CN112423294A - Block chain recording method based on 5G terminal - Google Patents
Block chain recording method based on 5G terminal Download PDFInfo
- Publication number
- CN112423294A CN112423294A CN202010754865.2A CN202010754865A CN112423294A CN 112423294 A CN112423294 A CN 112423294A CN 202010754865 A CN202010754865 A CN 202010754865A CN 112423294 A CN112423294 A CN 112423294A
- Authority
- CN
- China
- Prior art keywords
- user
- cloud storage
- information
- storage server
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000005540 biological transmission Effects 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims description 7
- 230000002159 abnormal effect Effects 0.000 claims description 4
- 239000011159 matrix material Substances 0.000 claims description 2
- 238000012423 maintenance Methods 0.000 abstract description 5
- 230000000694 effects Effects 0.000 abstract description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of block chains, and discloses a block chain recording method based on a 5G terminal, which comprises the following steps: step 1, information required by a user is collected through a local server, the information is encrypted through a protocol and a port, step 2, the encrypted information is transmitted to a cloud storage server through 5G transmission equipment or the Internet of things to be stored and stored, and step 3, when a 5G terminal user reads data from the cloud storage server. According to the block chain recording method based on the 5G terminal, information is encrypted through the local server, then, a 5G terminal user is matched with an encrypted file when accessing, an access log is generated whether the configuration is successful or not, the log is transmitted to the cloud storage server through the 5G transmission device to be stored and backed up, operation and maintenance personnel load the log on the cloud storage server regularly, and the effect of recording access records of all users is achieved.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain recording method based on a 5G terminal.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'trace in the whole process', 'traceability', 'public transparency', 'collective maintenance' and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect.
The 5G is just started to be used, and the high transmission speed provides great convenience for data reading, so that many block chains start to use the 5G as a basis, but the existing block chains basically record the client information with successful access, and do not record the denied information access, so that illegal users are difficult to catch up.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a block chain recording method based on a 5G terminal, which has the advantages of being capable of reading all client access records and the like, and solves the problem of incomplete recorded client access records in the background technology.
(II) technical scheme
In order to achieve the purpose of reading all the client access records, the invention provides the following technical scheme: a block chain recording method based on a 5G terminal comprises the following steps:
step 1, collecting information required by a user through a local server, and encrypting the information through a protocol and a port.
And 2, transmitting the encrypted information to a cloud storage server through 5G transmission equipment or the Internet of things for storage and storage.
And 3, when the 5G terminal user reads data from the cloud storage server, the 5G terminal equipment firstly sends a matching request and then performs port and protocol authentication.
And 4, after the user completes the verification of the matching information, the 5G transmission equipment sends a reading request to the cloud storage server, the cloud storage server decodes the encrypted file, feeds back a data packet to the 5G terminal user, and generates a user reading log for storage.
And step 5, when the verification of the matching of the 5G terminal user fails, the 5G transmission equipment counterclicks the failure information to the 5G terminal user, and simultaneously sends a log of the user reading failure to the cloud storage server.
And 6, periodically reading a user log stored in the cloud storage server through the local server by a maintainer to perform backup storage, and performing independent recording on abnormal information.
Preferably, the encryption means is a general encryption mode, data is set to be a hash code, and meanwhile, a protocol and a port are used for access limitation on a client.
By the scheme, illegal users can be refused to obtain the data on the server, and even if the data is subjected to packet capturing, the contents in the data are difficult to crack, so that the safety of information is improved.
Preferably, the cloud storage server is composed of a disk matrix with a read-write function, and performs data reading through a network.
Through the scheme, the data storage capacity can be effectively improved, and meanwhile, the data exchange capacity is improved.
Preferably, the port and protocol authentication is performed by comparing the request of the user with the port and protocol contents set by the server.
By the scheme, data such as IP (Internet protocol) and access time of the access user can be recorded during comparison, so that information of normal access users and illegal access users can be recorded.
Preferably, the decoding of the encrypted file is to reversely derive the encrypted file through an encryption program, so that the encrypted file becomes a plaintext for a client to recognize.
Through the scheme, only the normal access user can acquire correct resource information, so that the information safety is improved.
Preferably, the content of the user log includes access time, access IP, read directory, and the like.
Compared with the prior art, the invention provides a block chain recording method based on a 5G terminal, which has the following beneficial effects:
1. according to the block chain recording method based on the 5G terminal, information is encrypted through the local server, then, a 5G terminal user is matched with an encrypted file when accessing, an access log can be produced regardless of success and failure of matching, the log is transmitted to the cloud storage server through the 5G transmission device to be stored and backed up, operation and maintenance personnel load the log from the cloud storage server regularly, and the effect of recording access records of all users is achieved.
Drawings
FIG. 1 is a block diagram of the steps of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a block chain recording method based on a 5G terminal includes the following steps:
step 1, collecting information required by a user through a local server, and encrypting the information through a protocol and a port.
The encryption means in the step 1 is a universal encryption mode, data is set into hash codes, and meanwhile, access limitation is carried out on clients through protocols and ports, so that a data source can be cracked in a reading mode directly, and the security of network data is improved.
And 2, transmitting the encrypted information to a cloud storage server through 5G transmission equipment or the Internet of things for storage and storage.
The cloud storage server in the step 2 is composed of disk matrixes with read-write functions, data reading is carried out through a network, the storage space of data is improved by composing the disk matrixes, the storage space can be matched with the transmission rate of 5G, hackers can be prevented from directly attacking a core local server, and meanwhile, the loss of the database caused by misoperation of operation and maintenance personnel is reduced.
And 3, when the 5G terminal user reads data from the cloud storage server, the 5G terminal equipment firstly sends a matching request and then performs port and protocol authentication.
In the step 3, the port and protocol authentication is implemented by comparing the request of the user with the port and protocol content set by the server, and the access user can access the cloud storage server when the data are matched, so that the data security is improved, the data access amount of an illegal user is reduced, and the access response speed is improved.
And 4, after the user completes the verification of the matching information, the 5G transmission equipment sends a reading request to the cloud storage server, the cloud storage server decodes the encrypted file, feeds back a data packet to the 5G terminal user, and generates a user reading log for storage.
And 4, the decoding encrypted file is a file which is reversely deduced by the encryption program and is encrypted, so that the encrypted file is changed into a plaintext and is used for identifying the client, and the reverse deduction of the encrypted file by the encryption program has low time consumption and low implementation difficulty, so that the user information can be analyzed more quickly, and an access log of the user is stored.
And step 5, when the verification of the matching of the 5G terminal user fails, the 5G transmission equipment counterclicks the failure information to the 5G terminal user, and simultaneously sends a log of the user reading failure to the cloud storage server.
When the verification fails in the step 5, the illegal access user must provide the current login information to the server, so that the IP and the time period accessed by the illegal user are recorded, and the operation and maintenance personnel can conveniently find the abnormal login condition.
And 6, periodically reading a user log stored in the cloud storage server through the local server by a maintainer to perform backup storage, and performing independent recording on abnormal information.
And 6, performing backup storage on the log of the access user in order to improve the security of the log file, and meanwhile, after the network is attacked and disconnected, deducing an attack target and performing security protection through the backed-up access log.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (6)
1. A block chain recording method based on a 5G terminal comprises the following steps:
step 1, information required by a user is collected through a local server, and the information is encrypted through a protocol and a port.
And 2, transmitting the encrypted information to a cloud storage server through 5G transmission equipment or the Internet of things for storage and storage.
And 3, when the 5G terminal user reads data from the cloud storage server, the 5G terminal equipment firstly sends a matching request and then performs port and protocol authentication.
And 4, after the user completes the verification of the matching information, the 5G transmission equipment sends a reading request to the cloud storage server, the cloud storage server decodes the encrypted file, feeds back a data packet to the 5G terminal user, and generates a user reading log for storage.
And step 5, when the verification of the matching of the 5G terminal user fails, the 5G transmission equipment counterclicks the failure information to the 5G terminal user, and simultaneously sends a log of the user reading failure to the cloud storage server.
And 6, periodically reading a user log stored in the cloud storage server through the local server by a maintainer to perform backup storage, and performing independent recording on abnormal information.
2. The method according to claim 1, wherein the method comprises: the encryption means is a universal encryption mode, data is set into hash codes, and meanwhile, a protocol and a port are used for carrying out access limitation on a client.
3. The method according to claim 1, wherein the method comprises: the cloud storage server is composed of a disk matrix with a read-write function, and data reading is carried out through a network.
4. The method according to claim 1, wherein the method comprises: the port and protocol authentication is carried out by comparing the request of the user with the port and protocol content set by the server.
5. The method according to claim 1, wherein the method comprises: the decoding of the encrypted file is to reversely derive the encrypted file through an encryption program, so that the encrypted file becomes a plaintext for a client to recognize.
6. The method according to claim 1, wherein the method comprises: the content of the user log comprises access time, access IP, reading directory and the like.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010754865.2A CN112423294A (en) | 2020-07-30 | 2020-07-30 | Block chain recording method based on 5G terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010754865.2A CN112423294A (en) | 2020-07-30 | 2020-07-30 | Block chain recording method based on 5G terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112423294A true CN112423294A (en) | 2021-02-26 |
Family
ID=74844169
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010754865.2A Pending CN112423294A (en) | 2020-07-30 | 2020-07-30 | Block chain recording method based on 5G terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112423294A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236750A (en) * | 2010-04-29 | 2011-11-09 | 国际商业机器公司 | Right control method and device for cloud computing system |
WO2018016678A1 (en) * | 2016-07-20 | 2018-01-25 | 한승현 | System and method for managing user information acquired on basis of iot in cloud environment |
CN109981649A (en) * | 2019-03-27 | 2019-07-05 | 山东超越数控电子股份有限公司 | A kind of cloud storage safety access method based on Security Certificate gateway, system, terminal and storage medium |
CN110611564A (en) * | 2019-07-30 | 2019-12-24 | 云南昆钢电子信息科技有限公司 | System and method for defending API replay attack based on timestamp |
CN111147447A (en) * | 2019-12-03 | 2020-05-12 | 苏宁云计算有限公司 | Data protection method and system |
-
2020
- 2020-07-30 CN CN202010754865.2A patent/CN112423294A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236750A (en) * | 2010-04-29 | 2011-11-09 | 国际商业机器公司 | Right control method and device for cloud computing system |
WO2018016678A1 (en) * | 2016-07-20 | 2018-01-25 | 한승현 | System and method for managing user information acquired on basis of iot in cloud environment |
CN109981649A (en) * | 2019-03-27 | 2019-07-05 | 山东超越数控电子股份有限公司 | A kind of cloud storage safety access method based on Security Certificate gateway, system, terminal and storage medium |
CN110611564A (en) * | 2019-07-30 | 2019-12-24 | 云南昆钢电子信息科技有限公司 | System and method for defending API replay attack based on timestamp |
CN111147447A (en) * | 2019-12-03 | 2020-05-12 | 苏宁云计算有限公司 | Data protection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109729180B (en) | Whole system intelligent community platform | |
US11223639B2 (en) | Endpoint network traffic analysis | |
CN110690972B (en) | Token authentication method and device, electronic equipment and storage medium | |
CN113051570B (en) | Server access monitoring method and device | |
CN110740140A (en) | network information security supervision system based on cloud platform | |
EP2790354A1 (en) | Security management system having multiple relay servers, and security management method | |
CN112329050A (en) | File security management terminal and system | |
CN110602111B (en) | Interface anti-brushing method and system based on long connection | |
CN116980175A (en) | Enterprise privacy analysis and anomaly discovery method, device, equipment and storage medium | |
CN106295384B (en) | Big data platform access control method and device and authentication server | |
KR101858207B1 (en) | System for security network | |
CN105608344A (en) | Application program safety management system and method | |
CN107231365B (en) | Evidence obtaining method, server and firewall | |
CN112423294A (en) | Block chain recording method based on 5G terminal | |
CN114036480B (en) | Security access control method and system for private application and readable storage medium | |
US20220150241A1 (en) | Permissions for backup-related operations | |
CN115604028A (en) | Cloud server data security protection system | |
CN115834566A (en) | File transmission system and file transmission method | |
CN115086042A (en) | User identity authentication method, user identity authentication system and computer storage medium | |
CN108093078B (en) | Safe document circulation method | |
CN114124559B (en) | Host recognition method based on public key fingerprint | |
CN111931142B (en) | Distributed dynamic identity control method based on block chain and non-directional approval mechanism | |
CN117118750B (en) | Data sharing method and device based on white-box password, electronic equipment and medium | |
CN117827545A (en) | Data backup method and system | |
CN115145888A (en) | Log storage system and method based on ipfs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210226 |