CN112507371B - Civil aviation safety inspection data processing system based on block chain - Google Patents

Civil aviation safety inspection data processing system based on block chain Download PDF

Info

Publication number
CN112507371B
CN112507371B CN202110157215.4A CN202110157215A CN112507371B CN 112507371 B CN112507371 B CN 112507371B CN 202110157215 A CN202110157215 A CN 202110157215A CN 112507371 B CN112507371 B CN 112507371B
Authority
CN
China
Prior art keywords
security
seal
information
node
security seal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110157215.4A
Other languages
Chinese (zh)
Other versions
CN112507371A (en
Inventor
佟业新
冯海伟
唐红武
张军涛
李崇谦
梁馨月
章秀静
李文杰
伍彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Travelsky Mobile Technology Co Ltd
Original Assignee
China Travelsky Mobile Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Travelsky Mobile Technology Co Ltd filed Critical China Travelsky Mobile Technology Co Ltd
Priority to CN202110157215.4A priority Critical patent/CN112507371B/en
Publication of CN112507371A publication Critical patent/CN112507371A/en
Application granted granted Critical
Publication of CN112507371B publication Critical patent/CN112507371B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a civil aviation safety inspection data processing system based on a block chain, which comprises the block chain, an intelligent contract, a processor and a memory, wherein the block chain is constructed in advance, the memory stores a computer program, the block chain is a alliance chain, and when a participant node is registered on the block chain, the intelligent contract is used for configuring corresponding authority for the participant node. The invention improves the safety and reliability of civil aviation safety inspection data.

