CN112423294A - Block chain recording method based on 5G terminal - Google Patents

Block chain recording method based on 5G terminal Download PDF

Info

Publication number
CN112423294A
CN112423294A CN202010754865.2A CN202010754865A CN112423294A CN 112423294 A CN112423294 A CN 112423294A CN 202010754865 A CN202010754865 A CN 202010754865A CN 112423294 A CN112423294 A CN 112423294A
Authority
CN
China
Prior art keywords
user
cloud storage
information
storage server
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010754865.2A
Other languages
Chinese (zh)
Inventor
刘晓炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Weijiayi Technology Co ltd
Original Assignee
Shenzhen Weijiayi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Weijiayi Technology Co ltd filed Critical Shenzhen Weijiayi Technology Co ltd
Priority to CN202010754865.2A priority Critical patent/CN112423294A/en
Publication of CN112423294A publication Critical patent/CN112423294A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of block chains, and discloses a block chain recording method based on a 5G terminal, which comprises the following steps: step 1, information required by a user is collected through a local server, the information is encrypted through a protocol and a port, step 2, the encrypted information is transmitted to a cloud storage server through 5G transmission equipment or the Internet of things to be stored and stored, and step 3, when a 5G terminal user reads data from the cloud storage server. According to the block chain recording method based on the 5G terminal, information is encrypted through the local server, then, a 5G terminal user is matched with an encrypted file when accessing, an access log is generated whether the configuration is successful or not, the log is transmitted to the cloud storage server through the 5G transmission device to be stored and backed up, operation and maintenance personnel load the log on the cloud storage server regularly, and the effect of recording access records of all users is achieved.

Description

Block chain recording method based on 5G terminal
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain recording method based on a 5G terminal.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'trace in the whole process', 'traceability', 'public transparency', 'collective maintenance' and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect.
The 5G is just started to be used, and the high transmission speed provides great convenience for data reading, so that many block chains start to use the 5G as a basis, but the existing block chains basically record the client information with successful access, and do not record the denied information access, so that illegal users are difficult to catch up.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a block chain recording method based on a 5G terminal, which has the advantages of being capable of reading all client access records and the like, and solves the problem of incomplete recorded client access records in the background technology.
(II) technical scheme
In order to achieve the purpose of reading all the client access records, the invention provides the following technical scheme: a block chain recording method based on a 5G terminal comprises the following steps:
step 1, collecting information required by a user through a local server, and encrypting the information through a protocol and a port.
And 2, transmitting the encrypted information to a cloud storage server through 5G transmission equipment or the Internet of things for storage and storage.
And 3, when the 5G terminal user reads data from the cloud storage server, the 5G terminal equipment firstly sends a matching request and then performs port and protocol authentication.
And 4, after the user completes the verification of the matching information, the 5G transmission equipment sends a reading request to the cloud storage server, the cloud storage server decodes the encrypted file, feeds back a data packet to the 5G terminal user, and generates a user reading log for storage.
And step 5, when the verification of the matching of the 5G terminal user fails, the 5G transmission equipment counterclicks the failure information to the 5G terminal user, and simultaneously sends a log of the user reading failure to the cloud storage server.
And 6, periodically reading a user log stored in the cloud storage server through the local server by a maintainer to perform backup storage, and performing independent recording on abnormal information.
Preferably, the encryption means is a general encryption mode, data is set to be a hash code, and meanwhile, a protocol and a port are used for access limitation on a client.
By the scheme, illegal users can be refused to obtain the data on the server, and even if the data is subjected to packet capturing, the contents in the data are difficult to crack, so that the safety of information is improved.
Preferably, the cloud storage server is composed of a disk matrix with a read-write function, and performs data reading through a network.
Through the scheme, the data storage capacity can be effectively improved, and meanwhile, the data exchange capacity is improved.
Preferably, the port and protocol authentication is performed by comparing the request of the user with the port and protocol contents set by the server.
By the scheme, data such as IP (Internet protocol) and access time of the access user can be recorded during comparison, so that information of normal access users and illegal access users can be recorded.
Preferably, the decoding of the encrypted file is to reversely derive the encrypted file through an encryption program, so that the encrypted file becomes a plaintext for a client to recognize.
Through the scheme, only the normal access user can acquire correct resource information, so that the information safety is improved.
Preferably, the content of the user log includes access time, access IP, read directory, and the like.
Compared with the prior art, the invention provides a block chain recording method based on a 5G terminal, which has the following beneficial effects:
1. according to the block chain recording method based on the 5G terminal, information is encrypted through the local server, then, a 5G terminal user is matched with an encrypted file when accessing, an access log can be produced regardless of success and failure of matching, the log is transmitted to the cloud storage server through the 5G transmission device to be stored and backed up, operation and maintenance personnel load the log from the cloud storage server regularly, and the effect of recording access records of all users is achieved.
Drawings
FIG. 1 is a block diagram of the steps of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a block chain recording method based on a 5G terminal includes the following steps:
step 1, collecting information required by a user through a local server, and encrypting the information through a protocol and a port.
The encryption means in the step 1 is a universal encryption mode, data is set into hash codes, and meanwhile, access limitation is carried out on clients through protocols and ports, so that a data source can be cracked in a reading mode directly, and the security of network data is improved.
And 2, transmitting the encrypted information to a cloud storage server through 5G transmission equipment or the Internet of things for storage and storage.
The cloud storage server in the step 2 is composed of disk matrixes with read-write functions, data reading is carried out through a network, the storage space of data is improved by composing the disk matrixes, the storage space can be matched with the transmission rate of 5G, hackers can be prevented from directly attacking a core local server, and meanwhile, the loss of the database caused by misoperation of operation and maintenance personnel is reduced.
And 3, when the 5G terminal user reads data from the cloud storage server, the 5G terminal equipment firstly sends a matching request and then performs port and protocol authentication.
In the step 3, the port and protocol authentication is implemented by comparing the request of the user with the port and protocol content set by the server, and the access user can access the cloud storage server when the data are matched, so that the data security is improved, the data access amount of an illegal user is reduced, and the access response speed is improved.
And 4, after the user completes the verification of the matching information, the 5G transmission equipment sends a reading request to the cloud storage server, the cloud storage server decodes the encrypted file, feeds back a data packet to the 5G terminal user, and generates a user reading log for storage.
And 4, the decoding encrypted file is a file which is reversely deduced by the encryption program and is encrypted, so that the encrypted file is changed into a plaintext and is used for identifying the client, and the reverse deduction of the encrypted file by the encryption program has low time consumption and low implementation difficulty, so that the user information can be analyzed more quickly, and an access log of the user is stored.
And step 5, when the verification of the matching of the 5G terminal user fails, the 5G transmission equipment counterclicks the failure information to the 5G terminal user, and simultaneously sends a log of the user reading failure to the cloud storage server.
When the verification fails in the step 5, the illegal access user must provide the current login information to the server, so that the IP and the time period accessed by the illegal user are recorded, and the operation and maintenance personnel can conveniently find the abnormal login condition.
And 6, periodically reading a user log stored in the cloud storage server through the local server by a maintainer to perform backup storage, and performing independent recording on abnormal information.
And 6, performing backup storage on the log of the access user in order to improve the security of the log file, and meanwhile, after the network is attacked and disconnected, deducing an attack target and performing security protection through the backed-up access log.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. A block chain recording method based on a 5G terminal comprises the following steps:
step 1, information required by a user is collected through a local server, and the information is encrypted through a protocol and a port.
And 2, transmitting the encrypted information to a cloud storage server through 5G transmission equipment or the Internet of things for storage and storage.
And 3, when the 5G terminal user reads data from the cloud storage server, the 5G terminal equipment firstly sends a matching request and then performs port and protocol authentication.
And 4, after the user completes the verification of the matching information, the 5G transmission equipment sends a reading request to the cloud storage server, the cloud storage server decodes the encrypted file, feeds back a data packet to the 5G terminal user, and generates a user reading log for storage.
And step 5, when the verification of the matching of the 5G terminal user fails, the 5G transmission equipment counterclicks the failure information to the 5G terminal user, and simultaneously sends a log of the user reading failure to the cloud storage server.
And 6, periodically reading a user log stored in the cloud storage server through the local server by a maintainer to perform backup storage, and performing independent recording on abnormal information.
2. The method according to claim 1, wherein the method comprises: the encryption means is a universal encryption mode, data is set into hash codes, and meanwhile, a protocol and a port are used for carrying out access limitation on a client.
3. The method according to claim 1, wherein the method comprises: the cloud storage server is composed of a disk matrix with a read-write function, and data reading is carried out through a network.
4. The method according to claim 1, wherein the method comprises: the port and protocol authentication is carried out by comparing the request of the user with the port and protocol content set by the server.
5. The method according to claim 1, wherein the method comprises: the decoding of the encrypted file is to reversely derive the encrypted file through an encryption program, so that the encrypted file becomes a plaintext for a client to recognize.
6. The method according to claim 1, wherein the method comprises: the content of the user log comprises access time, access IP, reading directory and the like.
CN202010754865.2A 2020-07-30 2020-07-30 Block chain recording method based on 5G terminal Pending CN112423294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010754865.2A CN112423294A (en) 2020-07-30 2020-07-30 Block chain recording method based on 5G terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010754865.2A CN112423294A (en) 2020-07-30 2020-07-30 Block chain recording method based on 5G terminal

Publications (1)

Publication Number Publication Date
CN112423294A true CN112423294A (en) 2021-02-26

Family

ID=74844169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010754865.2A Pending CN112423294A (en) 2020-07-30 2020-07-30 Block chain recording method based on 5G terminal

Country Status (1)

Country Link
CN (1) CN112423294A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236750A (en) * 2010-04-29 2011-11-09 国际商业机器公司 Right control method and device for cloud computing system
WO2018016678A1 (en) * 2016-07-20 2018-01-25 한승현 System and method for managing user information acquired on basis of iot in cloud environment
CN109981649A (en) * 2019-03-27 2019-07-05 山东超越数控电子股份有限公司 A kind of cloud storage safety access method based on Security Certificate gateway, system, terminal and storage medium
CN110611564A (en) * 2019-07-30 2019-12-24 云南昆钢电子信息科技有限公司 System and method for defending API replay attack based on timestamp
CN111147447A (en) * 2019-12-03 2020-05-12 苏宁云计算有限公司 Data protection method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236750A (en) * 2010-04-29 2011-11-09 国际商业机器公司 Right control method and device for cloud computing system
WO2018016678A1 (en) * 2016-07-20 2018-01-25 한승현 System and method for managing user information acquired on basis of iot in cloud environment
CN109981649A (en) * 2019-03-27 2019-07-05 山东超越数控电子股份有限公司 A kind of cloud storage safety access method based on Security Certificate gateway, system, terminal and storage medium
CN110611564A (en) * 2019-07-30 2019-12-24 云南昆钢电子信息科技有限公司 System and method for defending API replay attack based on timestamp
CN111147447A (en) * 2019-12-03 2020-05-12 苏宁云计算有限公司 Data protection method and system

Similar Documents

Publication Publication Date Title
CN109729180B (en) Whole system intelligent community platform
US11223639B2 (en) Endpoint network traffic analysis
CN110690972B (en) Token authentication method and device, electronic equipment and storage medium
CN113051570B (en) Server access monitoring method and device
CN110740140A (en) network information security supervision system based on cloud platform
EP2790354A1 (en) Security management system having multiple relay servers, and security management method
CN112329050A (en) File security management terminal and system
CN110602111B (en) Interface anti-brushing method and system based on long connection
CN116980175A (en) Enterprise privacy analysis and anomaly discovery method, device, equipment and storage medium
CN106295384B (en) Big data platform access control method and device and authentication server
KR101858207B1 (en) System for security network
CN105608344A (en) Application program safety management system and method
CN107231365B (en) Evidence obtaining method, server and firewall
CN112423294A (en) Block chain recording method based on 5G terminal
CN114036480B (en) Security access control method and system for private application and readable storage medium
US20220150241A1 (en) Permissions for backup-related operations
CN115604028A (en) Cloud server data security protection system
CN115834566A (en) File transmission system and file transmission method
CN115086042A (en) User identity authentication method, user identity authentication system and computer storage medium
CN108093078B (en) Safe document circulation method
CN114124559B (en) Host recognition method based on public key fingerprint
CN111931142B (en) Distributed dynamic identity control method based on block chain and non-directional approval mechanism
CN117118750B (en) Data sharing method and device based on white-box password, electronic equipment and medium
CN117827545A (en) Data backup method and system
CN115145888A (en) Log storage system and method based on ipfs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210226