of CN111506667A publication Critical patent/CN111506667A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • G06F16/278Data partitioning, e.g. horizontal or vertical partitioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a computing power transaction information data storage method based on a partition authentication technology, which comprises the steps of establishing data sharing for any two transaction nodes after establishing an information transaction area; and dividing the transaction node into a transaction unit with transaction data of an information transaction area and stored data and a link with the information transaction area. Establishing a trading node between any two information trading areas where trading occurs; each trading node shares data with the related information trading area; and each transaction node shares data with the operation platform. And carrying out electronic signature and private encryption on the transaction details and the transaction result, storing the ciphertext in the transaction node, and sending the ciphertext to the information transaction area through the transaction node to be stored in an account book form. The invention has the characteristics of collective maintenance, decentralization, trust consensus mechanism, data non-tampering and the like. The proposal of the block chain technology is beneficial to data storage, subsequent management and maintenance of intelligent engineering.

Description

Calculation capacity transaction information data storage method based on partition authentication technology
Technical Field
The invention relates to the field of information data protection, in particular to a calculation capacity transaction information data storage method based on a partition authentication technology.
Background
In the prior art, the content storage and verification are usually implemented by using a database technology. However, the database is in a centralized problem, once the center is broken, all the contents stored in the database are no longer safe, the data is easy to be hacked and tampered by hackers, and the data is difficult to be completely recovered after being lost. In order to ensure data security and high availability, a standby storage center is often established in a different place, and a database synchronous backup mode is adopted for carrying out synchronization in real time, but the operation and maintenance cost of an enterprise is increased. If the database is used for carrying out data security storage, the cost is greatly improved, and a plurality of participants need to carry out all queries through the database to acquire data, the query efficiency is low, the information is updated slowly, and the centralized security problem needs to be solved.
Intelligent engineering often includes multiple links, each participant in each link performing engineering transactions. In the internet environment, when value exchange activities with unfamiliar opponents are required, the progress of the whole intelligent engineering can be influenced by the problems of internet information security and transaction opponent integrity, and therefore, how to prevent malicious damage and cheating from the problems is important, and therefore wrong decisions are made.
The existing database used for data storage cannot solve the problems of data safety of intelligent engineering and network transaction trust, and even distributed database storage cannot be solved. In the internet + environment, blockchain technology is mentioned for application. Blockchains are append-only general ledger databases that exist in multiple copies on a peer-to-peer network. The method has the characteristics of collective maintenance, decentralization, trust consensus mechanism, data non-tampering and the like. The proposal of the block chain technology is beneficial to data storage and subsequent management and maintenance of intelligent engineering, but the block chain technology is not combined and utilized in the field of intelligent engineering at present. Therefore, a method for storing the data of the effort transaction information based on the partition authentication technology is needed to effectively solve the above problems.
Disclosure of Invention
The invention aims to provide a method for storing computing power transaction information data based on a partition authentication technology,
in order to achieve the purpose, the technical scheme adopted by the invention is as follows:
the invention comprises the following steps:
a, establishing data sharing for any two trading nodes after an information trading area is established;
b, dividing the transaction node into a transaction unit with transaction data of an information transaction area and stored data and a link with the information transaction area;
c, establishing a trading node between any two information trading areas where the trading occurs; each trading node shares data with the related information trading area, and each trading node shares data with the operation platform;
and D, carrying out electronic signature and private encryption on the transaction details and the transaction result, storing the ciphertext in the transaction node, and sending the ciphertext to the information transaction area through the transaction node to be stored in an account book form.
Furthermore, the transaction node also stores a primary private key and sends the primary private key to the information transaction area after encryption is completed.
Further, the transaction data storage method further comprises the following steps: E. and carrying out electronic signature on the transaction display content, carrying out public key encryption, storing the ciphertext in the transaction node, and sending the ciphertext to the operation platform through the transaction node.
Further, the encryption of the public key is completed in the transaction node, and the transaction node also stores the public key and sends the public key to the operation platform after the encryption is completed.
Further, an information transfer node is established between any two trading nodes, and each information transfer node shares data with the corresponding trading node.
Further, the establishing of the information transfer node specifically includes: and dividing the information transmission node into a total transaction unit storing total transaction data of the transaction node and a link with the transaction node.
And further, ciphertext in the transaction node is combined to be electronically signed and encrypted again, a new ciphertext is stored in the information transfer node, is transmitted and stored in the transaction node through the information transfer node, and is finally transmitted to the information transaction area through the transaction node to be stored in an account book dividing mode.
Compared with the prior art, the invention has the following beneficial effects:
the method has the characteristics of collective maintenance, decentralization, trust consensus mechanism, data non-falsification and the like, and the data storage method after the block chain technology is fused is favorable for the storage, the subsequent management and the maintenance of the data of the intelligent engineering.
Detailed Description
The present invention is further illustrated by the following examples, which are intended to be in a manner including, but not limited to, the following examples.
The invention comprises the following steps:
A. establishing data sharing for any two trading nodes after establishing the information trading area;
B. dividing the transaction node into a transaction unit with transaction data of an information transaction area and stored data and a link with the information transaction area;
C. establishing a trading node between any two information trading areas where trading occurs; each trading node shares data with the related information trading area, and each trading node shares data with the operation platform;
D. and carrying out electronic signature and private encryption on the transaction details and the transaction result, storing the ciphertext in the transaction node, and sending the ciphertext to the information transaction area through the transaction node to be stored in an account book form.
The data storage method in the embodiment is completed in the transaction node, and the transaction node also stores a primary private key and sends the primary private key to the information transaction area after encryption is completed.
The private encryption method in step D is not limited, and in this embodiment, a method of building WSNs (wireless sensor networks) is adopted for private encryption. Specifically, private key rings are pre-allocated to each node before the WSNs are deployed, and when two nodes have at least one same private key, the two nodes can establish a secure connection. Assuming that each sensor node stores k private keys (the length of a private key ring), j private keys can be used as base points of the seed key on the elliptic curve, and compared with other public key cryptosystems, the elliptic curve cryptosystem has shorter keys, so that the requirements of the method in the embodiment on energy consumption and memory capacity are greatly reduced. Each node is randomly distributed with a seed key which is only a base point on the elliptic curve, and before the WSNs are deployed, a private key ring based on the seed key is generated through point doubling operation of the elliptic curve. After the WSNs are deployed, if at least one private key is shared between neighboring nodes, they can establish a secure connection.
The transaction data storage method further comprises: E. and carrying out electronic signature on the transaction display content, carrying out public key encryption, storing the ciphertext in the transaction node, and sending the ciphertext to the operation platform through the transaction node.
The method is considered by combining factors such as the actual application scene and the requirement of the system on safety, and the like, no matter a symmetric structure or an asymmetric structure is used, the method is related to the rationality of storage management of the secret key, and if the management is unreasonable and the secret key is leaked, the password is not different from a running password. Meanwhile, considering that a system administrator is a person with subjective factors, regarding to the situations, aiming at a general system, the embodiment adopts the one-way hash function to solve the problem, in the embodiment, the one-way property of the one-way hash function is mainly utilized, the one-way property excludes artificial factors, and even if the administrator can see the content after encryption, the administrator cannot obtain the plaintext due to the use of the one-way hash function, because the one-way hash function is theoretically irreversible.
The encryption is completed in the transaction node, and the transaction node also stores a public key and sends the public key to the operation platform after the encryption is completed.
And establishing information transfer nodes between any two trading nodes, wherein each information transfer node shares data with the corresponding trading node.
The data storage method in this embodiment does not rely on a single program or technology to protect the stored data, but vertically and stereoscopically distributes multiple protection measures in the entire horizontal-structure storage network covering the host device, the network device, and the storage device, such as the storage access protection function of a Storage Area Network (SAN), that is, the number of logic units (L UN), masks (masking), and partitions are commonly used technologies to ensure that only authorized servers can access the designated storage array, or multiple data protection means of system root disk mirroring, dual-computer cluster, RAID level, redundant path, and remote disaster recovery are used in cooperation with a flexible backup scheme, and a zero downtime backup is used to achieve a good backup effect on the key service data that cannot be shut down.
The establishing of the information transfer node specifically includes: and dividing the information transmission node into a total transaction unit storing total transaction data of the transaction node and a link with the transaction node.
And the cryptographs in the transaction nodes are combined to carry out electronic signature and then encrypted, the new cryptograph is stored in the information transfer node, is transmitted and stored in the transaction node through the information transfer node, and is finally transmitted to the information transaction area through the transaction node to be stored in an account book dividing mode.
For example, the personal user can ensure the authenticity and validity of personal information by binding and verifying related information such as an identity card, a mobile phone number, a bank card and the like; and the enterprise user checks the enterprise information, binds the identity information of the authorized signer, and ensures that the enterprise main body information is legal and effective. In addition, digital certificate verification service is provided for all individuals and enterprise users, and the users use a third party authority (CA) which is authoritative and just, identify when logging in, signing and the like, and avoid identity spoofing.
The above-mentioned embodiment is only one of the preferred embodiments of the present invention, and should not be used to limit the scope of the present invention, but all the insubstantial modifications or changes made within the spirit and scope of the main design of the present invention, which still solve the technical problems consistent with the present invention, should be included in the scope of the present invention.

Claims (7)

1. A computing power transaction information data storage method based on a partition authentication technology is characterized by comprising the following steps:
A. establishing data sharing for any two trading nodes after establishing the information trading area;
B. dividing the transaction node into a transaction unit with transaction data of an information transaction area and stored data and a link with the information transaction area;
C. establishing a trading node between any two information trading areas where trading occurs; each trading node shares data with the related information trading area; and each transaction node shares data with the operation platform.
D. And carrying out electronic signature and private encryption on the transaction details and the transaction result, storing the ciphertext in the transaction node, and sending the ciphertext to the information transaction area through the transaction node to be stored in an account book form.
2. The method as claimed in claim 1, wherein the transaction node further stores a primary private key and sends the primary private key to the information transaction area after encryption is completed.
3. The method for storing the effort transaction information data based on the partition authentication technology as claimed in claim 1, further comprising: E. and carrying out electronic signature on the transaction display content, carrying out public key encryption, storing the ciphertext in the transaction node, and sending the ciphertext to the operation platform through the transaction node.
4. The method for storing the computing power transaction information data based on the partition authentication technology as claimed in claim 3, wherein the public key encryption is completed in the transaction node, and the transaction node further stores the public key and sends the public key to the operation platform after the encryption is completed.
5. The method for storing computing power transaction information data based on the partition authentication technology as claimed in claim 1, wherein in step C, an information transfer node is established between any two transaction nodes, and each information transfer node shares data with its corresponding transaction node.
6. The method for storing computing power transaction information data based on the partition authentication technology as claimed in any one of claims 1 or 5, wherein the establishing of the information transfer node in the step C specifically includes: and dividing the information transmission node into a total transaction unit storing total transaction data of the transaction node and a link with the transaction node.
7. The method for storing the computing power transaction information data based on the partition authentication technology as claimed in claim 1, wherein the cryptographs in the transaction nodes are combined for electronic signature and re-encryption, new cryptographs are stored in the information transfer nodes, sent and stored in the transaction nodes through the information transfer nodes, and finally sent to the information transaction area through the transaction nodes to be stored in a form of an account book.
CN202010558560.4A 2020-06-18 2020-06-18 Calculation capacity transaction information data storage method based on partition authentication technology Pending CN111506667A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010558560.4A CN111506667A (en) 2020-06-18 2020-06-18 Calculation capacity transaction information data storage method based on partition authentication technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010558560.4A CN111506667A (en) 2020-06-18 2020-06-18 Calculation capacity transaction information data storage method based on partition authentication technology

Publications (1)

Publication Number Publication Date
CN111506667A true CN111506667A (en) 2020-08-07

Family

ID=71865062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010558560.4A Pending CN111506667A (en) 2020-06-18 2020-06-18 Calculation capacity transaction information data storage method based on partition authentication technology

Country Status (1)

Country Link
CN (1) CN111506667A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560098A (en) * 2020-12-22 2021-03-26 广州技象科技有限公司 Business data management method and device of power Internet of things

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566357A (en) * 2017-08-25 2018-01-09 厦门益协作网络科技有限公司 A kind of internet business information data storing method based on subregion authentication techniques
CN107580034A (en) * 2017-08-25 2018-01-12 厦门易功成信息技术有限公司 A kind of intelligence engineering internet business system using partitioned storage data technique
CN107609844A (en) * 2017-10-10 2018-01-19 厦门易采购电子商务有限公司 A kind of intelligence engineering network transaction data management system based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107566357A (en) * 2017-08-25 2018-01-09 厦门益协作网络科技有限公司 A kind of internet business information data storing method based on subregion authentication techniques
CN107580034A (en) * 2017-08-25 2018-01-12 厦门易功成信息技术有限公司 A kind of intelligence engineering internet business system using partitioned storage data technique
CN107609844A (en) * 2017-10-10 2018-01-19 厦门易采购电子商务有限公司 A kind of intelligence engineering network transaction data management system based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560098A (en) * 2020-12-22 2021-03-26 广州技象科技有限公司 Business data management method and device of power Internet of things
CN112560098B (en) * 2020-12-22 2024-05-14 广州技象科技有限公司 Service data management method and device of electric power Internet of things

Similar Documents

Publication Publication Date Title
KR101908712B1 (en) Security method for smart grid system using block chain
CN110059494A (en) A kind of method for secret protection and block catenary system of block chain transaction data
CN107819753B (en) Block chain transaction system and method without complete anonymity
US5867578A (en) Adaptive multi-step digital signature system and method of operation thereof
KR20200139223A (en) Computer-implemented methods and systems for delivering access to digital assets
CN110741600A (en) Computer-implemented system and method for providing a decentralized protocol to retrieve encrypted assets
CN111656386B (en) Managing transaction requests in ledger system
CN113259135B (en) Lightweight blockchain communication authentication device and method for detecting data tamper
He et al. A novel cryptocurrency wallet management scheme based on decentralized multi-constrained derangement
Kim et al. Ddos mitigation: Decentralized cdn using private blockchain
CN112529573A (en) Combined block chain threshold signature method and system
Wang et al. Staged data delivery protocol: A blockchain‐based two‐stage protocol for non‐repudiation data delivery
CN111630545A (en) Managing transaction requests in ledger system
CN110519222A (en) Outer net access identity authentication method and system based on disposable asymmetric key pair and key card
Liu et al. A blockchain-based cross-domain authentication management system for IoT devices
CN109951286A (en) Encryption authentication system and method for medical block chain communication system
CN106230840A (en) A kind of command identifying method of high security
Li et al. Recoverable private key scheme for consortium blockchain based on verifiable secret sharing
CN111506667A (en) Calculation capacity transaction information data storage method based on partition authentication technology
CN110278087B (en) File encryption and de-duplication method based on secondary hash and zero knowledge verification method
CN110430047B (en) Anti-quantum computing energy-saving equipment key negotiation method and system based on asymmetric key and MQV
CN111541668A (en) Energy Internet of things information safe transmission and storage method based on block chain
CN114124392B (en) Data controlled circulation method, system, device and medium supporting access control
CN111382462A (en) Anti-counterfeiting method based on block chain
CN111630549A (en) Managing transaction requests in ledger system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200807