Description

Civil aviation safety inspection data processing system based on block chain
Technical Field
The invention relates to the technical field of data processing, in particular to a civil aviation security check data processing system based on a block chain.
Background
Paperless customs clearance for civil aviation travel is the trend of civil aviation travel, wherein electronic boarding cards and security badges are used as user security check and boarding certificates, and the common and safe security check technology replaces the traditional paper boarding cards and manual stamping at present. In the paperless security check technology, the security check equipment, the security check system and the security check seal data are stored by the security check system side server in a unified manner for centralized management, and the airport server and the generator side server of the electronic boarding pass can acquire the security check data to judge whether the user is over-checked (passes the security check) by butting the security check system server.
However, the centralized security inspection data processing system prevents a third-party monitoring authority from effectively monitoring the security inspection data in real time, and also prevents users, system providers, system users, monitoring parties and the like from mutually trusting, and has high communication cost and low communication efficiency. In addition, potential safety hazards and vulnerabilities exist in the centralized security check information system, and especially when the problems of security check data source tracing and tracing are involved, if the situation of data modification in a private mode exists, real security check data cannot be traced. Therefore, the technical problem to be solved is how to provide a safe and reliable civil aviation safety inspection data processing technology.
Disclosure of Invention
The invention aims to provide a civil aviation safety inspection data processing system based on a block chain, which improves the safety and reliability of civil aviation safety inspection data.
According to a first aspect of the present invention, there is provided a civil aviation security inspection data processing system based on a block chain, including a block chain constructed in advance, an intelligent contract, a processor and a memory storing a computer program, where the block chain is a federation chain, and when a participant node registers on the block chain, a corresponding right is configured for the participant node on the intelligent contract, and the processor executes the computer program to implement the following steps:
step S1, receiving a security check seal uplink request sent by a first node, judging whether the first node has security check seal uplink authority or not based on the intelligent contract, if so, executing step S2, wherein the security check seal is generated by the first node after stroke verification is carried out based on the received to-be-detected certificate;
step S2, writing the security seal information into the first node block, and sending a security seal generation event to the node block with security seal acquisition authority based on the intelligent contract;
step S3, receiving a security check seal issuing request sent by a second node based on a to-be-signed certificate, judging whether the second node has security check seal issuing authority based on the intelligent contract, and if so, executing step S4, wherein a block with the security check seal issuing authority also has security check seal obtaining authority;
step S4, the second node block acquires security seal information corresponding to the certificate to be signed from the first node block based on the received security seal generating event, displays the security seal information on the certificate to be signed, writes security seal issuing record information into the second node block, and sends a security seal issuing event to the node block with security seal issuing record information acquiring authority based on the intelligent contract;
step S5, receiving a security seal verification request sent by a third node, analyzing security seal information to be verified obtained from the certificate information to be verified from the security seal verification request, judging whether the third node has security seal verification authority based on the intelligent contract, and if so, executing step S6, wherein a block with the security seal verification authority also has security seal obtaining authority and security seal signing record information obtaining authority;
step S6, the third node block acquires security seal information corresponding to the certificate to be signed from the first node block based on the received security seal generation event as target security seal information, compares the security seal information to be verified with the target security seal information, and if the security seal information to be verified is consistent with the target security seal information, executes step S7;
and step S7, the third node block acquires the security seal issuing record information corresponding to the target security seal information from the second node block based on the received security seal issuing event, if the acquisition is successful, the security seal is verified successfully, otherwise, the security seal is verified unsuccessfully.
Compared with the prior art, the invention has obvious advantages and beneficial effects. By means of the technical scheme, the civil aviation safety inspection data processing system based on the block chain can achieve considerable technical progress and practicability, has wide industrial utilization value and at least has the following advantages:
the method and the device process the civil aviation safety inspection data based on the block chain, improve the safety and reliability of the civil aviation safety inspection data, reduce the communication cost among all the participants, and improve the efficiency of acquiring the safety inspection data among all the participants.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical means of the present invention more clearly understood, the present invention may be implemented in accordance with the content of the description, and in order to make the above and other objects, features, and advantages of the present invention more clearly understood, the following preferred embodiments are described in detail with reference to the accompanying drawings.
Drawings
Fig. 1 is a schematic diagram of a block chain-based civil aviation security inspection data processing system according to an embodiment of the present invention.
Detailed Description
To further illustrate the technical means and effects of the present invention for achieving the predetermined objects, the following detailed description will be given with reference to the accompanying drawings and preferred embodiments of a block chain-based civil aviation security inspection data processing system according to the present invention.
An embodiment of the present invention provides a civil aviation security inspection data processing system based on a block chain, as shown in fig. 1, including a block chain, an intelligent contract, a processor, and a memory storing a computer program, where the block chain is a federation chain, and when a participant node is registered on the block chain, a corresponding right is configured for the participant node on the intelligent contract, it can be understood that a first node, a second node, a third node, and a fourth node mentioned below all belong to the participant node, and blocks corresponding to the block chain are a first node block, a second node block, a third node block, and a fourth node block, respectively. The processor executing the computer program realizes the following steps:
step S1, receiving a security check seal uplink request sent by a first node, judging whether the first node has security check seal uplink authority or not based on the intelligent contract, and if so, executing step S2;
the security seal is generated by the first node after the first node performs the travel verification based on the received to-be-detected certificate, specifically, the first node receives the to-be-detected certificate, acquires travel information corresponding to the to-be-detected certificate, verifies the travel information, and generates the corresponding security seal based on the travel information if the verification is passed. The certificate to be detected can be an electronic boarding check, an identity certificate and the like. The first node may be a security system side server.
Step S2, writing the security seal information into the first node block, and sending a security seal generation event to the node block with security seal acquisition authority based on the intelligent contract;
step S3, receiving a security check seal issuing request sent by a second node based on a to-be-signed certificate, judging whether the second node has security check seal issuing authority based on the intelligent contract, and if so, executing step S4, wherein a block with the security check seal issuing authority also has security check seal obtaining authority;
the certificate to be signed may be an electronic boarding pass, and the second node may be a server of a generator of the electronic boarding pass.
Step S4, the second node block acquires security seal information corresponding to the certificate to be signed from the first node block based on the received security seal generating event, displays the security seal information on the certificate to be signed, writes security seal issuing record information into the second node block, and sends a security seal issuing event to the node block with security seal issuing record information acquiring authority based on the intelligent contract;
it should be noted that the security seal information is displayed on the certificate to be signed, which can be implemented by directly adopting the existing data processing technology, and the description is not expanded here. When the security seal information is displayed on the electronic boarding pass, the user is proved to pass the security check, and the electronic boarding pass displaying the security seal information is used for subsequent gate and on-board inspection.
Step S5, receiving a security seal verification request sent by a third node, analyzing security seal information to be verified obtained from the certificate information to be verified from the security seal verification request, judging whether the third node has security seal verification authority based on the intelligent contract, and if so, executing step S6, wherein a block with the security seal verification authority also has security seal obtaining authority and security seal signing record information obtaining authority;
step S6, the third node block acquires security seal information corresponding to the certificate to be signed from the first node block based on the received security seal generation event as target security seal information, compares the security seal information to be verified with the target security seal information, and if the security seal information to be verified is consistent with the target security seal information, executes step S7;
and step S7, the third node block acquires the security seal issuing record information corresponding to the target security seal information from the second node block based on the received security seal issuing event, if the acquisition is successful, the security seal is verified successfully, otherwise, the security seal is verified unsuccessfully.
The third node may specifically be a verification server arranged at the boarding gate, and is configured to verify whether a security check seal generated after the security check of the user is a security check seal that actually passes through the security check process. Whether the security seal information corresponding to the certificate to be signed is the real security seal information is verified through the step S6, whether the user obtains the security seal information through the preset security check process is verified through the security seal signing record information corresponding to the target security seal information in the step S7, verification is performed from two lines, and the accuracy of security seal verification is improved.
The system of the embodiment of the invention processes civil aviation safety inspection data based on the block chain, solves the problems of distributed safety inspection data storage and safety inspection data trust in case flow, improves the safety and reliability of the civil aviation safety inspection data, reduces the communication cost among all participants, improves the efficiency of obtaining the safety inspection data among all the participants, and solves the problem that the safety inspection seal data is stored transparently and backtraceably.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. A process may be terminated when its operations are completed, but may have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
In order to improve the accuracy of security check data recording and the efficiency of security check data interaction among the participants, a data storage structure of security check seal information may be preset, and as an embodiment, in step S2, the writing the security check seal information into the first node block includes:
step S21, writing the security check seal information into the first node block according to a preset first data structure, where the preset first data structure includes: the security check device comprises a security check seal id data segment, a certificate information data segment, a creation time data segment, a security check channel data segment, a security check device id data segment, a first check bit data segment, a security check seal file address data segment and a security check seal file content data segment, wherein the first check bit can be used in cooperation with the encryption and decryption process of the security check data, and the security of the security check data is further improved. As an example, the credential information data segment may include an e-ticket number, a segment number, a flight date, a security airport three-character code, a boarding number, passenger credential information, and the like, and the corresponding first data structure is defined as shown in table 1:
Figure 989285DEST_PATH_IMAGE001
TABLE 1
In order to further improve the security of the security check data, important security check data may be encrypted and then stored in a blockchain, as an embodiment, in step S2, the writing the security check seal information into the first node block further includes:
step S22, writing the security seal information into the first node block after being encrypted by adopting a first encryption key;
correspondingly, in step S4, the obtaining, by the second node block, security seal information corresponding to the to-be-signed certificate from the first node block based on the received security seal generation event includes:
step S41, the second node block acquires the encrypted security seal information corresponding to the certificate to be signed and the first decryption key corresponding to the first encryption key from the first node block based on the received security seal generation event, and decrypts the encrypted security seal information corresponding to the certificate to be signed by using the first decryption key to obtain the security seal information corresponding to the certificate to be signed.
In step S6, the third node block obtains security seal information corresponding to the to-be-signed certificate from the first node block based on the received security seal generation event, and the security seal information is used as target security seal information, and the method includes:
and the third node block acquires the encrypted security seal information and the first decryption key corresponding to the certificate to be signed from the first node block based on the received security seal generation event, and decrypts the encrypted security seal information corresponding to the certificate to be signed by adopting the first decryption key to obtain the target security seal information.
In order to improve the accuracy of security check data recording and the efficiency of each participant in performing security check data interaction, a data storage structure of security check seal issuing record information may be preset, and as an embodiment, in step S4, the writing of the security check seal issuing record information in the second node block includes:
step S41, writing the security seal issuance record information into the second node block according to a preset second data structure, where the preset second data structure includes:
the security check seal records an id data segment, a certificate information data segment, a security check seal node id data segment, a security check seal time data segment, a security check seal id data segment, a security check seal node mechanism number data segment and a second check bit data segment, wherein the second check bit can be used in cooperation with the encryption and decryption process of the security check data, and the security of the security check data is further improved. As an example, the data segment of the credential information includes an e-ticket number, a segment number, a flight date, a security airport three-character code, a boarding number, passenger credential information, etc., and the corresponding second data structure is defined as shown in table 2
Figure DEST_PATH_IMAGE002
TABLE 2
In order to further improve the security of the case data, as an embodiment, in step S4, the writing security seal issuance record information in the second node block includes:
step S42, writing the security seal issuing record information into the second node block after being encrypted by a second encryption key;
correspondingly, in step S7, the acquiring, by the third node block, security seal issuance record information corresponding to the target security seal information from the second node block based on the received security seal issuance event includes:
and step S71, the third node block acquires the encrypted security seal signing record information corresponding to the target security seal information and a second decryption key corresponding to the second encryption key from the second node block based on the received security seal signing event, and decrypts the encrypted security seal signing record information corresponding to the target security seal information by using the second decryption key to obtain the security seal signing record information corresponding to the target security seal information.
As an embodiment, after step S7, the security inspection data of the verification process may also be stored, and in combination with the aforementioned security seal information and security seal record information, the processor may further perform the following steps when executing the computer program:
and step S8, the third node block encrypts the security seal verification information by adopting a third encryption key, stores the encrypted security seal verification information into the third node block, and sends a security seal verification event to the node block with the security seal verification information acquisition authority.
The security seal verification information specifically includes security seal information to be verified, target security seal information, encrypted security seal signing record information corresponding to the target security seal information, and verification result information.
The system can realize backtracking of the whole security check process, and specifically, in an embodiment, the processor executes the computer program to further realize the following steps:
step S10, receiving a security check and verification information acquisition request sent by a fourth node, judging whether the fourth node has security check and verification information acquisition permission based on the intelligent contract, and if so, executing step S20, wherein a block with the security check and verification information acquisition permission also has security check seal acquisition permission, security check seal signing record information acquisition permission and security check seal verification information acquisition permission;
step S20, the fourth node block acquires encrypted security seal information to be stored and certified and a first decryption key corresponding to the first encryption key from the first node block based on the received security seal generation event, and decrypts the encrypted security seal information to be stored and certified by using the first decryption key to obtain the security seal information to be stored and certified;
step S30, the fourth node block acquires the encrypted security check seal signing and issuing record information of the to-be-stored certificate and a second decryption key corresponding to the second encryption key from the second node block based on the received security check seal signing and issuing event, and decrypts the encrypted security check seal signing and issuing record information of the to-be-stored certificate by adopting the second decryption key to obtain the security check seal signing and issuing record information of the to-be-stored certificate;
step S40, the fourth node block acquires the encrypted security seal verification information to be stored and a third decryption key corresponding to the third encryption key from the third node block based on the received security seal verification event, and the third decryption key is adopted to decrypt the encrypted security seal verification information to be stored to obtain the security seal verification information to be stored;
and step S50, generating security inspection flow information according to the security inspection seal information of the to-be-stored certificate, the security inspection seal signing and recording information of the to-be-stored certificate and the security inspection seal verification information of the to-be-stored certificate in time sequence.
The fourth node includes a preset Software Development Kit (SDK) for accessing a terminal that is not registered in the blockchain, and sets a corresponding right, and sends corresponding security check data in the security check process information to the terminal based on data acquisition request information and the right corresponding to the terminal. The SDK is preset on the block chain node, and the corresponding authority is set, so that corresponding security check data can be provided for terminals outside the block chain, and the authority control is more flexible.
Although the present invention has been described with reference to a preferred embodiment, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. A civil aviation security check data processing system based on a block chain is characterized in that,
the intelligent contract block management method comprises a block chain, an intelligent contract, a processor and a memory, wherein the block chain is constructed in advance, the memory stores a computer program, the block chain is a alliance chain, when a participant node is registered on the block chain, corresponding authority is configured for the participant node on the intelligent contract, and the processor executes the computer program to realize the following steps:
step S1, receiving a security check seal uplink request sent by a first node, judging whether the first node has security check seal uplink authority or not based on the intelligent contract, if so, executing step S2, wherein the security check seal is generated by the first node after stroke verification is carried out based on the received to-be-detected certificate;
step S2, writing security seal information into the first node block, and sending a security seal generation event to the node block with security seal acquisition authority based on the intelligent contract;
step S3, receiving a security check seal issuing request sent by a second node based on a to-be-signed certificate, judging whether the second node has security check seal issuing authority based on the intelligent contract, and if so, executing step S4, wherein a block with the security check seal issuing authority also has security check seal obtaining authority;
step S4, the second node block acquires security seal information corresponding to the certificate to be signed from the first node block based on the received security seal generating event, displays the security seal information on the certificate to be signed, writes security seal issuing record information into the second node block, and sends a security seal issuing event to the node block with security seal issuing record information acquiring authority based on the intelligent contract;
step S5, receiving a security seal verification request sent by a third node, analyzing security seal information to be verified obtained from the certificate information to be verified from the security seal verification request, judging whether the third node has security seal verification authority based on the intelligent contract, and if so, executing step S6, wherein a block with the security seal verification authority also has security seal obtaining authority and security seal signing record information obtaining authority;
step S6, the third node block acquires security seal information corresponding to the certificate to be signed from the first node block based on the received security seal generation event as target security seal information, compares the security seal information to be verified with the target security seal information, and if the security seal information to be verified is consistent with the target security seal information, executes step S7;
and step S7, the third node block acquires the security seal issuing record information corresponding to the target security seal information from the second node block based on the received security seal issuing event, if the acquisition is successful, the security seal is verified successfully, otherwise, the security seal is verified unsuccessfully.
2. The system of claim 1,
in step S2, the writing the security seal information into the first node block includes:
step S21, writing the security check seal information into the first node block according to a preset first data structure, where the preset first data structure includes: the system comprises a security check seal id data segment, a certificate information data segment, a creation time data segment, a security check channel data segment, a security check device id data segment, a first check bit data segment, a security check seal file address data segment and a security check seal file content data segment, wherein the certificate information data segment comprises an electronic passenger ticket number, a flight segment serial number, a flight date, a security check airport three-character code, a boarding serial number and passenger certificate information.
3. The system of claim 2,
in step S2, the writing the security check seal information into the first node block further includes:
step S22, writing the security seal information into the first node block after being encrypted by adopting a first encryption key;
correspondingly, in step S4, the obtaining, by the second node block, security seal information corresponding to the to-be-signed certificate from the first node block based on the received security seal generation event includes:
step S41, the second node block acquires encrypted security seal information corresponding to the certificate to be signed and a first decryption key corresponding to the first encryption key from the first node block based on the received security seal generation event, and decrypts the encrypted security seal information corresponding to the certificate to be signed by using the first decryption key to obtain the security seal information corresponding to the certificate to be signed;
in step S6, the third node block obtains security seal information corresponding to the to-be-signed certificate from the first node block based on the received security seal generation event, and the security seal information is used as target security seal information, and the method includes:
and the third node block acquires the encrypted security seal information and the first decryption key corresponding to the certificate to be signed from the first node block based on the received security seal generation event, and decrypts the encrypted security seal information corresponding to the certificate to be signed by adopting the first decryption key to obtain the target security seal information.
4. The system of claim 3,
in step S4, the writing of the security seal issuance record information in the second node block includes:
step S41, writing the security seal issuance record information into the second node block according to a preset second data structure, where the preset second data structure includes:
the security check seal record id data segment, the certificate information data segment, the security check seal node id data segment, the security check seal time data segment, the security check seal id data segment, the security check seal node mechanism number data segment and the second check bit data segment.
5. The system of claim 4,
in step S4, the writing of the security seal issuance record information in the second node block includes:
step S42, writing the security seal issuing record information into the second node block after being encrypted by a second encryption key;
correspondingly, in step S7, the acquiring, by the third node block, security seal issuance record information corresponding to the target security seal information from the second node block based on the received security seal issuance event includes:
and step S71, the third node block acquires the encrypted security seal signing record information corresponding to the target security seal information and a second decryption key corresponding to the second encryption key from the second node block based on the received security seal signing event, and decrypts the encrypted security seal signing record information corresponding to the target security seal information by using the second decryption key to obtain the security seal signing record information corresponding to the target security seal information.
6. The system of claim 5,
the processor executing the computer program further realizes the steps of:
and step S8, the third node block encrypts the security seal verification information by adopting a third encryption key, stores the encrypted security seal verification information into the third node block, and sends a security seal verification event to the node block with the security seal verification information acquisition authority.
7. The system of claim 6,
the processor executing the computer program further realizes the steps of:
step S10, receiving a security check and verification information acquisition request sent by a fourth node, judging whether the fourth node has security check and verification information acquisition permission based on the intelligent contract, and if so, executing step S20, wherein a block with the security check and verification information acquisition permission also has security check seal acquisition permission, security check seal signing record information acquisition permission and security check seal verification information acquisition permission;
step S20, the fourth node block acquires encrypted security seal information to be stored and certified and a first decryption key corresponding to the first encryption key from the first node block based on the received security seal generation event, and decrypts the encrypted security seal information to be stored and certified by using the first decryption key to obtain the security seal information to be stored and certified;
step S30, the fourth node block acquires the encrypted security check seal signing and issuing record information of the to-be-stored certificate and a second decryption key corresponding to the second encryption key from the second node block based on the received security check seal signing and issuing event, and decrypts the encrypted security check seal signing and issuing record information of the to-be-stored certificate by adopting the second decryption key to obtain the security check seal signing and issuing record information of the to-be-stored certificate;
step S40, the fourth node block acquires the encrypted security seal verification information to be stored and a third decryption key corresponding to the third encryption key from the third node block based on the received security seal verification event, and the third decryption key is adopted to decrypt the encrypted security seal verification information to be stored to obtain the security seal verification information to be stored;
and step S50, generating security inspection flow information according to the security inspection seal information of the to-be-stored certificate, the security inspection seal signing and recording information of the to-be-stored certificate and the security inspection seal verification information of the to-be-stored certificate in time sequence.
8. The system of claim 7,
the fourth node comprises a preset SDK and is used for accessing terminals which are not registered on the block chain, setting corresponding authority, and sending corresponding security check data in the security check process information to the terminals based on the data acquisition request information and the authority corresponding to the terminals.
CN202110157215.4A 2021-02-05 2021-02-05 Civil aviation safety inspection data processing system based on block chain Active CN112507371B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110157215.4A CN112507371B (en) 2021-02-05 2021-02-05 Civil aviation safety inspection data processing system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110157215.4A CN112507371B (en) 2021-02-05 2021-02-05 Civil aviation safety inspection data processing system based on block chain

Publications (2)

Publication Number Publication Date
CN112507371A CN112507371A (en) 2021-03-16
CN112507371B true CN112507371B (en) 2021-04-27

Family

ID=74952680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110157215.4A Active CN112507371B (en) 2021-02-05 2021-02-05 Civil aviation safety inspection data processing system based on block chain

Country Status (1)

Country Link
CN (1) CN112507371B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114710296B (en) * 2022-05-17 2022-08-23 奇安信科技集团股份有限公司 Method and system for processing network security event and block chain platform
CN114969211B (en) * 2022-07-28 2022-09-30 中航信移动科技有限公司 Civil aviation data processing system based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650079A (en) * 2018-03-26 2018-10-12 厦门快商通信息技术有限公司 A kind of border safety inspection method and system based on block chain technology
EP3617977A1 (en) * 2018-08-31 2020-03-04 Siemens Aktiengesellschaft Device and method for determining a consense version of a transaction log and devcice and method for monitoring of a distributed database system
CN111353789A (en) * 2020-03-06 2020-06-30 厦门区块链云科技有限公司 Anti-counterfeiting traceability system based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650079A (en) * 2018-03-26 2018-10-12 厦门快商通信息技术有限公司 A kind of border safety inspection method and system based on block chain technology
EP3617977A1 (en) * 2018-08-31 2020-03-04 Siemens Aktiengesellschaft Device and method for determining a consense version of a transaction log and devcice and method for monitoring of a distributed database system
CN111353789A (en) * 2020-03-06 2020-06-30 厦门区块链云科技有限公司 Anti-counterfeiting traceability system based on block chain

Also Published As

Publication number Publication date
CN112507371A (en) 2021-03-16

Similar Documents

Publication Publication Date Title
CN107231351B (en) Electronic certificate management method and related equipment
CN108776936A (en) Settlement of insurance claim method, apparatus, computer equipment and storage medium
US20180336554A1 (en) Secure electronic transaction authentication
CN108206831B (en) Electronic seal realization method, server, client and readable storage medium
CN112507371B (en) Civil aviation safety inspection data processing system based on block chain
CN110177088B (en) Temporary identity authentication method, device and system
CN109560934B (en) Data tamper-proof method and device, computer equipment and storage medium
CN112332975A (en) Internet of things equipment secure communication method and system
CN112016075B (en) Travel information verification method based on block chain, electronic device and medium
CN110932859A (en) User information processing method, device and equipment and readable storage medium
CN114172663B (en) Business right determining method and device based on block chain, storage medium and electronic equipment
CN115277010A (en) Identity authentication method, system, computer device and storage medium
CN107370733A (en) A kind of intelligent lock management method based on Rijndael and ECC Hybrid Encryptions
CN112217636B (en) Data processing method and device based on block chain, computer equipment and medium
CN112351043A (en) Vehicle navigation factory setting password management method and system
CN109150813A (en) A kind of verification method and device of equipment
CN115331336B (en) NFC digital key mobile equipment adaptation method and device based on card simulation scheme
CN115240298B (en) Vehicle digital key acquisition method, device, computer equipment and storage medium
CN116204903A (en) Financial data security management method and device, electronic equipment and storage medium
CN115329359A (en) Secret query method and system
WO2019019675A1 (en) Simulated website login method and apparatus, server end and readable storage medium
CN114022161A (en) Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium
CN104504379A (en) Fingerprint authorization and verification method and system
CN113139166B (en) Evaluation expert signature method and device based on cloud certificate
CN110457170A (en) For testing the method, apparatus, system and medium of U-shield

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant