CN111641494A - Method and device for realizing global block chain - Google Patents

Method and device for realizing global block chain Download PDF

Info

Publication number
CN111641494A
CN111641494A CN202010398639.5A CN202010398639A CN111641494A CN 111641494 A CN111641494 A CN 111641494A CN 202010398639 A CN202010398639 A CN 202010398639A CN 111641494 A CN111641494 A CN 111641494A
Authority
CN
China
Prior art keywords
module
encryption algorithm
block chain
platform
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010398639.5A
Other languages
Chinese (zh)
Inventor
洪志加
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongxin Network Technology Co ltd
Original Assignee
Guangdong Hongxin Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongxin Network Technology Co ltd filed Critical Guangdong Hongxin Network Technology Co ltd
Priority to CN202010398639.5A priority Critical patent/CN111641494A/en
Publication of CN111641494A publication Critical patent/CN111641494A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a device for realizing a global block chain, wherein the method comprises the following steps: clicking application in a corresponding service module on a client application service platform, sending application information to a background through a wireless communication module, generating a corresponding identification and processing result by the background, generating a group of digital signatures, and establishing a corresponding service relationship between the digital signatures and a docking port; the financial accounting block chain management platform establishes the general storage and restoration, gathering, consulting and trace recording functions of a consensus layer, fragments scattered information and establishes files, and the files are calculated and classified and then are transmitted to all related business participation partners through the wireless communication module to be operated and memorized; and the partner financial processing information platform feeds back the processing information to the financial accounting block chain management platform, and the financial accounting block chain management platform automatically feeds back the processing information to the terminal application client. The invention has various data transmission modes, can meet the requirements of users on the various data transmission modes, and has higher data transmission safety.

Description

Method and device for realizing global block chain
Technical Field
The present invention relates to the field of a block chain, and in particular, to a method and an apparatus for implementing a global block chain.
Background
The cloud storage system is a cloud computing system taking data storage and management as a core, has good online expansion capacity, can be compatible with heterogeneous storage devices, provides cache acceleration and load balancing services across data centers, and provides high-performance services for users. Finance is an economic relation objectively existing in the process of reproducing material data of each department and unit of national economy and embodied in the process of fund movement. The financial data processing method in the prior art is simple, centralized management is removed, the operation cost is reduced, the safety performance is high, the financial data processing efficiency is improved, the automatic collection, classification and calculation of the financial data can be realized, and the working efficiency is further improved; each module is relatively independent, and flexible configuration, upgrading and management can be performed; and the method of real-time flow classification is adopted, so that the user satisfaction is improved. However, the data transmission method is single, and cannot meet the user's requirements for diversified data transmission methods.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and an apparatus for implementing a global block chain, which has multiple data transmission modes, can meet the user's requirements for diversified data transmission modes, and has high security of data transmission, in view of the above-mentioned defects in the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: an implementation method for constructing a global block chain comprises the following steps:
A) a client clicks application in a corresponding service module on a client application service platform, the client application service platform sends application information to a background through a wireless communication module, the background generates a corresponding identifier and a processing result, a group of digital signatures are generated according to the identifier and the processing result, and a corresponding service relationship is established between the digital signatures and a butt joint port; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
B) the information processing platform makes a corresponding processing result on corresponding data, encrypts the processing result by using an encryption algorithm and feeds the encrypted processing result back to the financial accounting block chain management platform;
C) the financial accounting block chain management platform establishes the general storage and restoration, gathering, consulting and trace recording functions of a consensus layer, fragments scattered information and establishes files, and the files are calculated and classified and then are transmitted to all related business participation partners through the wireless communication module to be operated and memorized;
D) and the partner financial processing information platform feeds processing information back to the financial accounting block chain management platform, and the financial accounting block chain management platform automatically feeds back the processing information to the terminal application client.
In the method for implementing the global block chain, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm or an ECC encryption algorithm.
In the implementation method of the global block chain, the functions of total storage and repair, summarization, look-up and trace recording are realized through the financial accounting block chain consensus layer module of the financial accounting block chain management platform.
The invention also relates to a device for realizing the global block chain, which comprises the following steps:
an application information transmitting unit: the system comprises a client application service platform, a wireless communication module, a docking port and a service module, wherein the client application service platform is used for clicking application in a corresponding service module on the client application service platform, sending application information to a background through the wireless communication module, generating a corresponding identifier and a corresponding processing result by the background, generating a group of digital signatures according to the identifier and the processing result, and establishing a corresponding service relationship between the digital signatures and the docking port; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
an encryption feedback unit: the system comprises an information processing platform, a financial accounting block chain management platform and a data processing platform, wherein the information processing platform is used for making a corresponding processing result on corresponding data, encrypting the processing result by using an encryption algorithm and feeding back the encrypted processing result to the financial accounting block chain management platform;
a memory storage unit: the system comprises a financial accounting block chain management platform, a wireless communication module, a data processing module and a data processing module, wherein the financial accounting block chain management platform is used for establishing total storage and repair, summarization, look-up and trace record functions of a consensus layer, fragmenting scattered information and establishing files, calculating and classifying the files, and then transmitting the files to all related business participation partners through the wireless communication module to operate and memorize and store the files;
a processing information feedback unit: and the partner financial processing information platform feeds processing information back to the financial accounting block chain management platform, and the financial accounting block chain management platform automatically feeds back the processing information to the terminal application client.
In the device of the present invention, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm, or an ECC encryption algorithm.
In the device, the functions of total storage and repair, summarization, lookup and trace recording are realized through the financial accounting block chain consensus layer module of the financial accounting block chain management platform.
The implementation of the method and the device for realizing the global block chain has the following beneficial effects: the client application service platform sends the application information to the background through the wireless communication module, the background generates corresponding identification and processing results, a group of digital signatures are generated according to the identification and the processing results, and a corresponding service relationship is established between the digital signatures and the butt joint ports; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the information processing platform makes a corresponding processing result on corresponding data, encrypts the processing result by using an encryption algorithm and feeds the encrypted processing result back to the financial accounting block chain management platform; the invention has various data transmission modes, can meet the requirements of users on the various data transmission modes, and has higher data transmission safety.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a method in an embodiment of a method and apparatus for implementing global blockchains of the present invention;
fig. 2 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the method and the device for implementing the global block chain, a flowchart of the method for implementing the global block chain is shown in fig. 1. In fig. 1, the implementation method of the global block chain includes the following steps:
step S01, the client clicks application in the corresponding service module on the client application service platform, the client application service platform sends the application information to the background through the wireless communication module, the background generates corresponding identification and processing result, a group of digital signature is generated according to the identification and processing result, and the digital signature and the butt joint port establish corresponding service relationship: in the step, the client clicks application in a corresponding service module on a client application service platform, the client application service platform sends application information to a background through a wireless communication module, the background generates corresponding identification and processing results after receiving the application information, then generates a group of digital signatures according to the identification and the processing results, and establishes a corresponding service relationship between the digital signatures and the docking ports. The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase the flexibility of wireless communication mode, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires the communication quality to be higher. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The implementation method of the global block chain has various data transmission modes and can meet the requirements of users on diversified data transmission modes.
Step S02, the information processing platform makes corresponding processing results to the corresponding data, and the processing results are encrypted by an encryption algorithm and then fed back to the financial accounting blockchain management platform: in this step, the information processing platform makes a corresponding processing result for the corresponding data, and the processing result is encrypted by using an encryption algorithm and then fed back to the accounting block chain management platform. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm or ECC encryption algorithm. By encrypting data, the security of data transmission is higher.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states, which is used to replace the original DES encryption algorithm, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. RSA is the first algorithm that can be used for both encryption and parity signing, which is resistant to all cryptographic attacks known so far, and has been recommended by ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: MD5 processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The SHA1 encryption algorithm is a message digest algorithm that is as popular as the MD5 encryption algorithm. The SHA encryption algorithm mimics the MD4 encryption algorithm. The SHA encryption algorithm 1 is designed to be used with a Digital Signature Algorithm (DSA). The SHA1 encryption algorithm is mainly applicable to the digital signature algorithm defined in the digital signature standard. For messages less than 2 "64 bits in length, the SHA1 encryption algorithm would generate a 160-bit message digest. This message digest may be used to verify the integrity of the data when the message is received. During the transmission, the data is likely to change, and then different message digests are generated at this time. The SHA1 encryption algorithm may not recover information from a message digest, and two different messages may not produce the same message digest. Thus, the SHA1 encryption algorithm can verify the integrity of the data, so the SHA1 encryption algorithm is said to be a technique for ensuring the integrity of the file.
The SHA1 encryption algorithm may take no more than 264 bits of data input and produce a 160-bit digest. The input is divided into blocks of 512 bits and processed separately. A 160-bit buffer is used to hold the intermediate and final results of the hash function. The buffer may be represented by 5 32-bit registers (A, B, C, D and E). The SHA1 encryption algorithm is an algorithm with stronger security than the MD5 encryption algorithm, and theoretically, all digital authentication algorithms adopting a message digest mode have collision, namely, message digests calculated by two different things are the same, so that the intercommunication cheating graph is the same. However, the algorithm with high security is difficult to find the 'collision' of the specified data, and the 'collision' is more difficult to calculate by using the formula, so far, only the MD5 in the general security algorithm is broken.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The keys of the sender and the receiver of the HMAC encryption algorithm are calculated, and a third party without the keys cannot calculate the correct hash value, so that data can be prevented from being tampered.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (which are more CPU-intensive than the RSA algorithm).
Step S03 financial accounting block chain management platform establishes common layer total storage and repair, summarization, look up and trace record total functions, fragmentizes scattered information to build files, calculates and classifies the files, and transmits the files to each related business participation partner through a wireless communication module to operate and memorize and store: in the step, the accounting block chain management platform establishes the general storage and restoration, gathering, looking up and trace recording functions of the consensus layer, creates files by fragmenting scattered information, calculates and classifies the files, and transmits the files to all related business participation partners through the wireless communication module to operate and memorize and store the files. It is worth mentioning that the functions of total storage and repair, summarization, lookup and trace recording are realized through the financial accounting block chain consensus layer module of the financial accounting block chain management platform.
Step S04 partner financial processing information platform feeds back the processing information to financial accounting blockchain management platform, and the financial accounting blockchain management platform automatically feeds back to terminal application client: in the step, the partner financial processing information platform feeds back the processing information to the financial accounting block chain management platform, and the financial accounting block chain management platform automatically feeds back the processing information to the terminal application client.
The embodiment also relates to a device for implementing the implementation method of the global block chain, and a schematic structural diagram of the device is shown in fig. 2. In fig. 2, the apparatus includes an application information sending unit 1, an encryption feedback unit 2, a memory storage unit 3, and a processing information feedback unit 4; the application information sending unit 1 is used for a client to click application in a corresponding service module on a client application service platform, the client application service platform sends application information to a background through a wireless communication module, the background generates a corresponding identifier and a processing result, a group of digital signatures are generated according to the identifier and the processing result, and a corresponding service relationship is established between the digital signatures and a docking port. The wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase the flexibility of wireless communication mode, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires the communication quality to be higher. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The device of the invention has various data transmission modes and can meet the requirements of users on diversified data transmission modes.
The encryption feedback unit 2 is used for the information processing platform to make a corresponding processing result for the corresponding data, and the processing result is encrypted by using an encryption algorithm and then fed back to the accounting block chain management platform. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm or ECC encryption algorithm. By encrypting data, the security of data transmission is higher.
The memory storage unit 3 is used for the financial accounting block chain management platform to establish the total functions of the consensus layer, such as total storage, restoration, summarization, look-up and trace recording, and fragmented and scattered information is filed, calculated and classified, and then transmitted to each related business participation partner through the wireless communication module to be operated and memorized. It is worth mentioning that the functions of total storage and repair, summarization, lookup and trace recording are realized through the financial accounting block chain consensus layer module of the financial accounting block chain management platform.
The processing information feedback unit 4 is used for the partner financial processing information platform to feed back the processing information to the financial accounting block chain management platform, and the financial accounting block chain management platform automatically feeds back the processing information to the terminal application client.
In short, in this embodiment, since the client is configured to click to apply in the corresponding service module on the client application service platform, the client application service platform sends the application information to the background through the wireless communication module, the background generates the corresponding identifier and processing result, generates a set of digital signatures according to the identifier and processing result, and establishes a corresponding service relationship between the digital signatures and the docking port; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; the information processing platform makes a corresponding processing result on corresponding data, encrypts the processing result by using an encryption algorithm and feeds the encrypted processing result back to the financial accounting block chain management platform; the invention has various data transmission modes, can meet the requirements of users on the various data transmission modes, and has higher data transmission safety.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (6)

1. A method for implementing global block chains is characterized by comprising the following steps:
A) a client clicks application in a corresponding service module on a client application service platform, the client application service platform sends application information to a background through a wireless communication module, the background generates a corresponding identifier and a processing result, a group of digital signatures are generated according to the identifier and the processing result, and a corresponding service relationship is established between the digital signatures and a butt joint port; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
B) the information processing platform makes a corresponding processing result on corresponding data, encrypts the processing result by using an encryption algorithm and feeds the encrypted processing result back to the financial accounting block chain management platform;
C) the financial accounting block chain management platform establishes the general storage and restoration, gathering, consulting and trace recording functions of a consensus layer, fragments scattered information and establishes files, and the files are calculated and classified and then are transmitted to all related business participation partners through the wireless communication module to be operated and memorized;
D) and the partner financial processing information platform feeds processing information back to the financial accounting block chain management platform, and the financial accounting block chain management platform automatically feeds back the processing information to the terminal application client.
2. The method of claim 1, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, or an ECC encryption algorithm.
3. The method of claim 2, wherein the functions of total storage and repair, aggregation, lookup and trace recording are implemented by a financial block chain consensus layer module of the financial block chain management platform.
4. An apparatus for implementing the global block chain according to claim 1, comprising:
an application information transmitting unit: the system comprises a client application service platform, a wireless communication module, a docking port and a service module, wherein the client application service platform is used for clicking application in a corresponding service module on the client application service platform, sending application information to a background through the wireless communication module, generating a corresponding identifier and a corresponding processing result by the background, generating a group of digital signatures according to the identifier and the processing result, and establishing a corresponding service relationship between the digital signatures and the docking port; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
an encryption feedback unit: the system comprises an information processing platform, a financial accounting block chain management platform and a data processing platform, wherein the information processing platform is used for making a corresponding processing result on corresponding data, encrypting the processing result by using an encryption algorithm and feeding back the encrypted processing result to the financial accounting block chain management platform;
a memory storage unit: the system comprises a financial accounting block chain management platform, a wireless communication module, a data processing module and a data processing module, wherein the financial accounting block chain management platform is used for establishing total storage and repair, summarization, look-up and trace record functions of a consensus layer, fragmenting scattered information and establishing files, calculating and classifying the files, and then transmitting the files to all related business participation partners through the wireless communication module to operate and memorize and store the files;
a processing information feedback unit: and the partner financial processing information platform feeds processing information back to the financial accounting block chain management platform, and the financial accounting block chain management platform automatically feeds back the processing information to the terminal application client.
5. The apparatus of claim 4, wherein the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, a SHA1 encryption algorithm, an HMAC encryption algorithm, or an ECC encryption algorithm.
6. The apparatus of claim 5, wherein the functions of total storage and repair, aggregation, review and trace recording are implemented by a financial block chain consensus layer module of the financial block chain management platform.
CN202010398639.5A 2020-05-12 2020-05-12 Method and device for realizing global block chain Withdrawn CN111641494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010398639.5A CN111641494A (en) 2020-05-12 2020-05-12 Method and device for realizing global block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010398639.5A CN111641494A (en) 2020-05-12 2020-05-12 Method and device for realizing global block chain

Publications (1)

Publication Number Publication Date
CN111641494A true CN111641494A (en) 2020-09-08

Family

ID=72331146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010398639.5A Withdrawn CN111641494A (en) 2020-05-12 2020-05-12 Method and device for realizing global block chain

Country Status (1)

Country Link
CN (1) CN111641494A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113052721A (en) * 2021-03-18 2021-06-29 国网北京市电力公司 Electric power data processing method and device
CN113052721B (en) * 2021-03-18 2024-04-30 国网北京市电力公司 Power data processing method and device

Similar Documents

Publication Publication Date Title
CN109743171B (en) Key series method for solving multi-party digital signature, timestamp and encryption
CN105376261B (en) Encryption method and system for instant messaging message
US20240160792A1 (en) Cryptographic method for verifying data
US20060101271A1 (en) Method and system for conveying alternate acceptable canonicalizations of a digitally signed piece of electronic mail
US7894608B2 (en) Secure approach to send data from one system to another
US11956367B2 (en) Cryptographic method for verifying data
CN116321129B (en) Lightweight dynamic key-based power transaction private network communication encryption method
CN108090370A (en) Instant messaging encryption method and system based on index
CN101667999A (en) Method and system for transmitting peer-to-peer broadcast stream, data signature device and client
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN112003707A (en) Quantum computation attack resistant block chain digital signature encryption method and system
CN111432403A (en) Data auditing method and device based on block chain
CN114499857B (en) Method for realizing data correctness and consistency in encryption and decryption of large data quanta
CN111800784A (en) Block chain cloud service system based on cloud computing
Chaeikar et al. Secure SMS transmission based on social network messages
CN111683061A (en) Block chain-based Internet of things equipment access control method and device
WO2008133521A1 (en) Method for signing and encrypting digital data
CN111641494A (en) Method and device for realizing global block chain
CN111931194A (en) Security monitoring big data processing method and device based on cloud computing
CN111654854A (en) Remote data optimized transmission method and system based on cloud computing system
CN111654859A (en) Mobile block chain resource allocation method and device
CN111800384A (en) Financial service application management method and device based on block chain
CN111967955A (en) Electronic financial wind-controlled payment system based on block chain and 5G network technology
Mitchell et al. Solutions to the multidestination secure electronic mail problem
CN111698219A (en) Block chain ledger implementation method and device based on material spectral characteristics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200908

WW01 Invention patent application withdrawn after publication