CN112163046A - Block chain-based equipment data storage method, device and system - Google Patents

Block chain-based equipment data storage method, device and system Download PDF

Info

Publication number
CN112163046A
CN112163046A CN202011180920.8A CN202011180920A CN112163046A CN 112163046 A CN112163046 A CN 112163046A CN 202011180920 A CN202011180920 A CN 202011180920A CN 112163046 A CN112163046 A CN 112163046A
Authority
CN
China
Prior art keywords
data
data block
block
node
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011180920.8A
Other languages
Chinese (zh)
Inventor
李璐
李宁
何昊坤
蒋浩
张亚薇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MILITARY SECRECY QUALIFICATION CERTIFICATION CENTER
Original Assignee
MILITARY SECRECY QUALIFICATION CERTIFICATION CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MILITARY SECRECY QUALIFICATION CERTIFICATION CENTER filed Critical MILITARY SECRECY QUALIFICATION CERTIFICATION CENTER
Priority to CN202011180920.8A priority Critical patent/CN112163046A/en
Publication of CN112163046A publication Critical patent/CN112163046A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The disclosure relates to a device data storage method, device and system based on a block chain. The method comprises the following steps: receiving data of equipment to be stored, which is screened and determined by a first enterprise node in a alliance chain network; dividing the data of the storage device to be stored based on the target size and generating a plurality of data blocks; respectively encrypting and signing each data block to obtain a plurality of encrypted data blocks with signatures; storing the plurality of encrypted data blocks to a alliance chain, and copying the stored plurality of encrypted data blocks to obtain a plurality of copied data blocks; and sending the plurality of copied data to a target node in the alliance-link network, wherein the target node is a node except the first enterprise node in the alliance-link network. According to the block chain-based equipment data storage method, device and system provided by the embodiment of the disclosure, alliance chain equipment data storage is utilized, so that the sharing requirement and the confidentiality requirement of equipment data among different enterprises are met, and meanwhile, the uplink throughput of new equipment data is improved.

Description

Block chain-based equipment data storage method, device and system
Technical Field
The present disclosure relates to the field of data storage technologies, and in particular, to a method, an apparatus, and a system for storing device data based on a block chain.
Background
Based on the three forms of the block chain technology, namely a public chain, a alliance chain and a private chain, the alliance chain is still a private chain in nature, but is larger than the private chain developed by a single small organization, but has no scale as large as the public chain, and the block chain is understood to be a block chain between the private chain and the public chain and refers to a block chain of which the consensus process is controlled by a preselected node. In the related art, each enterprise needs to store the currently produced and/or developed device data, but how to achieve data storage by using a federation chain and meanwhile achieve the confidentiality requirement of the data and improve the throughput of the data storage is an urgent technical problem to be solved.
Disclosure of Invention
In view of this, the present disclosure provides a device data storage method, apparatus, and system based on a block chain.
According to an aspect of the present disclosure, there is provided a device data storage method based on a block chain, the method including:
receiving data of equipment to be stored, which is screened and determined by a first enterprise node in a alliance chain network;
dividing the device data to be stored based on a target size and generating a plurality of data blocks;
respectively encrypting and signing each data block to obtain a plurality of encrypted data blocks with signatures;
storing a plurality of encrypted data blocks to a alliance chain, and copying the stored encrypted data blocks to obtain a plurality of copied data blocks;
and sending the plurality of copied data to a target node in the alliance-link network, wherein the target node is a node except the first enterprise node in the alliance-link network.
In one possible implementation, dividing the device data to be stored and generating a plurality of data blocks based on a target size includes:
determining the number of the data blocks which can be generated and the actual size corresponding to each data block according to the target size and the size of the data of the device to be stored;
adaptively adjusting the block output time of the corresponding data block according to the actual size corresponding to each data block;
a plurality of data blocks are generated according to the actual size and the block-out time of each data block.
In one possible implementation, the target size comprises 20KB, the absolute value of the difference between the actual size and the target size is less than or equal to 2KB,
the block output time is determined according to the block output time of the previous data block and the data volume change trend of the data block.
In a possible implementation manner, performing encryption and signature processing on each data block respectively to obtain a plurality of encrypted data blocks with signatures includes:
encrypting each data block by adopting a symmetric encryption mode to form a plurality of encrypted data blocks;
obtaining an initial digital signature of each encrypted data block by using a digital signature technology;
the determined signature of the current data block is added to the current data block based on the initial digital signature of the previous data block.
In one possible implementation, obtaining an initial digital signature of each encrypted data block by using a digital signature technique includes:
calculating an encrypted data block by utilizing a Hash algorithm, and determining a calculated first Hash value as an initial digital signature of the encrypted data block; or
And calculating an encryption key corresponding to the encrypted data block by utilizing a Hash algorithm, and determining a calculated second Hash value as an initial digital signature of the encrypted data block.
In one possible implementation, adding the determined signature of the current data block to the current data block based on the initial digital signature of the previous data block includes:
and calculating the initial digital signature of the previous data block, the block-out time of each data block and a random number by using a hash algorithm, and determining the calculated third hash value as the signature of the current data block.
In one possible implementation manner, the device data to be stored includes at least one of:
the device information of the first device currently produced by the enterprise corresponding to the first enterprise node, the device information of the second device currently developed,
the device information includes at least one of: the device model, the component information used in the device, and the supplier information of the component.
In a possible implementation manner, the target size is determined in advance according to the transmission time of the data block and the verification time of the enterprise node in the alliance-link network.
According to another aspect of the present disclosure, there is provided a device data storage apparatus based on a block chain, the apparatus including:
the receiving module is used for receiving the data of the device to be stored, which is screened and determined by the first enterprise node in the alliance chain network;
the generating module is used for dividing the data of the device to be stored based on the target size and generating a plurality of data blocks;
the processing module is used for respectively carrying out encryption and signature processing on each data block to obtain a plurality of encrypted data blocks with signatures;
the storage module is used for storing the encrypted data blocks to a alliance chain and copying the stored encrypted data blocks to obtain a plurality of copied data blocks;
a sending module, configured to send the multiple pieces of replicated data to a target node in the alliance-link network, where the target node is a node in the alliance-link network other than the first enterprise node.
According to another aspect of the present disclosure, there is provided a device data storage system based on a blockchain, the system including: the device data storage device comprises a first enterprise node and the device data storage device based on the block chain in the alliance chain network, wherein the first enterprise node is used for sending the screened and determined device data to be stored to the device data storage device based on the block chain.
According to another aspect of the present disclosure, there is provided an electronic device including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to execute the above block chain-based device data storage method.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer program instructions, wherein the computer program instructions, when executed by a processor, implement the above block chain based device data storage method.
According to the block chain-based equipment data storage method, device and system provided by the embodiment of the disclosure, alliance chain equipment data storage is utilized, so that the sharing requirement and the confidentiality requirement of equipment data among different enterprises are met, and meanwhile, the uplink throughput of new equipment data is improved.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate exemplary embodiments, features, and aspects of the disclosure and, together with the description, serve to explain the principles of the disclosure.
Fig. 1 shows a flowchart of a device data storage method based on a blockchain according to an embodiment of the present disclosure.
Fig. 2 illustrates a block diagram of a blockchain-based device data store in accordance with an embodiment of the present disclosure.
Fig. 3 is a block diagram illustrating an apparatus 800 for a blockchain-based device data storage method according to an example embodiment.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
In the embodiment of the disclosure, a device data storage method, an apparatus and a system based on a block chain are provided, and a alliance chain is used for realizing device data storage of multiple enterprises, so that not only is the requirement of sharing device data among different enterprises met, but also the requirement of keeping the device data secret is met, and meanwhile, the throughput of a new data uplink is improved.
Fig. 1 shows a flowchart of a device data storage method based on a blockchain according to an embodiment of the present disclosure. As shown in fig. 1, the method includes steps S11 through S15.
In step S11, the data of the device to be stored, which is determined by filtering from the first enterprise node in the alliance-link network, is received.
In this embodiment, the enterprise nodes in the alliance chain network are nodes corresponding to different enterprises, and each enterprise may set one or more enterprise nodes in the alliance chain according to different enterprise operation conditions, such as different branches of the enterprise, geographical locations of subordinate enterprises, types of related devices, and the like, for example, if a certain enterprise has a headquarters in beijing, and has branch companies in shanghai and guangzhou, then in order to facilitate management of device data, three enterprise nodes may be set for the enterprise, which are respectively used by the headquarters in beijing, the shanghai and the guangzhou branch companies. And the same enterprise node can store and/or access the device data through different terminal devices. Other types of nodes may also be included in the alliance-link network, for example, a supervision node for supervising each enterprise node by a supervision department that supervises each enterprise, a supervision node required by the supervision department to perform operations such as data storage, and the like. The nodes in the alliance chain network can be set by those skilled in the art according to actual needs, and the disclosure is not limited to this.
In this embodiment, the first enterprise node is sent out after it filters the incoming device data to determine that it is the correct data. The first enterprise node may determine whether the input device data is accurate in a predetermined manner, which is not limited by the present disclosure.
In one possible implementation manner, the device data to be stored may include at least one of the following: the device information of the first device currently produced by the enterprise corresponding to the first enterprise node and the device information of the second device currently developed. The device information may include at least one of: the device model, the component information used in the device, and the supplier information of the component.
In this implementation manner, the component information includes whether the component belongs to a core component of the device, a transportation route of the component (e.g., transportation through a specific channel, transportation through logistics or express delivery, escort transportation by an enterprise special car corresponding to a supplier or an enterprise node, etc.), whether the component has been subjected to a security test, whether the supplier of the component is single, an actual production area of the component, etc., and related information of a production and manufacturing process, a transportation process, product security, a product source, etc., of the component.
In this implementation, the supplier information of the component may include the number of suppliers of the component, the name of the company of the supplier, whether the supplier has relevant qualification certification (the relevant qualification certification may include secret qualification, non-term equipment scientific research and production permit, weapon equipment qualification, quality system certification, etc.), whether the supplier has management measures (such as checking the quality of the component regularly, monitoring the factory that produces the component regularly, signing a privacy agreement, checking the relevant qualification certification), the type of the supplier (such as the supplier may be an outsourcing supplier of the component, a distributor, an agent, etc.), whether the supplier is a home product, the execution mode of purchasing the component from the supplier (such as may include public bidding, sealed quotation, direct purchase from the distributor or the agent, entrusting purchase from other large enterprise units, etc.), and the like, Whether the supplier is subjected to review, the review period and the like are related to the operation, production, qualification and the like of the supplier, wherein the information is related to the component provided by the supplier.
In step S12, the device data to be stored is divided based on the target size and a plurality of data blocks are generated.
In one possible implementation, step S12 may include: determining the number of the data blocks which can be generated and the actual size corresponding to each data block according to the target size and the size of the data of the device to be stored; adaptively adjusting the block output time of the corresponding data block according to the actual size corresponding to each data block; a plurality of data blocks are generated according to the actual size and the block-out time of each data block.
In one possible implementation, the target size may include 20KB, and an absolute value of a difference between the actual size and the target size is less than or equal to 2 KB. The block output time is determined according to the block output time of the previous data block and the data volume change trend of the data block. The target size is determined in advance according to the transmission time of the data block and the verification time of the enterprise nodes in the alliance chain network.
In this implementation manner, the target size may be determined by a simulation experiment according to the transmission time of the data block and the verification time of the enterprise node in the alliance chain network in advance, and when the target size is 20KB according to the simulation experiment, an optimal value between the data volume carried by the data block and the transmission delay may be achieved, that is, when the target size is 20KB, the data volume carried by the data block is ensured and the transmission time of the data block is also compressed. Due to the size and position of the data of the device to be stored, the actual size may be the same as the target size of 20KB, or may be larger or smaller than 20KB within a certain size range, in order to ensure the above-mentioned "optimal value" effect.
In this implementation, the block time can be calculated and adjusted according to the following formulas (1) and (2)
Figure BDA0002750145640000071
Figure BDA0002750145640000072
Where Δ t is the block-out time of the i +1 th data block, τtbl_current_iFor the block out time of the ith data block, τtbl_current_i+1For the block out time of the i +1 th data block, data [ i]Data amount carried for ith data block, data [ i-1]The amount of data carried for the (i-1) th data block. That is, if the amount of data increases, data [ i-1 ]]And data [ i ]]Is less than 1, the block-out time of the (i + 1) th data block and the block-out time tau of the (i + 1) th data block are correspondingly reducedtbl_current_i+1The lower limit of (d) is 2s and the upper limit is 10s, i.e., τtbl_current_i+1∈[2s,10s]。
In this implementation, the above equations (1) and (2) are used to adaptively adjust the block output time of each data block, so as to balance the computation power and achieve the purpose of optimizing the throughput.
In step S13, encryption and signature processing are performed for each data block, and a plurality of encrypted data blocks with signatures are obtained.
In one possible implementation, step S13 may include: encrypting each data block by adopting a symmetric encryption mode to form a plurality of encrypted data blocks; obtaining an initial digital signature of each encrypted data block by using a digital signature technology; the determined signature of the current data block is added to the current data block based on the initial digital signature of the previous data block.
In the implementation mode, the data block is encrypted by adopting a symmetric encryption mode, so that the encryption process can be simplified, and all the data blocks can be simply and quickly encrypted. And the data block can be ensured not to be viewed and accessed by any object except the object storing the data block, no matter whether the data block is in the transmission process or the storage state. The digital signature technology may be implemented by using algorithms such as a hash algorithm, an Ong-Schnorr-Shamir digital signature algorithm, and the like, which is not limited by the present disclosure.
In one possible implementation, obtaining the initial digital signature of each encrypted data block by using a digital signature technique may include: calculating an encrypted data block by utilizing a Hash algorithm, and determining a calculated first Hash value as an initial digital signature of the encrypted data block; or calculating an encryption key corresponding to the encrypted data block by using a hash algorithm, and determining the calculated second hash value as the initial digital signature of the encrypted data block.
In this implementation, the encryption key corresponding to the encrypted data block is an encryption key generated in the process of encrypting the data block. The initial digital signature of the encrypted data block may be determined in the above manner, and may also be determined in other manners, which is not limited by this disclosure.
In one possible implementation, adding the determined signature of the current data block to the current data block based on the initial digital signature of the previous data block may include: and calculating the initial digital signature of the previous data block, the block-out time of each data block and a random number by using a hash algorithm, and determining the calculated third hash value as the signature of the current data block.
In this implementation, the random number may be a number randomly generated using a random number generation method, which is not limited by this disclosure. The length of the third hash value may be limited, for example, the length of the third hash value is 256 bits. By the mode, each encrypted data block carries the initial data signature of the previous encrypted data block, so that a user can conveniently trace the source of the encrypted data block, and the first data block of the encrypted data block can be traced according to the initial data signature in each encrypted data block.
In step S14, a plurality of encrypted data blocks are stored in the federation chain, and the stored plurality of encrypted data blocks are copied to obtain a plurality of copied data blocks.
In the embodiment, the plurality of encrypted data are copied, so that the whole alliance chain has enough redundant copies, the availability and the performance of a plurality of encrypted data blocks are ensured, and the performance reduction and the data loss can be prevented.
In step S15, the plurality of copied data are sent to a target node in the federation chain network, the target node being a node in the federation chain network other than the first enterprise node.
In this embodiment, the target node may include one or more of the enterprise nodes other than the first enterprise node, one or more of the policing nodes, and one or more of the policing department nodes in the federation chain network, which is not limited by the present disclosure.
The block chain-based equipment data storage method provided by the embodiment of the disclosure utilizes alliance chain equipment data storage, not only meets the sharing requirement and the confidentiality requirement of equipment data among different enterprises, but also improves the uplink throughput of new equipment data.
Fig. 2 illustrates a block diagram of a blockchain-based device data store in accordance with an embodiment of the present disclosure. As shown in fig. 2, the apparatus is configured to implement the device data storage method based on the block chain, and the apparatus includes:
a receiving module 41, configured to receive data of a device to be stored, which is screened and determined by a first enterprise node in a alliance-link network;
a generating module 42, configured to divide the device data to be stored and generate a plurality of data blocks based on the target size;
a processing module 43, configured to perform encryption and signature processing on each data block, respectively, to obtain a plurality of encrypted data blocks with signatures;
a storage module 44, configured to store a plurality of encrypted data blocks in a federation chain, and copy the stored encrypted data blocks to obtain a plurality of copied data blocks;
a sending module 45, configured to send the multiple pieces of replicated data to a target node in the alliance-link network, where the target node is a node in the alliance-link network other than the first enterprise node.
In one possible implementation, the generating module 42 may include:
the size determining submodule determines the number of the data blocks which can be generated and the actual size corresponding to each data block according to the target size and the size of the data of the device to be stored;
the time determining submodule adaptively adjusts the block output time of the corresponding data block according to the actual size corresponding to each data block;
and the data block generation submodule generates a plurality of data blocks according to the actual size and the block output time of each data block.
In one possible implementation, the target size may include 20KB, an absolute value of a difference between the actual size and the target size may be less than or equal to 2KB, and the out-block time is determined according to an out-block time of a previous data block and a data amount variation trend of the data block.
In one possible implementation, the processing module 43 may include:
the encryption submodule encrypts each data block in a symmetrical encryption mode to form a plurality of encrypted data blocks;
the calculation submodule obtains an initial digital signature of each encrypted data block by using a digital signature technology;
and the signature determination submodule adds the determined signature of the current data block to the current data block based on the initial digital signature of the previous data block.
In one possible implementation, the computation submodule may include:
the first calculation submodule calculates the encrypted data block by utilizing a Hash algorithm and determines a calculated first Hash value as an initial digital signature of the encrypted data block; or
And the second calculation submodule is used for calculating the encryption key corresponding to the encrypted data block by utilizing a Hash algorithm and determining the calculated second Hash value as the initial digital signature of the encrypted data block.
In one possible implementation, the signature determination sub-module may include: and calculating the initial digital signature of the previous data block, the block-out time of each data block and a random number by using a hash algorithm, and determining the calculated third hash value as the signature of the current data block.
In one possible implementation manner, the device data to be stored may include at least one of the following: the device information of the first device currently produced by the enterprise corresponding to the first enterprise node and the device information of the second device currently developed may include at least one of the following: the device model, the component information used in the device, and the supplier information of the component.
In a possible implementation manner, the target size is determined in advance according to the transmission time of the data block and the verification time of the enterprise node in the alliance-link network.
The block chain-based equipment data storage device provided by the embodiment of the disclosure utilizes alliance chain equipment data storage, not only meets the sharing requirement and the confidentiality requirement of equipment data among different enterprises, but also improves the throughput of uplink of new equipment data.
The present disclosure may also provide a device data storage system based on a blockchain, the system including: the device data storage device comprises a first enterprise node and the device data storage device based on the block chain in the alliance chain network, wherein the first enterprise node is used for sending the screened and determined device data to be stored to the device data storage device based on the block chain.
The block chain-based equipment data storage system provided by the embodiment of the disclosure utilizes alliance chain equipment data storage, not only meets the sharing requirement and the confidentiality requirement of equipment data among different enterprises, but also improves the uplink throughput of new equipment data.
It should be noted that, although the above embodiments are described as examples of a device data storage method, apparatus and system based on a blockchain, those skilled in the art can understand that the disclosure should not be limited thereto. In fact, the user can flexibly set each step and module according to personal preference and/or actual application scene as long as the technical scheme of the disclosure is met.
Fig. 3 is a block diagram illustrating an apparatus 800 for a blockchain-based device data storage method according to an example embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 3, the apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium, such as the memory 804, is also provided that includes computer program instructions executable by the processor 820 of the device 800 to perform the above-described methods.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terms used herein were chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the techniques in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (12)

1. A method for storing device data based on a block chain is characterized in that the method comprises the following steps:
receiving data of equipment to be stored, which is screened and determined by a first enterprise node in a alliance chain network;
dividing the device data to be stored based on a target size and generating a plurality of data blocks;
respectively encrypting and signing each data block to obtain a plurality of encrypted data blocks with signatures;
storing a plurality of encrypted data blocks to a alliance chain, and copying the stored encrypted data blocks to obtain a plurality of copied data blocks;
and sending the plurality of copied data to a target node in the alliance-link network, wherein the target node is a node except the first enterprise node in the alliance-link network.
2. The method of claim 1, wherein dividing the device data to be stored and generating a plurality of data blocks based on a target size comprises:
determining the number of the data blocks which can be generated and the actual size corresponding to each data block according to the target size and the size of the data of the device to be stored;
adaptively adjusting the block output time of the corresponding data block according to the actual size corresponding to each data block;
a plurality of data blocks are generated according to the actual size and the block-out time of each data block.
3. The method of claim 2, wherein the target size comprises 20KB, wherein the absolute value of the difference between the actual size and the target size is less than or equal to 2KB,
the block output time is determined according to the block output time of the previous data block and the data volume change trend of the data block.
4. The method of claim 1, wherein the encrypting and signing processes are respectively performed for each data block to obtain a plurality of encrypted data blocks with signatures, and the method comprises:
encrypting each data block by adopting a symmetric encryption mode to form a plurality of encrypted data blocks;
obtaining an initial digital signature of each encrypted data block by using a digital signature technology;
the determined signature of the current data block is added to the current data block based on the initial digital signature of the previous data block.
5. The method of claim 4, wherein obtaining the initial digital signature for each encrypted data block using a digital signature technique comprises:
calculating an encrypted data block by utilizing a Hash algorithm, and determining a calculated first Hash value as an initial digital signature of the encrypted data block; or
And calculating an encryption key corresponding to the encrypted data block by utilizing a Hash algorithm, and determining a calculated second Hash value as an initial digital signature of the encrypted data block.
6. The method of claim 4, wherein adding the determined signature of the current data block to the current data block based on the initial digital signature of the previous data block comprises:
and calculating the initial digital signature of the previous data block, the block-out time of each data block and a random number by using a hash algorithm, and determining the calculated third hash value as the signature of the current data block.
7. The method of claim 1, wherein the device data to be stored comprises at least one of:
the device information of the first device currently produced by the enterprise corresponding to the first enterprise node, the device information of the second device currently developed,
the device information includes at least one of: the device model, the components and component information used in the device, and the supplier information of the components.
8. The method of claim 3, wherein the target size is determined in advance according to a transmission time of the data block and an authentication time of an enterprise node in the alliance-link network.
9. An apparatus for blockchain-based device data storage, the apparatus comprising:
the receiving module is used for receiving the data of the device to be stored, which is screened and determined by the first enterprise node in the alliance chain network;
the generating module is used for dividing the data of the device to be stored based on the target size and generating a plurality of data blocks;
the processing module is used for respectively carrying out encryption and signature processing on each data block to obtain a plurality of encrypted data blocks with signatures;
the storage module is used for storing the encrypted data blocks to a alliance chain and copying the stored encrypted data blocks to obtain a plurality of copied data blocks;
a sending module, configured to send the multiple pieces of replicated data to a target node in the alliance-link network, where the target node is a node in the alliance-link network other than the first enterprise node.
10. A blockchain-based device data storage system, the system comprising: a first enterprise node in a federation chain network, the blockchain-based device data storage apparatus of claim 8, the first enterprise node being configured to send the screened device data to be stored to the blockchain-based device data storage apparatus.
11. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the method of any one of claims 1 to 8.
12. A non-transitory computer readable storage medium having computer program instructions stored thereon, wherein the computer program instructions, when executed by a processor, implement the method of any of claims 1 to 8.
CN202011180920.8A 2020-10-29 2020-10-29 Block chain-based equipment data storage method, device and system Pending CN112163046A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011180920.8A CN112163046A (en) 2020-10-29 2020-10-29 Block chain-based equipment data storage method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011180920.8A CN112163046A (en) 2020-10-29 2020-10-29 Block chain-based equipment data storage method, device and system

Publications (1)

Publication Number Publication Date
CN112163046A true CN112163046A (en) 2021-01-01

Family

ID=73865128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011180920.8A Pending CN112163046A (en) 2020-10-29 2020-10-29 Block chain-based equipment data storage method, device and system

Country Status (1)

Country Link
CN (1) CN112163046A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301018A (en) * 2021-04-22 2021-08-24 浙江数秦科技有限公司 Data sharing method based on alliance chain
CN113553383A (en) * 2021-08-07 2021-10-26 九江嘉远科技有限公司 Suction nozzle detection method, system, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method
US20190273623A1 (en) * 2018-03-05 2019-09-05 Amit Biyani Systems and Methods for a Blockchain Multi-Chain Smart Contract Time Envelope
CN110597824A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Data storage method and device based on block chain network
CN111324902A (en) * 2018-12-14 2020-06-23 航天信息股份有限公司 Data access method, device and system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190273623A1 (en) * 2018-03-05 2019-09-05 Amit Biyani Systems and Methods for a Blockchain Multi-Chain Smart Contract Time Envelope
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN108647523A (en) * 2018-04-28 2018-10-12 华南理工大学 A kind of electronic identification system based on block chain and deposit card, file access pattern method
CN111324902A (en) * 2018-12-14 2020-06-23 航天信息股份有限公司 Data access method, device and system based on block chain
CN110597824A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Data storage method and device based on block chain network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘雅东: "基于区块链的溯源信息存储平台的研究与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301018A (en) * 2021-04-22 2021-08-24 浙江数秦科技有限公司 Data sharing method based on alliance chain
CN113553383A (en) * 2021-08-07 2021-10-26 九江嘉远科技有限公司 Suction nozzle detection method, system, equipment and storage medium
CN113553383B (en) * 2021-08-07 2022-02-22 九江嘉远科技有限公司 Suction nozzle detection method, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
EP3001640B1 (en) Secure information exchange methods and wearable device
EP3503595B1 (en) Provision of location-specific user information
US20180367315A1 (en) Method and apparatus for signing and verifying application installation package, and storage medium
CN112398648B (en) Key management method and device for key management
CN110796267A (en) Machine learning method and machine learning device for data sharing
CN109241423B (en) Information recommendation method and device, electronic equipment and storage medium
CN114978512B (en) Privacy intersection method and device and readable storage medium
CN113343212A (en) Device registration method and apparatus, electronic device, and storage medium
CN112163046A (en) Block chain-based equipment data storage method, device and system
CN111917728A (en) Password verification method and device
CN110753106A (en) File uploading method and device and electronic equipment
CN111464295B (en) Bank card making method and device
CN111010283B (en) Method and apparatus for generating information
CN115941181B (en) Out-of-order secret sharing method, system and readable storage medium
CN112464257A (en) Data detection method and device for data detection
CN114448631B (en) Multi-party security computing method, system and device for multi-party security computing
CN114885038B (en) Encryption protocol conversion method, result acquisition node and privacy calculation node
CN107463808B (en) Method for calling functional module integrated in operating system
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN114666048A (en) Data processing method and device, electronic equipment and storage medium
CN113868505A (en) Data processing method and device, electronic equipment, server and storage medium
CN112671530B (en) Data processing method and device and data processing device
CN113591120A (en) Information issuing method and device, electronic equipment and storage medium
CN116938453B (en) Key management method, device, equipment and storage medium
CN111382131B (en) Data processing method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210101

RJ01 Rejection of invention patent application after publication