CN112532584A - Construction site information security encryption working method according to block chain network - Google Patents

Construction site information security encryption working method according to block chain network Download PDF

Info

Publication number
CN112532584A
CN112532584A CN202011189574.XA CN202011189574A CN112532584A CN 112532584 A CN112532584 A CN 112532584A CN 202011189574 A CN202011189574 A CN 202011189574A CN 112532584 A CN112532584 A CN 112532584A
Authority
CN
China
Prior art keywords
information
user
key
data
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011189574.XA
Other languages
Chinese (zh)
Other versions
CN112532584B (en
Inventor
熊榆
洪敏�
万里
白金龙
胡宇
唐良艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Hui Hui Information Technology Co ltd
Original Assignee
Chongqing Hui Hui Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Hui Hui Information Technology Co ltd filed Critical Chongqing Hui Hui Information Technology Co ltd
Priority to CN202011189574.XA priority Critical patent/CN112532584B/en
Publication of CN112532584A publication Critical patent/CN112532584A/en
Application granted granted Critical
Publication of CN112532584B publication Critical patent/CN112532584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Abstract

The invention discloses a construction site information security encryption working method according to a block chain network, which comprises the following steps: s1, synchronizing construction data of the construction site through a block chain network, setting user ID information of the construction data, and mapping the user ID information and address information corresponding to a block chain to form corresponding mapping information; s2, setting a user terminal security key presetting mechanism according to the formed mapping information, and returning to the block chain network for synchronization according to the user terminal security key presetting mechanism; s3, after the block chain network is synchronized, generating a user random variable, corresponding the user random variable to a user authentication key, and performing authentication and identification through the authentication key.

Description

Construction site information security encryption working method according to block chain network
Technical Field
The invention relates to the field of data security, in particular to a construction site information security encryption working method according to a block chain network.
Background
In the building site construction process, it is necessary to generate early-stage site planning data, middle-stage construction implementation data, and later-stage operation maintenance data, and after these mass data are collected, for a user, the core value of the generated data is to provide reference data for further site construction, but once these data are leaked, the data cause an immeasurable loss, so for the user, the encryption of the core data is crucial.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly provides a method for carrying out construction site information security encryption according to a block chain network.
In order to achieve the above object, the present invention provides a method for performing a building site information security encryption operation according to a blockchain network, comprising the steps of:
s1, synchronizing construction data of the construction site through a block chain network, setting user ID information of the construction data, and mapping the user ID information and address information corresponding to a block chain to form corresponding mapping information;
s2, setting a user terminal security key presetting mechanism according to the formed mapping information, and returning to the block chain network for synchronization according to the user terminal security key presetting mechanism;
s3, after the block chain network is synchronized, generating the user end characteristic value, corresponding the user end characteristic value to the user ID information authentication key, and carrying out authentication identification through the authentication key.
Preferably, the S1 includes:
s1-1, building site construction data is obtained from a blockchain network, user ID information is located on the building site construction data, a blockchain network address data interface is obtained after the user ID information is located, a mapping relation between the user ID information and a blockchain network address is formed, a user ID information encryption preparation mechanism is formed for storage, when the user ID information and the blockchain network address mapping operation is started, the user ID information is written into any attribute of expected key encryption operation, an encryption coding function is also executed, user ID information data compression and data caching are carried out, an expanded key instruction is executed to safely convert the user ID information writing preparation data, when the user ID information is written into a preparation data mapping expanded key instruction, extraction writing preparation key data are generated, and the writing preparation key data are sent to a storage module, acquiring a block chain network address in a storage module for mapping and coding, confirming to execute an encryption and coding function by assembling user ID information, distributing the block chain network address, encrypting, packaging and writing in preparation key data, and forming one or more encrypted mapping key data by the storage module; writing the encrypted mapping key data into a storage module, and reading the encrypted mapping key data from the storage module; an independent key package is generated for the write preparation key data by using each user ID information and the blockchain network address mapping information.
Preferably, the S1 further includes:
s1-2, when a plurality of mapping information is generated according to the storage module, transmitting write preparation key data for the mapping information of the address information corresponding to the user ID information and the blockchain to store it in one or more registers of the storage module, by storing the write preparation key data in a location designated by the storage module, the write preparation key data of the storage module performing a symmetric encryption operation by using a key package in which any entity without a private part provides a data key at the storage module, if a mapping information error of the user ID information and the address information corresponding to the blockchain occurs, reviewing the storage module using the written encoded data, retrieving original information corresponding to the encoded data, loading the key generation information in which the error occurs, discarding the encoded data and the encrypted data extracted in error, accessing the user ID information and the blockchain network address mapping relationship by a mapping command, and when the data key identification key encrypted by the mapping information generates the structure information, the preset generation identification structure information from the storage module is used, and the mapping relation index or index in the storage module needs to process the writing preparation key data to generate the independent key encapsulation process, and the matching is taken out from the storage module during unpacking.
Preferably, the S1 further includes:
s1-3, connecting block chain network through storage module, generating independent key package by writing prepared key data, forming corresponding mapping information, then providing the exchange process for reading mapping information from storage module, starting the key package, extracting correct key package, fetching it to storage module for decryption, retaining the key package to obtain address information of block chain network again, then transmitting the key package to storage module, determining its validity, converting the original package command of writing prepared key data to generate independent key package, then generating session encrypted data key, compiling and decrypting data key exchange protocol to generate decrypted data, discarding redundant decrypted data, performing address verification process of block chain network for user ID information positioning command of construction data of construction site, the user ID information received by the storage module comprises construction site construction data, project budget data and construction period data.
Preferably, the S2 includes:
s2-1, a signature public key and a product digital signature private key after mapping the user ID information and the address information corresponding to the block chain; selecting a construction site construction data authentication standard field, and acquiring aggregated construction site construction data authentication element data; embedding the user ID information digital signature public key and the user ID information digital signature private key into mapping information; calling a key generation encryption interface to obtain a user ID information code; decrypting the encrypted data packet according to the mapping information to obtain coincidence information in a mapping information authentication channel, and performing optimal encryption authentication combination according to the user ID information to generate current optimal encryption authentication aggregation element information; when an encryption interface is generated by initially starting a key; resetting the key generation encryption interface to acquire a user ID information digital signature and block chain network address information; and sending a key generation encryption interface through a key encryption channel to acquire a user ID information code.
Preferably, the S2 further includes:
s2-2, acquiring construction site construction data of user ID information authentication information, processing encrypted information meeting the format conversion requirement of the construction data, acquiring a user ID information authentication channel combination and performing a bidirectional authentication process, and forming user ID information authentication information basic data according to a safety key preset mechanism; the method comprises the steps that a construction site information security encryption authorization code is obtained, user ID information authentication information is packaged, and a basic encryption data packet is formed; verifying whether the data format of the basic encrypted data packet meets the construction site information security encryption requirement, combining the user ID information authentication information meeting the construction site information security encryption requirement with the current block chain network data access environment and the identity data, encrypting and packaging to generate a reference data packet; uploading the reference data packet by adopting a safety key presetting mechanism; verifying whether the user ID information authentication codes in the reference data packet are matched or not; if the data is matched with the data, the building site information is safely encrypted and is authenticated, and the reference data packet is decrypted according to the user ID information authentication code to obtain a user ID information authentication channel combination and a basic encrypted data packet; performing user ID information authentication processing according to the authentication channel combination matched with the basic encrypted data packet to obtain a feedback result of the authentication channel; if not, carrying out a non-matching working mechanism; continuously authenticating the reference data packet according to the user ID information authentication code, and performing decompiling on the user ID information authentication channel combination and the basic encrypted data packet; and recalling the authentication channel combination of the basic encrypted data packet to carry out user ID information authentication processing.
Preferably, the S2 further includes:
s2-3, repackaging the reference data packet according to the data requirement of the user ID information authentication channel combination of the optimal user side, carrying out synchronous operation through a block chain network, and aggregating the user ID information digital signature information and the user ID information authentication code to form an authentication text to be encrypted; authenticating whether the authentication text to be encrypted meets the encryption condition; if the encryption condition is met, the matching authentication of the user ID information authentication code to the reference data packet is completed, and the ending step is carried out; if the encryption conditions are not met, acquiring a basic encryption data packet, processing the data format conforming to the basic encryption data packet, acquiring a user ID information authentication channel and sending a user ID information authentication instruction, then aggregating feedback results of all authentication channels in the user ID information authentication channel to form an aggregation authentication result, and returning the aggregation authentication result to the block chain network; forming a construction site information security encryption result snapshot by aggregating the user ID information authentication channels and the user ID information authentication results, and uploading a construction site information security encryption summary message formed by the result snapshot; authenticating the user ID information, and verifying the construction site construction data combination encryption strategy through a standard encryption field; screening construction site construction data which are in accordance with the authentication signature authorization of the user ID information to form valid authentication standard field combinations; and integrating the valid authentication standard field combination, the user digital signature and the product digital signature to form the aggregated authentication element product.
Preferably, the S3 includes:
s3-1, after the user terminal safety key presetting mechanism returns to the block chain network for synchronization, the user ID information is preprocessed to generate a user terminal characteristic value, and a user ID information public key K is setpubCalculating the characteristic value of the user side to obtain detail node information OID=P1(QID,Kpub) (ii) a In which the pseudo-random function QIDAt public key encryption function P1The random verification selection is carried out to extract the detail point information which becomes the user ID informationUnder the conditions of the reaction mixture,
using group qiWherein i is 1, 2, 3; constructing a bilinear map, from the group qiTwo reversible reflection transformations M and N are randomly selected from the public key K for the user ID informationpubPerforming fuzzy mapping, wherein
Figure BDA0002752359400000051
Figure BDA0002752359400000052
Representing a map-and-synthesize operation.
Preferably, the S3 further includes:
s3-2, synthesizing the calculated public key KpubSelecting a random private key in the key generation process to form a key parameter Cparam={q1,q2,q3,OID,KpubAnd (5) enabling key texture features in the key detail point set of the private key to form encryption element superposition, and sending verification e (F, K)pub) F is an authentication identity information random variable of the user ID information, verification information bound with a random private key is generated, and a user ID information identity list decryption operation is formed
Figure BDA0002752359400000053
Wherein
Figure BDA0002752359400000054
And performing decryption operation after modulo calculation on the user ID information identity list vector L and the identity encryption information R by taking key as a private key.
Preferably, the S3 includes:
s3-3, after decryption operation, certificate authentication is carried out on the user ID information authentication key to obtain a decrypted ciphertext authentication component
Figure BDA0002752359400000055
Wherein j is the accumulated count, n is an integer greater than or equal to zero, bjFor building site data user ID information parameter, x is decryption coefficient, and the one-way cipher text function D and the signature information W in the user ID information are processedjAfter the XOR judgment, the authentication key adjustment factor eta is used for adjusting, the decryption tag beta is set for carrying out user ID information correspondence, and then the decryption authentication information of the authentication key is issued to the block chain network.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
the encryption authentication of the user ID information can be carried out on the construction data of the construction site through the block chain network, so that the data security is ensured, and the data is prevented from being stolen and tampered outside.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic diagram of the working method of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
As shown in fig. 1, the invention discloses a method for carrying out construction site information security encryption work according to a blockchain network, which comprises the following steps:
s1, synchronizing construction data of the construction site through a block chain network, setting user ID information of the construction data, and mapping the user ID information and address information corresponding to a block chain to form corresponding mapping information;
s2, setting a user terminal security key presetting mechanism according to the formed mapping information, and returning to the block chain network for synchronization according to the user terminal security key presetting mechanism;
s3, after the block chain network is synchronized, generating the user end characteristic value, corresponding the user end characteristic value to the user ID information authentication key, and carrying out authentication identification through the authentication key.
The S1 includes:
s1-1, building site construction data is obtained from a blockchain network, user ID information is located on the building site construction data, a blockchain network address data interface is obtained after the user ID information is located, a mapping relation between the user ID information and a blockchain network address is formed, a user ID information encryption preparation mechanism is formed for storage, when the user ID information and the blockchain network address mapping operation is started, the user ID information is written into any attribute of expected key encryption operation, an encryption coding function is also executed, user ID information data compression and data caching are carried out, an expanded key instruction is executed to safely convert the user ID information writing preparation data, when the user ID information is written into a preparation data mapping expanded key instruction, extraction writing preparation key data are generated, and the writing preparation key data are sent to a storage module, acquiring a block chain network address in a storage module for mapping and coding, confirming to execute an encryption and coding function by assembling user ID information, distributing the block chain network address, encrypting, packaging and writing in preparation key data, and forming one or more encrypted mapping key data by the storage module; writing the encrypted mapping key data into a storage module, and reading the encrypted mapping key data from the storage module; generating an independent key package for writing the prepared key data by using each user ID information and the blockchain network address mapping information, for example: the block chain network addresses form a1, a2 and a3 virtual addresses, construction data of a construction site are obtained through user ID information, the construction data are packaged, a mapping relation between the user ID information and the block chain network addresses is formed, safety and reliability can be improved through the non-tampering property of the block chain, a redundant byte instruction is deleted in the process of calling the user ID information, the storage module reads or processes one or more mapping information in mapping key data, and a plurality of virtual addresses formed by the network addresses provide a plurality of request information for mapping the user ID information;
s1-2, when a plurality of mapping information is generated according to the storage module, transmitting write preparation key data for the mapping information of the address information corresponding to the user ID information and the blockchain to store it in one or more registers of the storage module, by storing the write preparation key data in a location designated by the storage module, the write preparation key data of the storage module performing a symmetric encryption operation by using a key package in which any entity without a private part provides a data key at the storage module, if a mapping information error of the user ID information and the address information corresponding to the blockchain occurs, reviewing the storage module using the written encoded data, retrieving original information corresponding to the encoded data, loading the key generation information in which the error occurs, discarding the encoded data and the encrypted data extracted in error, accessing the user ID information and the blockchain network address mapping relationship by a mapping command, the method comprises the steps of carrying out sealing processing on an error data key so as to reduce the probability of error mapping, forming independent key package generated by writing preparation key data, using preset generation identification structure information from a storage module when the data key identification key for mapping information encryption generates structure information, mapping the indexes or indexes in the storage module, carrying out processing on the writing preparation key data to generate an independent key package process, and taking out matching from the storage module when unpacking;
s1-3, connecting block chain network through storage module, generating independent key package by writing prepared key data, forming corresponding mapping information, then providing the exchange process for reading mapping information from storage module, starting the key package, extracting correct key package, fetching it to storage module for decryption, retaining the key package to obtain address information of block chain network again, then transmitting the key package to storage module, determining its validity, converting the original package command of writing prepared key data to generate independent key package, then generating session encrypted data key, compiling and decrypting data key exchange protocol to generate decrypted data, discarding redundant decrypted data, performing address verification process of block chain network for user ID information positioning command of construction data of construction site, the user ID information received by the storage module comprises construction site construction data, project budget data and construction period data;
the S2 includes:
s2-1, a signature public key and a product digital signature private key after mapping the user ID information and the address information corresponding to the block chain; selecting a construction site construction data authentication standard field, and acquiring aggregated construction site construction data authentication element data; embedding the user ID information digital signature public key and the user ID information digital signature private key into mapping information; calling a key generation encryption interface to obtain a user ID information code; decrypting the encrypted data packet according to the mapping information to obtain coincidence information in a mapping information authentication channel, and performing optimal encryption authentication combination according to the user ID information to generate current optimal encryption authentication aggregation element information; when an encryption interface is generated by initially starting a key; resetting the key generation encryption interface to acquire a user ID information digital signature and block chain network address information; sending a key generation encryption interface through a key encryption channel to obtain a user ID information code;
s2-2, acquiring construction site construction data of user ID information authentication information, processing encrypted information meeting the format conversion requirement of the construction data, acquiring a user ID information authentication channel combination and performing a bidirectional authentication process, and forming user ID information authentication information basic data according to a safety key preset mechanism; the method comprises the steps that a construction site information security encryption authorization code is obtained, user ID information authentication information is packaged, and a basic encryption data packet is formed; verifying whether the data format of the basic encrypted data packet meets the construction site information security encryption requirement, combining the user ID information authentication information meeting the construction site information security encryption requirement with the current block chain network data access environment and the identity data, encrypting and packaging to generate a reference data packet; uploading the reference data packet by adopting a safety key presetting mechanism; verifying whether the user ID information authentication codes in the reference data packet are matched or not; if the data is matched with the data, the building site information is safely encrypted and is authenticated, and the reference data packet is decrypted according to the user ID information authentication code to obtain a user ID information authentication channel combination and a basic encrypted data packet; performing user ID information authentication processing according to the authentication channel combination matched with the basic encrypted data packet to obtain a feedback result of the authentication channel; if not, carrying out a non-matching working mechanism; continuously authenticating the reference data packet according to the user ID information authentication code, and performing decompiling on the user ID information authentication channel combination and the basic encrypted data packet; the authentication channel combination of the basic encrypted data packet is called again to carry out user ID information authentication processing;
s2-3, repackaging the reference data packet according to the data requirement of the user ID information authentication channel combination of the optimal user side, carrying out synchronous operation through a block chain network, and aggregating the user ID information digital signature information and the user ID information authentication code to form an authentication text to be encrypted; authenticating whether the authentication text to be encrypted meets the encryption condition; if the encryption condition is met, the matching authentication of the user ID information authentication code to the reference data packet is completed, and the ending step is carried out; if the encryption conditions are not met, acquiring a basic encryption data packet, processing the data format conforming to the basic encryption data packet, acquiring a user ID information authentication channel and sending a user ID information authentication instruction, then aggregating feedback results of all authentication channels in the user ID information authentication channel to form an aggregation authentication result, and returning the aggregation authentication result to the block chain network; forming a construction site information security encryption result snapshot by aggregating the user ID information authentication channels and the user ID information authentication results, and uploading a construction site information security encryption summary message formed by the result snapshot; authenticating the user ID information, and verifying the construction site construction data combination encryption strategy through a standard encryption field; screening construction site construction data which are in accordance with the authentication signature authorization of the user ID information to form valid authentication standard field combinations; integrating the valid authentication standard field combination, the user digital signature and the product digital signature to form a polymerization authentication element product;
the S3 includes:
s3-1, after the user end safety key presetting mechanism returns to the block chain network for synchronization, the user ID information is preprocessed to generateSetting a user ID information public key K as a user side characteristic valuepubCalculating the characteristic value of the user side to obtain detail node information OID=P1(QID,Kpub) (ii) a In which the pseudo-random function QIDAt public key encryption function P1The random verification selection is performed to become the detail point information extraction condition of the user ID information,
using group qiWherein i is 1, 2, 3; constructing a bilinear map, from the group qiTwo reversible reflection transformations M and N are randomly selected from the public key K for the user ID informationpubPerforming fuzzy mapping, wherein
Figure BDA0002752359400000101
Figure BDA0002752359400000102
Representing a map-synthesis operation;
s3-2, synthesizing the calculated public key KpubSelecting a random private key in the key generation process to form a key parameter Cparam={q1,q2,q3,OID,KpubAnd (5) enabling key texture features in the key detail point set of the private key to form encryption element superposition, and sending verification e (F, K)pub) F is an authentication identity information random variable of the user ID information, verification information bound with a random private key is generated, and a user ID information identity list decryption operation is formed
Figure BDA0002752359400000103
Wherein
Figure BDA0002752359400000104
The key is used as a private key to carry out decryption operation after modulo operation on the user ID information identity list vector L and the identity encryption information R,
s3-3, after decryption operation, certificate authentication is carried out on the user ID information authentication key to obtain a decrypted ciphertext authentication component
Figure BDA0002752359400000105
Wherein j isFor cumulative counting, n is an integer greater than or equal to zero, bjFor building site data user ID information parameter, x is decryption coefficient, and the one-way cipher text function D and the signature information W in the user ID information are processedjAfter the XOR judgment, the authentication key adjustment factor eta is used for adjusting, the decryption tag beta is set for carrying out user ID information correspondence, and then the decryption authentication information of the authentication key is issued to the block chain network.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (10)

1. A construction site information security encryption working method according to a block chain network is characterized by comprising the following steps:
s1, synchronizing construction data of the construction site through a block chain network, setting user ID information of the construction data, and mapping the user ID information and address information corresponding to a block chain to form corresponding mapping information;
s2, setting a user terminal security key presetting mechanism according to the formed mapping information, and returning to the block chain network for synchronization according to the user terminal security key presetting mechanism;
s3, after the block chain network is synchronized, generating the user end characteristic value, corresponding the user end characteristic value to the user ID information authentication key, and carrying out authentication identification through the authentication key.
2. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S1 includes:
s1-1, building site construction data is obtained from a blockchain network, user ID information is located on the building site construction data, a blockchain network address data interface is obtained after the user ID information is located, a mapping relation between the user ID information and a blockchain network address is formed, a user ID information encryption preparation mechanism is formed for storage, when the user ID information and the blockchain network address mapping operation is started, the user ID information is written into any attribute of expected key encryption operation, an encryption coding function is also executed, user ID information data compression and data caching are carried out, an expanded key instruction is executed to safely convert the user ID information writing preparation data, when the user ID information is written into a preparation data mapping expanded key instruction, extraction writing preparation key data are generated, and the writing preparation key data are sent to a storage module, acquiring a block chain network address in a storage module for mapping and coding, confirming to execute an encryption and coding function by assembling user ID information, distributing the block chain network address, encrypting, packaging and writing in preparation key data, and forming one or more encrypted mapping key data by the storage module; writing the encrypted mapping key data into a storage module, and reading the encrypted mapping key data from the storage module; an independent key package is generated for the write preparation key data by using each user ID information and the blockchain network address mapping information.
3. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S1 further comprises:
s1-2, when a plurality of mapping information is generated according to the storage module, transmitting write preparation key data for the mapping information of the address information corresponding to the user ID information and the blockchain to store it in one or more registers of the storage module, by storing the write preparation key data in a location designated by the storage module, the write preparation key data of the storage module performing a symmetric encryption operation by using a key package in which any entity without a private part provides a data key at the storage module, if a mapping information error of the user ID information and the address information corresponding to the blockchain occurs, reviewing the storage module using the written encoded data, retrieving original information corresponding to the encoded data, loading the key generation information in which the error occurs, discarding the encoded data and the encrypted data extracted in error, accessing the user ID information and the blockchain network address mapping relationship by a mapping command, and when the data key identification key encrypted by the mapping information generates the structure information, the preset generation identification structure information from the storage module is used, and the mapping relation index or index in the storage module needs to process the writing preparation key data to generate the independent key encapsulation process, and the matching is taken out from the storage module during unpacking.
4. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S1 further comprises:
s1-3, connecting block chain network through storage module, generating independent key package by writing prepared key data, forming corresponding mapping information, then providing the exchange process for reading mapping information from storage module, starting the key package, extracting correct key package, fetching it to storage module for decryption, retaining the key package to obtain address information of block chain network again, then transmitting the key package to storage module, determining its validity, converting the original package command of writing prepared key data to generate independent key package, then generating session encrypted data key, compiling and decrypting data key exchange protocol to generate decrypted data, discarding redundant decrypted data, performing address verification process of block chain network for user ID information positioning command of construction data of construction site, the user ID information received by the storage module comprises construction site construction data, project budget data and construction period data.
5. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S2 includes:
s2-1, a signature public key and a product digital signature private key after mapping the user ID information and the address information corresponding to the block chain; selecting a construction site construction data authentication standard field, and acquiring aggregated construction site construction data authentication element data; embedding the user ID information digital signature public key and the user ID information digital signature private key into mapping information; calling a key generation encryption interface to obtain a user ID information code; decrypting the encrypted data packet according to the mapping information to obtain coincidence information in a mapping information authentication channel, and performing optimal encryption authentication combination according to the user ID information to generate current optimal encryption authentication aggregation element information; when an encryption interface is generated by initially starting a key; resetting the key generation encryption interface to acquire a user ID information digital signature and block chain network address information; and sending a key generation encryption interface through a key encryption channel to acquire a user ID information code.
6. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S2 further comprises:
s2-2, acquiring construction site construction data of user ID information authentication information, processing encrypted information meeting the format conversion requirement of the construction data, acquiring a user ID information authentication channel combination and performing a bidirectional authentication process, and forming user ID information authentication information basic data according to a safety key preset mechanism; the method comprises the steps that a construction site information security encryption authorization code is obtained, user ID information authentication information is packaged, and a basic encryption data packet is formed; verifying whether the data format of the basic encrypted data packet meets the construction site information security encryption requirement, combining the user ID information authentication information meeting the construction site information security encryption requirement with the current block chain network data access environment and the identity data, encrypting and packaging to generate a reference data packet; uploading the reference data packet by adopting a safety key presetting mechanism; verifying whether the user ID information authentication codes in the reference data packet are matched or not; if the data is matched with the data, the building site information is safely encrypted and is authenticated, and the reference data packet is decrypted according to the user ID information authentication code to obtain a user ID information authentication channel combination and a basic encrypted data packet; performing user ID information authentication processing according to the authentication channel combination matched with the basic encrypted data packet to obtain a feedback result of the authentication channel; if not, carrying out a non-matching working mechanism; continuously authenticating the reference data packet according to the user ID information authentication code, and performing decompiling on the user ID information authentication channel combination and the basic encrypted data packet; and recalling the authentication channel combination of the basic encrypted data packet to carry out user ID information authentication processing.
7. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S2 further comprises:
s2-3, repackaging the reference data packet according to the data requirement of the user ID information authentication channel combination of the optimal user side, carrying out synchronous operation through a block chain network, and aggregating the user ID information digital signature information and the user ID information authentication code to form an authentication text to be encrypted; authenticating whether the authentication text to be encrypted meets the encryption condition; if the encryption condition is met, the matching authentication of the user ID information authentication code to the reference data packet is completed, and the ending step is carried out; if the encryption conditions are not met, acquiring a basic encryption data packet, processing the data format conforming to the basic encryption data packet, acquiring a user ID information authentication channel and sending a user ID information authentication instruction, then aggregating feedback results of all authentication channels in the user ID information authentication channel to form an aggregation authentication result, and returning the aggregation authentication result to the block chain network; forming a construction site information security encryption result snapshot by aggregating the user ID information authentication channels and the user ID information authentication results, and uploading a construction site information security encryption summary message formed by the result snapshot; authenticating the user ID information, and verifying the construction site construction data combination encryption strategy through a standard encryption field; screening construction site construction data which are in accordance with the authentication signature authorization of the user ID information to form valid authentication standard field combinations; and integrating the valid authentication standard field combination, the user digital signature and the product digital signature to form the aggregated authentication element product.
8. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S3 includes:
s3-1, after the user terminal safety key presetting mechanism returns to the block chain network for synchronization, the user ID information is preprocessed to generate a user terminal characteristic value, and a user ID information public key K is setpubCalculating the characteristic value of the user side to obtain detail node information OID=P1(QID,Kpub) (ii) a In which the pseudo-random function QIDAt public key encryption function P1The random verification selection is performed to become the detail point information extraction condition of the user ID information,
using group qiWherein i is 1, 2, 3; constructing a bilinear map, from the group qiTwo reversible reflection transformations M and N are randomly selected from the public key K for the user ID informationpubPerforming fuzzy mapping, wherein
Figure FDA0002752359390000051
o denotes a map composition operation.
9. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S3 further comprises:
s3-2, synthesizing the calculated public key KpubSelecting a random private key in the key generation process to form a key parameter Cparam={q1,q2,q3,OID,KpubAnd (5) enabling key texture features in the key detail point set of the private key to form encryption element superposition, and sending verification e (F, K)pub) F is an authentication identity information random variable of the user ID information, verification information bound with a random private key is generated, and a user ID information identity list decryption operation is formed
Figure FDA0002752359390000052
Wherein
Figure FDA0002752359390000053
Identity list vector of user ID information by taking key as private keyAnd performing decryption operation after modulo of the L and the identity encryption information R.
10. The method for secure encryption of construction site information according to blockchain network as claimed in claim 1, wherein said S3 includes:
s3-3, after decryption operation, certificate authentication is carried out on the user ID information authentication key to obtain a decrypted ciphertext authentication component
Figure FDA0002752359390000054
J is accumulated count, n is an integer larger than or equal to zero, bj is a construction site data user ID information parameter, x is a decryption coefficient, after XOR judgment is carried out on the one-way ciphertext function D and the signature information Wj in the user ID information, the one-way ciphertext function D and the signature information Wj are adjusted by an authentication key adjusting factor eta, a decryption tag beta is set to correspond to the user ID information, and then decryption authentication information of the authentication key is issued to a block chain network.
CN202011189574.XA 2020-10-30 2020-10-30 Construction site information security encryption working method according to block chain network Active CN112532584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011189574.XA CN112532584B (en) 2020-10-30 2020-10-30 Construction site information security encryption working method according to block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011189574.XA CN112532584B (en) 2020-10-30 2020-10-30 Construction site information security encryption working method according to block chain network

Publications (2)

Publication Number Publication Date
CN112532584A true CN112532584A (en) 2021-03-19
CN112532584B CN112532584B (en) 2022-08-19

Family

ID=74979245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011189574.XA Active CN112532584B (en) 2020-10-30 2020-10-30 Construction site information security encryption working method according to block chain network

Country Status (1)

Country Link
CN (1) CN112532584B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989428A (en) * 2021-05-08 2021-06-18 浙江数秦科技有限公司 Rapid encryption storage method for alliance link data
CN113794743A (en) * 2021-11-18 2021-12-14 湖南和信安华区块链科技有限公司 Industrial data supervisory systems based on block chain

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN108712251A (en) * 2018-05-28 2018-10-26 江苏众享金联科技有限公司 It is a kind of difference trust domain under to block chain be written user privacy information method
CN109067801A (en) * 2018-09-29 2018-12-21 平安科技(深圳)有限公司 A kind of identity identifying method, identification authentication system and computer-readable medium
JP6540873B1 (en) * 2018-12-12 2019-07-10 ジャパンパイル株式会社 Construction management server, construction data management system and program for construction management server
CN110033263A (en) * 2019-01-14 2019-07-19 阿里巴巴集团控股有限公司 The acquisition of user characteristics value, application method and device based on block chain
CN110457928A (en) * 2019-08-16 2019-11-15 重庆华医康道科技有限公司 Doctor based on block chain looks forward to cooperation internet hospital data method for protecting
WO2020014399A1 (en) * 2018-07-10 2020-01-16 Listat Ltd. Decentralized cybersecure privacy network for cloud communication and global e-commerce
US10554649B1 (en) * 2017-05-22 2020-02-04 State Farm Mutual Automobile Insurance Company Systems and methods for blockchain validation of user identity and authority
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN110992053A (en) * 2019-12-31 2020-04-10 国科火炼(杭州)数字科技有限公司 Safe payment system and method based on finger vein recognition and block chain technology
US20200127843A1 (en) * 2018-10-18 2020-04-23 Cal Wilson Webster Process for managing escrow payments between multiple parties
CN111125787A (en) * 2019-12-27 2020-05-08 上海共链信息科技有限公司 Gas inspection data cochain system based on block chain and use method thereof
CN111125774A (en) * 2020-03-26 2020-05-08 杭州产链数字科技有限公司 Engineering safety supervision traceability system and method based on block chain intelligent contract
CN111767557A (en) * 2020-06-22 2020-10-13 重庆渝抗医药科技有限公司 Data encryption working method based on block chain

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10554649B1 (en) * 2017-05-22 2020-02-04 State Farm Mutual Automobile Insurance Company Systems and methods for blockchain validation of user identity and authority
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN108712251A (en) * 2018-05-28 2018-10-26 江苏众享金联科技有限公司 It is a kind of difference trust domain under to block chain be written user privacy information method
WO2020014399A1 (en) * 2018-07-10 2020-01-16 Listat Ltd. Decentralized cybersecure privacy network for cloud communication and global e-commerce
CN109067801A (en) * 2018-09-29 2018-12-21 平安科技(深圳)有限公司 A kind of identity identifying method, identification authentication system and computer-readable medium
US20200127843A1 (en) * 2018-10-18 2020-04-23 Cal Wilson Webster Process for managing escrow payments between multiple parties
JP6540873B1 (en) * 2018-12-12 2019-07-10 ジャパンパイル株式会社 Construction management server, construction data management system and program for construction management server
CN110033263A (en) * 2019-01-14 2019-07-19 阿里巴巴集团控股有限公司 The acquisition of user characteristics value, application method and device based on block chain
CN110457928A (en) * 2019-08-16 2019-11-15 重庆华医康道科技有限公司 Doctor based on block chain looks forward to cooperation internet hospital data method for protecting
CN110795755A (en) * 2019-12-26 2020-02-14 深圳市建筑科学研究院股份有限公司 Building project scene type evidence storing and non-tampering method and system based on block chain
CN111125787A (en) * 2019-12-27 2020-05-08 上海共链信息科技有限公司 Gas inspection data cochain system based on block chain and use method thereof
CN110992053A (en) * 2019-12-31 2020-04-10 国科火炼(杭州)数字科技有限公司 Safe payment system and method based on finger vein recognition and block chain technology
CN111125774A (en) * 2020-03-26 2020-05-08 杭州产链数字科技有限公司 Engineering safety supervision traceability system and method based on block chain intelligent contract
CN111767557A (en) * 2020-06-22 2020-10-13 重庆渝抗医药科技有限公司 Data encryption working method based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
V. HARGADEN等: ""The Role of Blockchain Technologies in Construction Engineering Project Management"", 《2019 IEEE INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY AND INNOVATION (ICE/ITMC)》 *
张仲华等: ""区块链技术在建筑工程领域中的应用研究"", 《施工技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112989428A (en) * 2021-05-08 2021-06-18 浙江数秦科技有限公司 Rapid encryption storage method for alliance link data
CN113794743A (en) * 2021-11-18 2021-12-14 湖南和信安华区块链科技有限公司 Industrial data supervisory systems based on block chain

Also Published As

Publication number Publication date
CN112532584B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN101969438B (en) Method for realizing equipment authentication, data integrity and secrecy transmission for Internet of Things
CN101355422B (en) Novel authentication mechanism for encrypting vector
CN102223309B (en) Safe communication system and implementation method based on message load segmentation, encryption and reorder
TW201812638A (en) Storage design method of blockchain encrypted radio frequency chip
CN111555872B (en) Communication data processing method, device, computer system and storage medium
EP3779792B1 (en) Two-dimensional code generation method, data processing method, apparatus, and server
CN1922816B (en) One way authentication
CN103427987A (en) Data encryption method, data verification method and electronic device
CN112532584B (en) Construction site information security encryption working method according to block chain network
CN101401141A (en) Information processing system, information processing method, and information processing program
CN111639348B (en) Management method and device of database keys
CN111625791B (en) Key management method and system based on software cryptographic module
CN102064944A (en) Safety card issuing method as well as card issuing equipment and system
CN112511304A (en) Power data privacy communication method based on hybrid encryption algorithm
WO2020155622A1 (en) Method, device and system for enhancing security of image data transmission, and storage medium
CN101552792B (en) A method and apparatus for transmitting information with dynamic secondary cipher key
CN105281910A (en) Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method
CN112866227A (en) File authorization protection method and system
CN112437042A (en) Intelligent construction site material data security certification working method through cloud platform
CN111490874B (en) Distribution network safety protection method, system, device and storage medium
US8914640B2 (en) System for exchanging data between at least one sender and one receiver
CN115033925B (en) Database security retrieval method
CN112565184B (en) Wisdom building site data safety operating system
CN115426627A (en) Industry thing networking data collection box based on 5G network
CN109120589B (en) Terminal information protection method and device based on encryption password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant