CN111814175A - Inter-block chain cross-chain information transmission control system - Google Patents

Inter-block chain cross-chain information transmission control system Download PDF

Info

Publication number
CN111814175A
CN111814175A CN202010964082.7A CN202010964082A CN111814175A CN 111814175 A CN111814175 A CN 111814175A CN 202010964082 A CN202010964082 A CN 202010964082A CN 111814175 A CN111814175 A CN 111814175A
Authority
CN
China
Prior art keywords
data request
request information
block
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010964082.7A
Other languages
Chinese (zh)
Other versions
CN111814175B (en
Inventor
张春林
李利军
王庆丰
常江波
尚雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dongfang tongwangxin Technology Co.,Ltd.
Beijing dongfangtong Software Co.,Ltd.
BEIJING TESTOR TECHNOLOGY Co.,Ltd.
Beijing Tongtech Co Ltd
Original Assignee
Beijing Dongfangtong Software Co ltd
Beijing Microvision Technology Co ltd
Beijing Testor Technology Co ltd
Beijing Tongtech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dongfangtong Software Co ltd, Beijing Microvision Technology Co ltd, Beijing Testor Technology Co ltd, Beijing Tongtech Co Ltd filed Critical Beijing Dongfangtong Software Co ltd
Priority to CN202010964082.7A priority Critical patent/CN111814175B/en
Publication of CN111814175A publication Critical patent/CN111814175A/en
Application granted granted Critical
Publication of CN111814175B publication Critical patent/CN111814175B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention discloses a block inter-chain cross-chain information transmission control system, which comprises: a first blockchain and a second blockchain; wherein, the first block chain is provided with at least one first block node; first block node information is stored on the first block node; at least one second block node is arranged on the second block chain; second block node information is stored on the second block node; and the cross-chain interaction module is respectively connected with the first block chain and the second block chain and is used for realizing data sharing of the first block chain and the second block chain. Has the advantages that: the data access efficiency of the trans-block chain can be improved, data safety is guaranteed when the trans-block chain data access is realized, and user experience is improved.

Description

Inter-block chain cross-chain information transmission control system
Technical Field
The invention relates to the technical field of computer application, in particular to a system for controlling inter-block chain cross-link information transmission.
Background
With the widespread understanding and recognition of blockchain technology, many different types of blockchains have emerged. However, in the prior art, the blockchains are independent from each other, and it is difficult to implement data sharing between blockchains, and manual participation is also required, which results in low data access efficiency across blockchains. Meanwhile, when data access of a cross-block chain is realized, data leakage and data loss are easy to occur, and data safety cannot be well guaranteed.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the art described above. Therefore, the invention aims to provide a system for controlling inter-block-chain information transmission, which can improve the data access efficiency of the inter-block-chain, ensure the data security and improve the user experience when realizing the data access of the inter-block-chain.
To achieve the above object, an embodiment of the present invention provides a system for controlling inter-block chain inter-link information transmission, including:
a first blockchain and a second blockchain; wherein the content of the first and second substances,
at least one first block node is arranged on the first block chain; first block node information is stored on the first block node;
at least one second block node is arranged on the second block chain; second block node information is stored on the second block node;
the cross-chain interaction module is respectively connected with the first block chain and the second block chain and is used for realizing data sharing of the first block chain and the second block chain; wherein the content of the first and second substances,
the cross-chain interaction module comprises:
the first storage module is used for receiving the first block node information sent by the first block node and carrying out encryption storage;
the second storage module is used for receiving and encrypting the second block node information sent by the second block node;
the data sharing module is respectively connected with the first storage module and the second storage module and is used for:
receiving first data request information sent by the first block node, acquiring first data in the second storage module according to the first data request information, and sending the first data to the first block node;
and receiving second data request information sent by the second block node, acquiring second data in the first storage module according to the second data request information, and sending the second data to the second block node.
According to the inter-block-chain interlinkage information transmission control system provided by the embodiment of the invention, the first block node information of the first block chain and the second block node information of the second block chain are sent to the interlinkage interaction module, so that the first block chain and the second block chain can realize data sharing, the calling of the first block node information on the first block chain and the second block node information on the second block chain is reduced in the process of realizing data sharing, the data sharing is realized through the first block node information and the second block node information stored in the interlinkage interaction module, and the data access efficiency of the interlinkage block chain is improved. Meanwhile, the first block node information and the second block node information are stored on the cross-chain interaction module in an encrypted mode, so that data safety is guaranteed and user experience is improved when cross-block-chain data access is achieved.
According to some embodiments of the invention, the first block node information comprises identification information, authentication information and address information of the first block node.
The second block node information includes identification information, authentication information, and address information of the second block node.
According to some embodiments of the invention, the data sharing module comprises:
a data request information validation module to:
receiving first data request information sent by the first block node, and judging whether the first data request information is legal or not;
receiving second data request information sent by the second block node, and judging whether the second data request information is legal or not;
the decryption module is connected with the data request information verification module and is used for:
when the data request information verification module determines that the first data request information is legal, acquiring a first encryption identifier of first data in the second storage module according to the first data request information, inquiring in a decryption database according to the first encryption identifier to acquire a first decryption serial number, and decrypting the first data according to the first decryption serial number;
when the data request information verification module determines that the second data request information is legal, acquiring a second encryption identifier of second data in the first storage module according to the second data request information, inquiring a decryption database according to the second encryption identifier to acquire a second decryption serial number, and decrypting the second data according to the second decryption serial number;
a sending module, connected to the decryption module, for:
sending the decrypted first data to the first block node;
and sending the decrypted second data to the second block node.
According to some embodiments of the present invention, a first detection module is disposed on the first blockchain, and configured to detect first missing block information and first newly added block information on the first blockchain according to a preset time interval;
the first storage module is further configured to:
receiving first lost block information sent by the first detection module, acquiring corresponding first lost block data according to the first lost block information, and sending the first lost block data to a first block chain;
receiving first newly added block information sent by the first detection module, and updating data according to the first newly added block information;
the second block chain is provided with a second detection module used for detecting second lost block information and second newly added block information on the second block chain according to a preset time interval;
the second storage module is further configured to:
receiving second lost block information sent by the second detection module, acquiring corresponding second lost block data according to the second lost block information, and sending the second lost block data to a second block chain;
and receiving second newly added block information sent by the second detection module, and updating data according to the second newly added block information.
According to some embodiments of the invention, the data sharing module further comprises:
a ranking module to:
receiving first data request information sent by the first block node, acquiring first priority information of the first data request information, and establishing a first queuing queue according to the first priority information;
receiving second data request information sent by the second block node, acquiring second priority information of the second data request information, and establishing a second queuing queue according to the second priority information;
receiving first data request information sent by the first block node and second data request information sent by the second block node, obtaining third priority information according to the first data request information and the second data request information, and establishing a third queuing queue according to the third priority information.
A data processing module, connected to the sorting module, for:
receiving a first queuing queue sent by the sorting module, and processing first data request information according to the first queuing queue;
receiving a second queuing queue sent by the sorting module, and processing second data request information according to the second queuing queue;
and receiving a third queuing queue sent by the sorting module, and processing the first data request information and the second data request information according to the third queuing queue.
According to some embodiments of the present invention, the encrypting includes storing the first block node information in the first storage module after salting HASH and sha256 encryption.
According to some embodiments of the invention, the determining whether the first data request information is legal includes: and performing similarity matching on the first data request information and preset first data request information in a first data request database based on the first data request database corresponding to the first data request information, and determining that the first data request information is legal when the similarity between the first data request information and the preset first data request information is greater than a preset similarity threshold.
According to some embodiments of the present invention, the similarity matching of the first data request information and preset first data request information in a first data request database includes:
performing data segmentation processing on the first data request information and preset first data request information to obtain
Figure 890606DEST_PATH_IMAGE001
Sub first data request information and
Figure 807747DEST_PATH_IMAGE001
the individual presets the first data request information, calculates
Figure 528096DEST_PATH_IMAGE002
Sub first data request information and
Figure 923306DEST_PATH_IMAGE002
the similarity of the first data request information is preset by each son
Figure 737678DEST_PATH_IMAGE003
Figure 560140DEST_PATH_IMAGE004
Wherein the content of the first and second substances,
Figure 764857DEST_PATH_IMAGE005
is as follows
Figure 963757DEST_PATH_IMAGE002
Sub-first data request information;
Figure 632636DEST_PATH_IMAGE006
is as follows
Figure 626000DEST_PATH_IMAGE002
The method comprises the steps that first data request information is preset by each son;
Figure 318012DEST_PATH_IMAGE007
is as follows
Figure 55024DEST_PATH_IMAGE002
The number of semantic concepts in the sub-first data request information;
Figure 578409DEST_PATH_IMAGE008
is as follows
Figure 8253DEST_PATH_IMAGE002
The number of semantic concepts in the first data request information is preset by each son;
Figure 187562DEST_PATH_IMAGE009
for semantic concepts
Figure 462686DEST_PATH_IMAGE010
In the first place
Figure 106157DEST_PATH_IMAGE002
The number of occurrences in the sub-first data request message;
Figure 441323DEST_PATH_IMAGE011
for semantic concepts
Figure 107928DEST_PATH_IMAGE012
In the first place
Figure 186742DEST_PATH_IMAGE002
The number of times of occurrence in the first data request information is preset by each son;
Figure 684720DEST_PATH_IMAGE010
is at the first
Figure 456366DEST_PATH_IMAGE002
First in the sub first data request message
Figure 344688DEST_PATH_IMAGE013
A semantic concept;
Figure 227193DEST_PATH_IMAGE012
is at the first
Figure 579677DEST_PATH_IMAGE002
The first data request message is preset by the first sub-unit
Figure 522225DEST_PATH_IMAGE014
Language of a languageDefining a concept;
computing first data request information
Figure 897843DEST_PATH_IMAGE015
And presetting first data request information
Figure 318460DEST_PATH_IMAGE016
Degree of similarity of
Figure 791030DEST_PATH_IMAGE017
Figure 904479DEST_PATH_IMAGE018
Wherein the content of the first and second substances,
Figure 767393DEST_PATH_IMAGE019
after the first data request information and the preset first data request information are subjected to data segmentation processing
Figure 991701DEST_PATH_IMAGE002
Sub first data request information and
Figure 53198DEST_PATH_IMAGE002
the number of the semantic concepts in the first data request information is preset by the number of the children.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a block diagram of an inter-block chain inter-chain information transfer control system according to an embodiment of the present invention;
FIG. 2 is a block diagram of a data sharing module according to one embodiment of the invention.
Reference numerals:
the system comprises a first block chain 1, a first block node 11, a second block chain 2, a second block node 22, a cross-chain interaction module 3, a first storage module 31, a second storage module 32, a data sharing module 33, a data request information verification module 331, a decryption module 332 and a sending module 333.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
A system for controlling inter-block chain inter-link information transmission according to an embodiment of the present invention is described below with reference to fig. 1 to 2.
Fig. 1 is a block diagram of an inter-block chain inter-chain information transfer control system according to an embodiment of the present invention; as shown in fig. 1, includes:
a first blockchain 1 and a second blockchain 2; wherein the content of the first and second substances,
at least one first block node 11 is arranged on the first block chain 1; the first block node 11 stores first block node information;
at least one second block node 22 is arranged on the second block chain 2; the second block node 22 stores second block node information thereon;
the cross-chain interaction module 3 is respectively connected with the first block chain 1 and the second block chain 2, and is used for enabling the first block chain 1 and the second block chain 2 to realize data sharing; wherein the content of the first and second substances,
the cross-chain interaction module 3 comprises:
a first storage module 31, configured to receive the first block node information sent by the first block node 11 and perform encryption storage;
a second storage module 32, configured to receive the second block node information sent by the second block node 22, and encrypt and store the second block node information;
a data sharing module 33, respectively connected to the first storage module 31 and the second storage module 32, and configured to:
receiving first data request information sent by the first block node 11, acquiring first data in the second storage module 32 according to the first data request information, and sending the first data to the first block node 11;
receiving second data request information sent by the second block node 22, obtaining second data in the first storage module 31 according to the second data request information, and sending the second data to the second block node 22.
The working principle of the technical scheme is as follows: a first block chain 1 and a second block chain 2 are used as two independent block chains, and the first block chain 1 and the second block chain 2 need to realize data sharing through a cross-chain interaction module 3; a cross-chain interaction module 3, comprising: the first storage module 31 is configured to receive the first block node information sent by the first block node 11 and perform encryption storage; the second storage module 32 is configured to receive the second block node information sent by the second block node 22 and encrypt and store the second block node information; when the first block chain 1 needs to acquire data on the second block chain 2, the first block chain 1 sends first data request information to the data sharing module 33 through the first block node 11 arranged on the first block chain 1, and the data sharing module 33 performs data retrieval in the second storage module 32 according to the first data request information, acquires first data stored in the second storage module 32, and sends the first data to the first block node 11. When the second block chain 2 needs to acquire data in the first block chain 1, the second block chain 2 sends second data request information to the data sharing module 33 through the second block node 22 arranged on the second block chain 2, and the data sharing module 33 performs data retrieval in the first storage module 31 according to the second data request information, acquires second data stored in the first storage module 31, and sends the second data to the second block node 22.
The beneficial effects of the above technical scheme are that: the first block node information of the first block chain 1 and the second block node information of the second block chain 2 are sent to the cross-chain interaction module 3, so that data sharing can be realized between the first block chain 1 and the second block chain 2, in the process of realizing data sharing, the calling of the first block node information on the first block chain 1 and the second block node information on the second block chain 2 is reduced, data sharing is realized through the first block node information and the second block node information stored on the cross-chain interaction module 3, and the data access efficiency of the cross-chain block is improved. Meanwhile, the first block node information and the second block node information are stored on the cross-chain interaction module 3 in an encrypted manner, so that when data access of a cross-block chain is realized, data safety is guaranteed, and user experience is improved.
According to some embodiments of the present invention, the first block node information includes identification information, authentication information, and address information of the first block node 11.
The second block node information includes identification information, authentication information, and address information of the second block node 22.
As shown in fig. 2, the data sharing module 33 includes:
a data request information verification module 331 configured to:
receiving first data request information sent by the first block node 11, and judging whether the first data request information is legal;
receiving second data request information sent by the second block node 22, and determining whether the second data request information is legal;
a decryption module 332, connected to the data request information verification module 331, configured to:
when the data request information verification module 331 determines that the first data request information is legal, a first encryption identifier of first data is acquired in the second storage module 32 according to the first data request information, a first decryption serial number is acquired by querying a decryption database according to the first encryption identifier, and the first data is decrypted according to the first decryption serial number;
when the data request information verification module 331 determines that the second data request information is legal, a second encryption identifier of second data is acquired in the first storage module 31 according to the second data request information, a second decryption serial number is obtained by querying a decryption database according to the second encryption identifier, and the second data is decrypted according to the second decryption serial number;
a sending module 333, connected to the decryption module 332, configured to:
sending the decrypted first data to the first block node 11;
the decrypted second data is sent to the second block node 22.
The working principle of the technical scheme is as follows: in an embodiment, the data request information verifying module 331 is configured to determine whether the first data request information is legal, and when it is determined that the first data request information is legal, obtain, by the decrypting module 332, a first encrypted identifier of the first data in the second storage module 32 according to the first data request information, obtain, by querying in a decrypting database according to the first encrypted identifier, a first decrypting serial number, and decrypt the first data according to the first decrypting serial number; finally, the decrypted first data is sent to the first block node 11 through the sending module 333. In an embodiment, the data request information verifying module 331 is configured to determine whether the second data request information is legal, and when it is determined that the second data request information is legal, obtain, by the decrypting module 332, a second encrypted identifier of the second data in the first storage module 31 according to the second data request information, obtain, by querying in a decrypting database according to the second encrypted identifier, a second decrypting serial number, and decrypt the second data according to the second decrypting serial number; finally, the decrypted second data is sent to the second block node 22 through the sending module 333.
The beneficial effects of the above technical scheme are that: when data sharing is performed on the first blockchain 1 and the second blockchain 2, security verification is performed twice. And once verifying the legality of the data request information, and acquiring related data according to the data request information when the data request information is determined to be legal. The secondary security verification is to decrypt the acquired related data, so that the security of the first block chain 1 and the second block chain 2 during data sharing is improved, data loss and leakage are avoided, and the user experience is improved.
According to some embodiments of the present invention, the first blockchain 1 is provided with a first detection module, configured to detect first missing block information and first newly added block information on the first blockchain 1 according to a preset time interval;
the first storage module 31 is further configured to:
receiving first lost block information sent by the first detection module, acquiring corresponding first lost block data according to the first lost block information, and sending the first lost block data to a first block chain 1;
receiving first newly added block information sent by the first detection module, and updating data according to the first newly added block information;
the second block chain 2 is provided with a second detection module, which is used for detecting second lost block information and second newly added block information on the second block chain 2 according to a preset time interval;
the second storage module 32 is further configured to:
receiving second lost block information sent by the second detection module, acquiring corresponding second lost block data according to the second lost block information, and sending the second lost block data to a second block chain 2;
and receiving second newly added block information sent by the second detection module, and updating data according to the second newly added block information.
The working principle and the beneficial effects of the technical scheme are as follows: the preset time interval may be 1h, and the first detection module disposed on the first block chain 1 detects whether there is a first missing block and a first newly added block on the first block chain 1 every 1 h. Determining that first lost block information exists on a first block chain 1 at a first detection module, sending the first lost block information to a first storage module 31, wherein the first lost block information comprises identification information, address information and the like of a lost block, receiving the first lost block information sent by the first detection module by the first storage module 31, acquiring corresponding first lost block data according to the first lost block information, and sending the first lost block data to the first block chain 1; the integrity of the data of the first block chain 1 is ensured, and the safety and the reliability of the system are improved. Determining that first newly added block information exists on a first block chain 1 at a first detection module, receiving the first newly added block information sent by the first detection module, and updating data according to the first newly added block information; the integrity of the first storage module 31 for data storage of the first block chain 1 is ensured, and the accuracy of data access is improved when the first block chain 1 and the second block chain 2 share data. Similarly, the second block chain 2 is provided with a second detection module, which is used for detecting second lost block information and second newly added block information on the second block chain 2 according to a preset time interval; the second storage module 32 is configured to receive the second lost block information sent by the second detection module, obtain corresponding second lost block data according to the second lost block information, and send the second lost block data to the second block chain 2; the integrity of the data of the second block chain 2 is ensured, and the safety and the reliability of the system are improved. The second storage module 32 is further configured to receive second newly added block information sent by the second detection module, and perform data update according to the second newly added block information. The integrity of the second storage module 32 for data storage of the second block chain 2 is ensured, and the accuracy of data access is improved when data sharing is performed on the first block chain 1 and the second block chain 2.
According to some embodiments of the invention, the data sharing module 33 further comprises:
a ranking module to:
receiving first data request information sent by the first block node 11, acquiring first priority information of the first data request information, and establishing a first queuing queue according to the first priority information;
receiving second data request information sent by the second block node 22, acquiring second priority information of the second data request information, and establishing a second queuing queue according to the second priority information;
receiving first data request information sent by the first block node 11 and second data request information sent by the second block node 22, obtaining third priority information according to the first data request information and the second data request information, and establishing a third queuing queue according to the third priority information.
A data processing module, connected to the sorting module, for:
receiving a first queuing queue sent by the sorting module, and processing first data request information according to the first queuing queue;
receiving a second queuing queue sent by the sorting module, and processing second data request information according to the second queuing queue;
and receiving a third queuing queue sent by the sorting module, and processing the first data request information and the second data request information according to the third queuing queue.
The working principle of the technical scheme is as follows: in an embodiment, when the first block chain 1 needs to access data on the second block chain 2 and the second block chain 2 does not need to access data of the first block chain 1, the sorting module receives first data request information sent by the first block node 11, obtains first priority information of the first data request information, establishes a first queuing queue according to the first priority information, and the data processing module receives the first queuing queue sent by the sorting module and processes the first data request information according to the first queuing queue. In an embodiment, when the second blockchain 2 needs to access data in the first blockchain 1 and the first blockchain 1 does not need to access data in the second blockchain 2, the sorting module receives second data request information sent by the second blockchain 22, obtains second priority information of the second data request information, and establishes a second queuing queue according to the second priority information; and the data processing module receives the second queuing queue sent by the sorting module and processes the second data request information according to the second queuing queue. In an embodiment, when a first block chain 1 needs to access data on a second block chain 2 and the second block chain 2 needs to access data of the first block chain 1, a sorting module receives first data request information sent by a first block node 11 and second data request information sent by a second block node 22, obtains third priority information according to the first data request information and the second data request information, and establishes a third queuing queue according to the priority information; and the data processing module receives the third queuing queue sent by the sorting module and processes the first data request information and the second data request information according to the third queuing queue.
The beneficial effects of the above technical scheme are that: when the first block chain 1 and the second block chain 2 realize data sharing, the data request information is subjected to priority sequencing to establish a queuing queue, the data request information is processed according to the queuing queue, the data request information is processed in order, and meanwhile, the efficiency and the accuracy of processing the data request information are improved.
According to some embodiments of the present invention, the encrypting includes storing the first block node information in the first storage module 31 after performing salting HASH and sha256 encryption processing on the first block node information.
The beneficial effects of the above technical scheme are that: and ensuring the safety of the node information of the first block.
According to some embodiments of the invention, the determining whether the first data request information is legal includes: and performing similarity matching on the first data request information and preset first data request information in a first data request database based on the first data request database corresponding to the first data request information, and determining that the first data request information is legal when the similarity between the first data request information and the preset first data request information is greater than a preset similarity threshold.
The working principle and the beneficial effects of the technical scheme are as follows: when judging whether the first data request information is legal or not, calculating the similarity between the first data request information and preset first data request information, and when determining that the similarity between the first data request information and the preset first data request information is larger than a preset similarity threshold value, determining that the first data request information is legal. Otherwise, it is determined that the first data request information is illegal. The safety of the data sharing of the first block chain 1 and the second block chain 2 is improved.
According to some embodiments of the present invention, the similarity matching of the first data request information and preset first data request information in a first data request database includes:
performing data segmentation processing on the first data request information and preset first data request information to obtain
Figure 337549DEST_PATH_IMAGE001
Sub first data request information and
Figure 684829DEST_PATH_IMAGE001
the individual presets the first data request information, calculates
Figure 712828DEST_PATH_IMAGE002
Sub first data request information and
Figure 894411DEST_PATH_IMAGE002
the similarity of the first data request information is preset by each son
Figure 84083DEST_PATH_IMAGE003
Figure 983906DEST_PATH_IMAGE004
Wherein the content of the first and second substances,
Figure 487700DEST_PATH_IMAGE005
is as follows
Figure 789368DEST_PATH_IMAGE002
Sub-first data request information;
Figure 149943DEST_PATH_IMAGE006
is as follows
Figure 474745DEST_PATH_IMAGE002
The method comprises the steps that first data request information is preset by each son;
Figure 844546DEST_PATH_IMAGE007
is as follows
Figure 672825DEST_PATH_IMAGE002
The number of semantic concepts in the sub-first data request information;
Figure 469880DEST_PATH_IMAGE008
is as follows
Figure 78715DEST_PATH_IMAGE002
The number of semantic concepts in the first data request information is preset by each son;
Figure 252208DEST_PATH_IMAGE009
for semantic concepts
Figure 262889DEST_PATH_IMAGE010
In the first place
Figure 168528DEST_PATH_IMAGE002
The number of occurrences in the sub-first data request message;
Figure 264660DEST_PATH_IMAGE011
for semantic concepts
Figure 976264DEST_PATH_IMAGE012
In the first place
Figure 841452DEST_PATH_IMAGE002
The number of times of occurrence in the first data request information is preset by each son;
Figure 917992DEST_PATH_IMAGE010
is at the first
Figure 501421DEST_PATH_IMAGE002
First in the sub first data request message
Figure 751136DEST_PATH_IMAGE013
A semantic concept;
Figure 736410DEST_PATH_IMAGE012
is at the first
Figure 983852DEST_PATH_IMAGE002
The first data request message is preset by the first sub-unit
Figure 54576DEST_PATH_IMAGE014
A semantic concept;
computing first data request information
Figure 107982DEST_PATH_IMAGE015
And presetting first data request information
Figure 947762DEST_PATH_IMAGE016
Degree of similarity of
Figure 366105DEST_PATH_IMAGE017
Figure 658547DEST_PATH_IMAGE018
Wherein the content of the first and second substances,
Figure 515644DEST_PATH_IMAGE019
after the first data request information and the preset first data request information are subjected to data segmentation processing
Figure 209931DEST_PATH_IMAGE002
Sub first data request information and
Figure 813823DEST_PATH_IMAGE002
the number of the semantic concepts in the first data request information is preset by the number of the children.
The working principle and the beneficial effects of the technical scheme are as follows: when the similarity between the first data request information and the preset first data request information in the first data request database is calculated, the first data request information and the preset first data request information are subjected to data segmentation processing to obtain the first data request information and the preset first data request information
Figure 859140DEST_PATH_IMAGE001
Sub first data request information and
Figure 254349DEST_PATH_IMAGE001
and respectively calculating the similarity of the sub-preset first data request information and the sub-preset first data request information. Finally, the first data request information is calculated according to the similarity of the sub first data request information and the sub preset first data request information
Figure 803142DEST_PATH_IMAGE015
And presetting first data request information
Figure 828867DEST_PATH_IMAGE016
The similarity improves the accuracy of the calculated similarity and the accuracy of judging the similarity and the size of the preset similarity threshold.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (8)

1. An inter-block-chain inter-chain information transmission control system, comprising:
a first blockchain and a second blockchain; wherein the content of the first and second substances,
at least one first block node is arranged on the first block chain; first block node information is stored on the first block node;
at least one second block node is arranged on the second block chain; second block node information is stored on the second block node;
the cross-chain interaction module is respectively connected with the first block chain and the second block chain and is used for realizing data sharing of the first block chain and the second block chain; wherein the content of the first and second substances,
the cross-chain interaction module comprises:
the first storage module is used for receiving the first block node information sent by the first block node and carrying out encryption storage;
the second storage module is used for receiving and encrypting the second block node information sent by the second block node;
the data sharing module is respectively connected with the first storage module and the second storage module and is used for:
receiving first data request information sent by the first block node, acquiring first data in the second storage module according to the first data request information, and sending the first data to the first block node;
and receiving second data request information sent by the second block node, acquiring second data in the first storage module according to the second data request information, and sending the second data to the second block node.
2. The system of claim 1, wherein the first block node information includes identification information, authentication information, and address information of the first block node;
the second block node information includes identification information, authentication information, and address information of the second block node.
3. The system of claim 1, wherein the data sharing module comprises:
a data request information validation module to:
receiving first data request information sent by the first block node, and judging whether the first data request information is legal or not;
receiving second data request information sent by the second block node, and judging whether the second data request information is legal or not;
the decryption module is connected with the data request information verification module and is used for:
when the data request information verification module determines that the first data request information is legal, acquiring a first encryption identifier of first data in the second storage module according to the first data request information, inquiring in a decryption database according to the first encryption identifier to acquire a first decryption serial number, and decrypting the first data according to the first decryption serial number;
when the data request information verification module determines that the second data request information is legal, acquiring a second encryption identifier of second data in the first storage module according to the second data request information, inquiring a decryption database according to the second encryption identifier to acquire a second decryption serial number, and decrypting the second data according to the second decryption serial number;
a sending module, connected to the decryption module, for:
sending the decrypted first data to the first block node;
and sending the decrypted second data to the second block node.
4. The system of claim 1, wherein the first blockchain is provided with a first detecting module for detecting a first missing block information and a first newly added block information on the first blockchain according to a predetermined time interval;
the first storage module is further configured to:
receiving first lost block information sent by the first detection module, acquiring corresponding first lost block data according to the first lost block information, and sending the first lost block data to a first block chain;
receiving first newly added block information sent by the first detection module, and updating data according to the first newly added block information;
the second block chain is provided with a second detection module used for detecting second lost block information and second newly added block information on the second block chain according to a preset time interval;
the second storage module is further configured to:
receiving second lost block information sent by the second detection module, acquiring corresponding second lost block data according to the second lost block information, and sending the second lost block data to a second block chain;
and receiving second newly added block information sent by the second detection module, and updating data according to the second newly added block information.
5. The system of claim 1, wherein the data sharing module further comprises:
a ranking module to:
receiving first data request information sent by the first block node, acquiring first priority information of the first data request information, and establishing a first queuing queue according to the first priority information;
receiving second data request information sent by the second block node, acquiring second priority information of the second data request information, and establishing a second queuing queue according to the second priority information;
receiving first data request information sent by the first block node and second data request information sent by the second block node, acquiring third priority information according to the first data request information and the second data request information, and establishing a third queuing queue according to the third priority information;
a data processing module, connected to the sorting module, for:
receiving a first queuing queue sent by the sorting module, and processing first data request information according to the first queuing queue;
receiving a second queuing queue sent by the sorting module, and processing second data request information according to the second queuing queue;
and receiving a third queuing queue sent by the sorting module, and processing the first data request information and the second data request information according to the third queuing queue.
6. The system of claim 1, wherein the encrypted storing comprises storing the first block node information in the first storage module after salting HASH and sha256 encryption.
7. The system of claim 3, wherein said determining whether said first data request message is legitimate comprises: and performing similarity matching on the first data request information and preset first data request information in a first data request database based on the first data request database corresponding to the first data request information, and determining that the first data request information is legal when the similarity between the first data request information and the preset first data request information is greater than a preset similarity threshold.
8. The system of claim 7, wherein the similarity matching of the first data request information with preset first data request information in a first data request database comprises:
performing data segmentation processing on the first data request information and preset first data request information to obtain
Figure 365523DEST_PATH_IMAGE001
Sub first data request information and
Figure 502106DEST_PATH_IMAGE001
the individual presets a first data requestInformation, calculate
Figure 905406DEST_PATH_IMAGE002
Sub first data request information and
Figure 164349DEST_PATH_IMAGE002
the similarity of the first data request information is preset by each son
Figure 918678DEST_PATH_IMAGE003
Figure 593373DEST_PATH_IMAGE004
Wherein the content of the first and second substances,
Figure 116758DEST_PATH_IMAGE005
is as follows
Figure 546603DEST_PATH_IMAGE002
Sub-first data request information;
Figure 522649DEST_PATH_IMAGE006
is as follows
Figure 1035DEST_PATH_IMAGE002
The method comprises the steps that first data request information is preset by each son;
Figure 644506DEST_PATH_IMAGE007
is as follows
Figure 979672DEST_PATH_IMAGE002
The number of semantic concepts in the sub-first data request information;
Figure 708594DEST_PATH_IMAGE008
is as follows
Figure 725091DEST_PATH_IMAGE002
The number of semantic concepts in the first data request information is preset by each son;
Figure 223069DEST_PATH_IMAGE009
for semantic concepts
Figure 729136DEST_PATH_IMAGE010
In the first place
Figure 945354DEST_PATH_IMAGE002
The number of occurrences in the sub-first data request message;
Figure 765543DEST_PATH_IMAGE011
for semantic concepts
Figure 118026DEST_PATH_IMAGE012
In the first place
Figure 60575DEST_PATH_IMAGE002
The number of times of occurrence in the first data request information is preset by each son;
Figure 498509DEST_PATH_IMAGE010
is at the first
Figure 853880DEST_PATH_IMAGE002
First in the sub first data request message
Figure 326449DEST_PATH_IMAGE013
A semantic concept;
Figure 174320DEST_PATH_IMAGE012
is at the first
Figure 99550DEST_PATH_IMAGE002
The first data request message is preset by the first sub-unit
Figure 261541DEST_PATH_IMAGE014
A semantic concept;
computing first data request information
Figure 526301DEST_PATH_IMAGE015
And presetting first data request information
Figure 810651DEST_PATH_IMAGE016
Degree of similarity of
Figure 223178DEST_PATH_IMAGE017
Figure 985598DEST_PATH_IMAGE018
Wherein the content of the first and second substances,
Figure 104864DEST_PATH_IMAGE019
after the first data request information and the preset first data request information are subjected to data segmentation processing
Figure 560116DEST_PATH_IMAGE002
Sub first data request information and
Figure 459939DEST_PATH_IMAGE002
the number of the semantic concepts in the first data request information is preset by the number of the children.
CN202010964082.7A 2020-09-15 2020-09-15 Inter-block chain cross-chain information transmission control system Active CN111814175B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010964082.7A CN111814175B (en) 2020-09-15 2020-09-15 Inter-block chain cross-chain information transmission control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010964082.7A CN111814175B (en) 2020-09-15 2020-09-15 Inter-block chain cross-chain information transmission control system

Publications (2)

Publication Number Publication Date
CN111814175A true CN111814175A (en) 2020-10-23
CN111814175B CN111814175B (en) 2020-12-18

Family

ID=72860140

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010964082.7A Active CN111814175B (en) 2020-09-15 2020-09-15 Inter-block chain cross-chain information transmission control system

Country Status (1)

Country Link
CN (1) CN111814175B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023124302A1 (en) * 2021-12-31 2023-07-06 杭州趣链科技有限公司 Data processing method and apparatus, terminal device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018080206A1 (en) * 2016-10-26 2018-05-03 주식회사 코인플러그 Method for issuing currency and making payment using merkle tree structure in utxo-based protocol and server using same
CN109379429A (en) * 2018-10-25 2019-02-22 龚玉环 A kind of multichain management method and system based on block chain
CN110266655A (en) * 2019-05-30 2019-09-20 中国工商银行股份有限公司 A kind of across chain interconnected method, equipment and system based on block chain
CN110874798A (en) * 2019-10-30 2020-03-10 链农(深圳)信息科技有限公司 Network platform based on regional chain and safe communication method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018080206A1 (en) * 2016-10-26 2018-05-03 주식회사 코인플러그 Method for issuing currency and making payment using merkle tree structure in utxo-based protocol and server using same
CN109379429A (en) * 2018-10-25 2019-02-22 龚玉环 A kind of multichain management method and system based on block chain
CN110266655A (en) * 2019-05-30 2019-09-20 中国工商银行股份有限公司 A kind of across chain interconnected method, equipment and system based on block chain
CN110874798A (en) * 2019-10-30 2020-03-10 链农(深圳)信息科技有限公司 Network platform based on regional chain and safe communication method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023124302A1 (en) * 2021-12-31 2023-07-06 杭州趣链科技有限公司 Data processing method and apparatus, terminal device and storage medium

Also Published As

Publication number Publication date
CN111814175B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN106534160A (en) Identity authentication method and system based on block chain
US11146554B2 (en) System, method, and apparatus for secure identity authentication
US20190097805A1 (en) Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
CN110070363B (en) Account management method and verification method in block chain network and terminal equipment
US10726130B2 (en) Method and device for verifying upgrade of diagnosis connector of diagnostic equipment, and diagnosis connector
CN109634615B (en) Issuing method, verification method and device of application installation package
CN112948784A (en) Internet of things terminal identity authentication method, computer storage medium and electronic equipment
CN110908357B (en) Security vulnerability detection method and device, storage medium and intelligent device
CN116980230B (en) Information security protection method and device
CN113395406B (en) Encryption authentication method and system based on power equipment fingerprint
CN113836559A (en) Sample alignment method, device, equipment and storage medium in federated learning
US9774576B2 (en) Authentication by use of symmetric and asymmetric cryptography
CN111814175B (en) Inter-block chain cross-chain information transmission control system
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN109451504B (en) Internet of things module authentication method and system
CN114091067A (en) Sample alignment method, device, equipment and storage medium
CN110620776A (en) Data transfer information transmission method and device
KR20200104084A (en) APPARATUS AND METHOD FOR AUTHENTICATING IoT DEVICE BASED ON PUF
CN110492989B (en) Private key processing method, access method, and medium and device corresponding to method
CN110956723A (en) Encryption verification communication method and device for Bluetooth intelligent lock and storage medium
WO2007074992A1 (en) Method for detecting malicious code changes from hacking of program loaded and executed on memory through network
CN108242997B (en) Method and apparatus for secure communication
EP4084484A1 (en) Method and device for encryption of video stream, communication equipment, and storage medium
CN112733173A (en) Image processing method, device, secret key generating method, device, training method and device, and computer readable medium
CN111132156A (en) Registration method of 5G user terminal, user terminal equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room 311, main building, 139 Fengtai Road crossing, Fengtai District, Beijing

Patentee after: BEIJING TONGTECH Co.,Ltd.

Patentee after: Beijing dongfangtong Software Co.,Ltd.

Patentee after: Beijing Dongfang tongwangxin Technology Co.,Ltd.

Patentee after: BEIJING TESTOR TECHNOLOGY Co.,Ltd.

Address before: Room 311, main building, 139 Fengtai Road crossing, Fengtai District, Beijing

Patentee before: BEIJING TONGTECH Co.,Ltd.

Patentee before: Beijing dongfangtong Software Co.,Ltd.

Patentee before: BEIJING MICROVISION TECHNOLOGY Co.,Ltd.

Patentee before: BEIJING TESTOR TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder