CN112765687B - Data source identification method based on block chain - Google Patents

Data source identification method based on block chain Download PDF

Info

Publication number
CN112765687B
CN112765687B CN202110038942.9A CN202110038942A CN112765687B CN 112765687 B CN112765687 B CN 112765687B CN 202110038942 A CN202110038942 A CN 202110038942A CN 112765687 B CN112765687 B CN 112765687B
Authority
CN
China
Prior art keywords
data source
identification
data
authentication
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110038942.9A
Other languages
Chinese (zh)
Other versions
CN112765687A (en
Inventor
洪薇
洪健
李京昆
刘文思
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Chenweixi Chain Information Technology Co ltd
Original Assignee
Hubei Chenweixi Chain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Chenweixi Chain Information Technology Co ltd filed Critical Hubei Chenweixi Chain Information Technology Co ltd
Priority to CN202110038942.9A priority Critical patent/CN112765687B/en
Publication of CN112765687A publication Critical patent/CN112765687A/en
Application granted granted Critical
Publication of CN112765687B publication Critical patent/CN112765687B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

A data source identification method based on a block chain comprises the following steps: s1: a data source provider deploys authentication service of a data source; s2: a service interface for compiling data source authentication content; s3: generating an authentication identification of the data source; s4: the data source identifies the content service interface and the identification uplink of the data source; s5: the data source user checks the related information of the data source identification through the block chain; s6: the data source user identifies the data source; the method has the technical key points that the data source provider stores the authentication information of the data source in the block chain and provides the authentication information to the data source in an authorized mode, so that the problems of integrity, correctness and safety of the data authentication information are solved; the identification content of the data source in the invention is added with hardware identification besides common software identification, thus realizing the combined identification of the software identification and hardware identification binding of the data source and effectively solving the problem of data source counterfeiting.

Description

Data source identification method based on block chain
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a data source identification method based on a block chain.
Background
The blockchain is a decentralized protocol, does not depend on an additional third-party management mechanism or hardware facilities, and cannot be forged or falsified after data is linked. The transaction confirmation on the blockchain is completed by all nodes on the blockchain together, the consistency of the transaction confirmation is ensured by a consensus algorithm, a public account book is maintained on the blockchain, and any node of the public account book on the storage block is visible, so that the transaction confirmation can not be forged and falsified;
the intelligent contract is a section of automatically executable program deployed on a block chain, the processing rule of a transaction is predefined in the program and is approved by a party related to the transaction, and when a certain condition is met, the contract rule of the transaction is automatically executed without manual operation;
the data source identification is to identify the data source generating data, including the identification of hardware equipment and the identification of data software service, so as to ensure the authenticity of the data source; the problems of data forgery, data errors, data leakage and the like caused by counterfeit data sources are prevented;
the defects of the prior art are as follows:
firstly, the existing data source identification content only comprises identification of a data source software identifier, and does not comprise identification of a running hardware device identifier, and the data source identification content is incomplete, so that the problem of data source counterfeiting easily occurs.
Secondly, the data source authentication content and the rules provided by the data source provider for each data user are generally issued in a manner of offline transmission or third party storage and management, and the integrity, the correctness and the safety of the transmitted content cannot be completely guaranteed; when the authentication content or rule of the data source is changed, the data source provider needs to notify each data user respectively, which is inconvenient for the data source provider to manage the authentication content and rule of the data source.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a data source identification method based on a block chain.
In order to achieve the purpose, the invention adopts the following technical scheme:
a data source identification method based on a block chain comprises the following steps:
s1: the data source provider deploys an authentication service for the data source,
the data source provider deploys the authentication service of the data source to a data service platform, the data service platform is a point-to-point network consisting of all participant nodes, and each participant node runs the data service platform on a local platform of the participant node;
s2: a service interface for authoring authentication content of a data source,
the data source provider writes a service interface for acquiring the data source authentication content on the data service platform, wherein the interface is provided for the data source user and is used for acquiring the authentication content of the data source;
s3: an authentication identification of the data source is generated,
the data source provider generates an identification of the data source by using an SHA256 algorithm according to the identification content of the data source, and the generation method of the identification of the data source comprises the following steps:
the method comprises the following steps: acquiring a CPU serial number of equipment, and generating a hash code by using an SHA256 algorithm;
step two: acquiring a mainboard serial number of the equipment, and generating a hash code by using an SHA256 algorithm;
step three: acquiring a BIOS manufacturer, a BIOS version number and a BIOS initial installation date of equipment mainboard installation, combining the information into a character string, and then generating SHA256 hash codes for the combined character string to be used as a mark of the mainboard BIOS;
step four: acquiring a network card MAC address of the equipment, and generating a hash code by using an SHA256 algorithm;
step five: acquiring a serial number of a memory bank of the equipment, and generating a hash code by using an SHA256 algorithm;
step six: acquiring the model number, serial number, size, volume label, capacity and interface type of the hard disk, combining the information into a character string, and then generating SHA256 hash codes for the combined character string;
step seven: acquiring key information of an operating system operated by equipment: combining the information into a character string by a system manufacturer, a system name, a system type, a system version number and system initial installation time, and then generating an SHA256 hash code for the combined character string to be used as an identifier of an operating system;
step eight: acquiring an IP address, a port and a software version number of the software service, combining the information into a character string, and then generating an SHA256 hash code for the combined character string as an identifier of the software service;
step nine: sequentially connecting the identifiers of the hash codes generated in the first step to the eighth step into a character string, and generating SHA256 hash codes for the combined character string;
step ten: encrypting the hash code generated in the ninth step by using a public key of a CA certificate of a data source provider, encoding the data string generated after encryption by using BASE64, and generating the hash code of the BASE64 encoding string by using an SHA256 algorithm to serve as an identification mark of the data source;
s4: the data source authenticates the content service interface and the ul of the authentication identity of the data source,
the data provider writes the information of the data source authentication content service interface generated in the step S2 and the data source authentication identification information generated in the step S3 into the block chain together through the intelligent contract;
s5: the data source user looks at the relevant information of the data source authentication through the blockchain,
after the data source identification information is linked, the data source user can check all data sources provided with the data source identification information through the block chain, select a required data source and acquire the identification information of the data source in a purchasing or authorization mode;
s6: the data source user authenticates the data source:
it includes obtaining the authentication content of the data source; and generating an identification of the data source and judging whether the data source is real or not.
Preferably, in the step S1,
the data service platform is a point-to-point network composed of all participant nodes, each participant node runs the data service platform on a local platform, and the point-to-point data service platform can be used as a channel for identifying a data source, requesting data and acquiring a result by a data source user.
Preferably, in the step S2,
the acquiring the authentication content of the data source specifically includes: physical hardware identification of a data source machine, key information of an operating system, information of software service and a CA certificate;
wherein, the physical hardware identification comprises: CPU serial number, mainboard serial number, BIOS manufacturer, BIOS version number, BIOS initial installation date, network card MAC address, memory bar serial number and hard disk ID of the chip;
the operating system key information includes: the system comprises a system manufacturer, a system name, a system type, a system version number and system initial installation time;
the information of the software service includes: IP address, port and version number of the service;
a CA certificate is a software certificate issued by an authoritative CA authority and bound to the machine.
Preferably, in the step S3,
specifically, in the first step, if multiple CPUs exist, corresponding SHA256 hash codes are generated for the serial number of each CPU, and then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, so as to serve as the identifier of the chip CPU.
Preferably, in the step S3,
specifically, in the fourth step, if a plurality of network cards exist, corresponding SHA256 hash codes are respectively generated for the serial number of each network card, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the network card.
Preferably, in the step S3,
specifically, in the fifth step, if a plurality of memory banks exist, corresponding SHA256 hash codes are respectively generated for the serial number of each memory bank, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the memory.
Preferably, in the step S3,
specifically, in the sixth step, if a plurality of hard disks exist, for the model number, serial number, size, volume label, capacity, and interface type of each hard disk, respectively, the combined character strings of these pieces of information generate SHA256 hash codes, then these hash codes are sequentially connected into one character string, and an SHA256 hash string is generated for the combined character string, and this is used as the identifier of the hard disk.
Preferably, in the step S6,
acquiring the authentication content of the data source:
according to the obtained data source authentication content service interface, a data source user writes a request model for acquiring data source authentication content and sends the request model to a data source provider through a data service platform; the data source provider returns the operated result to the data source user; the data source user analyzes the identification content and the specific numerical value of the data source from the return result;
generating an authentication identification of the data source:
the data source using party generates the data source authentication mark according to the obtained data source authentication content and the generation method of the data source authentication mark in the step S3;
judging whether the data source is real:
comparing the generated data source identification with the data source identification obtained from the block chain, and if the identification is the same, the identification of the data source is passed;
otherwise, the authentication of the data source does not pass.
Compared with the prior art, the invention provides a data source identification method based on a block chain, which has the following beneficial effects:
in the invention, the data source provider stores the authentication information of the data source in the block chain and provides the authentication information to the data source user in an authorization mode, thereby solving the problems of integrity, correctness and safety of the data authentication information;
when the identification information of the data source is changed, the data source only needs to modify the identification information of the data source on the block chain, so that the management problem of maintaining and releasing the identification information of the data source is solved;
the identification content of the data source is added with hardware identification besides common software identification, so that the combined identification of the software identification and hardware identification binding of the data source is realized, the problem of data source counterfeiting is effectively solved, and the probability of data counterfeiting, data leakage, data errors and other problems is reduced.
Drawings
FIG. 1 is a flowchart of the overall steps of the present invention.
Detailed Description
The following describes a specific embodiment of a data source identification method based on a blockchain according to the present invention with reference to fig. 1. The data source identification method based on the block chain of the present invention is not limited to the description of the following embodiments.
In this embodiment, a specific structure of a data source identification method based on a block chain is provided, and as shown in fig. 1, a data source identification method based on a block chain includes the following steps:
s1: the data source provider deploys an authentication service for the data source,
the data source provider deploys the authentication service of the data source to a data service platform, the data service platform is a point-to-point network consisting of all participant nodes, and each participant node runs the data service platform on a local platform of the participant node;
s2: a service interface for authoring authentication content of a data source,
the data source provider writes a service interface for acquiring the data source authentication content on the data service platform, wherein the interface is provided for the data source user and is used for acquiring the authentication content of the data source;
s3: an authentication identification of the data source is generated,
the data source provider generates an identification of the data source by using an SHA256 algorithm according to the identification content of the data source, and the generation method of the identification of the data source comprises the following steps:
the method comprises the following steps: acquiring a CPU serial number of equipment, and generating a hash code by using an SHA256 algorithm;
step two: acquiring a mainboard serial number of the equipment, and generating a hash code by using an SHA256 algorithm;
step three: acquiring a BIOS manufacturer, a BIOS version number and a BIOS initial installation date of equipment mainboard installation, combining the information into a character string, and then generating SHA256 hash codes for the combined character string to be used as a mark of the mainboard BIOS;
step four: acquiring a network card MAC address of the equipment, and generating a hash code by using an SHA256 algorithm;
step five: acquiring a serial number of a memory bank of the equipment, and generating a hash code by using an SHA256 algorithm;
step six: acquiring the model number, serial number, size, volume label, capacity and interface type of the hard disk, combining the information into a character string, and then generating SHA256 hash codes for the combined character string;
step seven: acquiring key information of an operating system operated by equipment: combining the information into a character string by a system manufacturer, a system name, a system type, a system version number and system initial installation time, and then generating an SHA256 hash code for the combined character string to be used as an identifier of an operating system;
step eight: acquiring an IP address, a port and a software version number of the software service, combining the information into a character string, and then generating an SHA256 hash code for the combined character string as an identifier of the software service;
step nine: sequentially connecting the identifiers of the hash codes generated in the first step to the eighth step into a character string, and generating SHA256 hash codes for the combined character string;
step ten: encrypting the hash code generated in the ninth step by using a public key of a CA certificate of a data source provider, encoding the data string generated after encryption by using BASE64, and generating the hash code of the BASE64 encoding string by using an SHA256 algorithm to serve as an identification mark of the data source;
s4: the data source authenticates the content service interface and the ul of the authentication identity of the data source,
the data provider writes the information of the data source authentication content service interface generated in the step S2 and the data source authentication identification information generated in the step S3 into the block chain together through the intelligent contract;
s5: the data source user looks at the relevant information of the data source authentication through the blockchain,
after the data source identification information is linked, the data source user can check all data sources provided with the data source identification information through the block chain, select a required data source and acquire the identification information of the data source in a purchasing or authorization mode;
s6: the data source user authenticates the data source:
it includes obtaining the authentication content of the data source; generating an identification of the data source and judging whether the data source is real or not;
the technical problem to be solved by the present invention is to provide a data source identification method based on a block chain, which aims to expand the dimensionality of the identification content of a data source, enhance the identification capability of the data source, and provide a safer management and control method for the management of the identification content and rules of the data source, so as to overcome the defects of the prior art.
In the invention, the data source provider stores the authentication information of the data source in the block chain and provides the authentication information to the data source user in an authorization mode, thereby solving the problems of integrity, correctness and safety of the data authentication information;
when the identification information of the data source is changed, the data source only needs to modify the identification information of the data source on the block chain, so that the management problem of maintaining and releasing the identification information of the data source is solved;
the identification content of the data source is added with hardware identification besides common software identification, so that the combined identification of the software identification and the hardware identification of the data source is realized, the problem of data source counterfeiting is effectively solved, and the probability of data counterfeiting, data leakage, data errors and other problems is reduced.
In the step S1, in step S1,
the data service platform is a point-to-point network composed of all participant nodes, each participant node runs the data service platform on a local platform, and the point-to-point data service platform can be used as a channel for identifying a data source, requesting data and acquiring a result by a data source user.
In the step S2, in step S2,
the acquiring the authentication content of the data source specifically includes: physical hardware identification of a data source machine, key information of an operating system, information of software service and a CA certificate;
wherein, the physical hardware identification comprises: CPU serial number, mainboard serial number, BIOS manufacturer, BIOS version number, BIOS initial installation date, network card MAC address, memory bar serial number and hard disk ID of the chip;
the operating system key information includes: the system comprises a system manufacturer, a system name, a system type, a system version number and system initial installation time;
the information of the software service includes: IP address, port and version number of the service;
a CA certificate is a software certificate issued by an authoritative CA authority and bound to the machine.
In the step S3, in step S3,
specifically, in the first step, if a plurality of CPUs exist, corresponding SHA256 hash codes are respectively generated for the serial number of each CPU, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the chip CPU.
In the step S3, in step S3,
specifically, in the fourth step, if a plurality of network cards exist, corresponding SHA256 hash codes are respectively generated for the serial number of each network card, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the network card.
In the step S3, in step S3,
specifically, in the fifth step, if a plurality of memory banks exist, corresponding SHA256 hash codes are respectively generated for the serial number of each memory bank, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the memory.
In the step S3, in step S3,
specifically, in the sixth step, if a plurality of hard disks exist, for the model number, serial number, size, volume label, capacity, and interface type of each hard disk, respectively, the combined character strings of these pieces of information generate SHA256 hash codes, then these hash codes are sequentially connected into one character string, and an SHA256 hash string is generated for the combined character string, and this is used as the identifier of the hard disk.
In the step S6, in step S6,
acquiring the authentication content of the data source:
according to the obtained data source authentication content service interface, a data source user writes a request model for acquiring data source authentication content and sends the request model to a data source provider through a data service platform; the data source provider returns the operated result to the data source user; the data source user analyzes the identification content and the specific numerical value of the data source from the return result;
generating an authentication identification of the data source:
the data source using party generates the data source authentication mark according to the obtained data source authentication content and the generation method of the data source authentication mark in the step S3;
judging whether the data source is real:
comparing the generated data source identification with the data source identification obtained from the block chain, and if the identification is the same, the identification of the data source is passed;
otherwise, the authentication of the data source does not pass.
The foregoing is a more detailed description of the invention in connection with specific preferred embodiments and it is not intended that the invention be limited to these specific details. For those skilled in the art to which the invention pertains, several simple deductions or substitutions can be made without departing from the spirit of the invention, and all shall be considered as belonging to the protection scope of the invention.

Claims (8)

1. A data source identification method based on a block chain is characterized by comprising the following steps:
s1: the data source provider deploys an authentication service for the data source,
the data source provider deploys the authentication service of the data source to a data service platform, the data service platform is a point-to-point network consisting of all participant nodes, and each participant node runs the data service platform on a local platform of the participant node;
s2: a service interface for authoring authentication content of a data source,
the data source provider writes a service interface for acquiring the data source authentication content on the data service platform, wherein the interface is provided for the data source user and is used for acquiring the authentication content of the data source;
s3: an authentication identification of the data source is generated,
the data source provider generates an identification of the data source by using an SHA256 algorithm according to the identification content of the data source, and the generation method of the identification of the data source comprises the following steps:
the method comprises the following steps: acquiring a CPU serial number of equipment, and generating a hash code by using an SHA256 algorithm;
step two: acquiring a mainboard serial number of the equipment, and generating a hash code by using an SHA256 algorithm;
step three: acquiring a BIOS manufacturer, a BIOS version number and a BIOS initial installation date of equipment mainboard installation, combining the information into a character string, and then generating SHA256 hash codes for the combined character string to be used as a mark of the mainboard BIOS;
step four: acquiring a network card MAC address of the equipment, and generating a hash code by using an SHA256 algorithm;
step five: acquiring a serial number of a memory bank of the equipment, and generating a hash code by using an SHA256 algorithm;
step six: acquiring the model number, serial number, size, volume label, capacity and interface type of the hard disk, combining the information into a character string, and then generating SHA256 hash codes for the combined character string;
step seven: acquiring key information of an operating system operated by equipment: combining the information into a character string by a system manufacturer, a system name, a system type, a system version number and system initial installation time, and then generating an SHA256 hash code for the combined character string to be used as an identifier of an operating system;
step eight: acquiring an IP address, a port and a software version number of the software service, combining the information into a character string, and then generating an SHA256 hash code for the combined character string as an identifier of the software service;
step nine: respectively taking the hash codes generated in the first step to the eighth step as identifiers, sequentially connecting the identifiers into a character string, and generating SHA256 hash codes for the combined character string;
step ten: encrypting the hash code generated in the ninth step by using a public key of a CA certificate of a data source provider, encoding the data string generated after encryption by using BASE64, and generating the hash code of the BASE64 encoding string by using an SHA256 algorithm to serve as an identification mark of the data source;
s4: the data source authenticates the content service interface and the ul of the authentication identity of the data source,
the data provider writes the information of the data source authentication content service interface generated in the step S2 and the data source authentication identification information generated in the step S3 into the block chain together through the intelligent contract;
s5: the data source user looks at the relevant information of the data source authentication through the blockchain,
after the data source identification information is linked, the data source user can check all data sources provided with the data source identification information through the block chain, select a required data source and acquire the identification information of the data source in a purchasing or authorization mode;
s6: the data source user authenticates the data source:
it includes obtaining the authentication content of the data source; and generating an identification of the data source and judging whether the data source is real or not.
2. The blockchain-based data source identification method of claim 1, wherein: in the step S1, in the above step,
the data service platform is a point-to-point network composed of all participant nodes, each participant node runs the data service platform on a local platform, and the point-to-point data service platform can be used as a channel for identifying a data source, requesting data and acquiring a result by a data source user.
3. The blockchain-based data source identification method of claim 1, wherein: in the step S2, in the above step,
the acquiring the authentication content of the data source specifically includes: physical hardware identification of a data source machine, key information of an operating system, information of software service and a CA certificate;
wherein, the physical hardware identification comprises: CPU serial number, mainboard serial number, BIOS manufacturer, BIOS version number, BIOS initial installation date, network card MAC address, memory bar serial number and hard disk ID of the chip;
the operating system key information includes: the system comprises a system manufacturer, a system name, a system type, a system version number and system initial installation time;
the information of the software service includes: IP address, port and version number of the service;
a CA certificate is a software certificate issued by an authoritative CA authority and bound to the machine.
4. The blockchain-based data source identification method of claim 1, wherein: in the step S3, in the above step,
specifically, in the first step, if a plurality of CPUs exist, corresponding SHA256 hash codes are respectively generated for the serial number of each CPU, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the chip CPU.
5. The blockchain-based data source identification method of claim 1, wherein: in the step S3, in the above step,
specifically, in the fourth step, if a plurality of network cards exist, corresponding SHA256 hash codes are respectively generated for the serial number of each network card, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the network card.
6. The blockchain-based data source identification method of claim 1, wherein: in the step S3, in the step S,
specifically, in the fifth step, if a plurality of memory banks exist, corresponding SHA256 hash codes are respectively generated for the serial number of each memory bank, then the hash codes are sequentially connected into a character string, and the SHA256 hash codes are generated for the combined character string, and are used as the identifier of the memory.
7. The blockchain-based data source identification method of claim 1, wherein: in the step S3, in the above step,
specifically, in the sixth step, if a plurality of hard disks exist, for the model number, serial number, size, volume label, capacity, and interface type of each hard disk, respectively, the combined character strings of these pieces of information generate SHA256 hash codes, then these hash codes are sequentially connected into one character string, and an SHA256 hash string is generated for the combined character string, and this is used as the identifier of the hard disk.
8. The blockchain-based data source identification method of claim 1, wherein: in the step S6, in the above step,
acquiring the authentication content of the data source:
according to the obtained data source authentication content service interface, a data source user writes a request model for acquiring data source authentication content and sends the request model to a data source provider through a data service platform; the data source provider returns the operated result to the data source user; the data source user analyzes the identification content and the specific numerical value of the data source from the return result;
generating an authentication identification of the data source:
the data source user generates the data source identification according to the obtained data source identification content and the generation method of the data source identification in the step S3;
judging whether the data source is real:
comparing the generated data source identification with the data source identification obtained from the block chain, and if the identification is the same, the identification of the data source is passed;
otherwise, the authentication of the data source does not pass.
CN202110038942.9A 2021-01-12 2021-01-12 Data source identification method based on block chain Active CN112765687B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110038942.9A CN112765687B (en) 2021-01-12 2021-01-12 Data source identification method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110038942.9A CN112765687B (en) 2021-01-12 2021-01-12 Data source identification method based on block chain

Publications (2)

Publication Number Publication Date
CN112765687A CN112765687A (en) 2021-05-07
CN112765687B true CN112765687B (en) 2022-05-13

Family

ID=75701655

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110038942.9A Active CN112765687B (en) 2021-01-12 2021-01-12 Data source identification method based on block chain

Country Status (1)

Country Link
CN (1) CN112765687B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS622344A (en) * 1985-06-27 1987-01-08 Canon Inc Information transmission equipment
CN108646993A (en) * 2018-05-17 2018-10-12 张安东 Output file uniqueness ensuring method based on biological attribute and fluorescent printing technology
CN109076074A (en) * 2016-07-13 2018-12-21 奥迪股份公司 For providing the method for the access mechanism for personal data source
CN109815748A (en) * 2019-01-24 2019-05-28 黄冈 A kind of centre data source method for monitoring based on block chain
CN110222518A (en) * 2019-05-30 2019-09-10 北京工业大学 Credible powers and functions access control method based on block chain
CN110826096A (en) * 2019-10-29 2020-02-21 杭州趣链科技有限公司 Data source sharing method based on block chain
WO2020051710A1 (en) * 2018-09-12 2020-03-19 Joe Jay System and process for managing digitized security tokens
CN110928880A (en) * 2019-11-19 2020-03-27 腾讯科技(深圳)有限公司 Data processing method, device, terminal and medium based on block chain
CN111611552A (en) * 2020-05-21 2020-09-01 浩云科技股份有限公司 License authorization method and device based on combination of software and hardware

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8819058B2 (en) * 2012-01-03 2014-08-26 Yext, Inc. Method and system for providing enhanced business listings to multiple search providers from a single source
US11140201B2 (en) * 2019-02-19 2021-10-05 International Business Machines Corporation Security platform for multi-component system and services thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS622344A (en) * 1985-06-27 1987-01-08 Canon Inc Information transmission equipment
CN109076074A (en) * 2016-07-13 2018-12-21 奥迪股份公司 For providing the method for the access mechanism for personal data source
CN108646993A (en) * 2018-05-17 2018-10-12 张安东 Output file uniqueness ensuring method based on biological attribute and fluorescent printing technology
WO2020051710A1 (en) * 2018-09-12 2020-03-19 Joe Jay System and process for managing digitized security tokens
CN109815748A (en) * 2019-01-24 2019-05-28 黄冈 A kind of centre data source method for monitoring based on block chain
CN110222518A (en) * 2019-05-30 2019-09-10 北京工业大学 Credible powers and functions access control method based on block chain
CN110826096A (en) * 2019-10-29 2020-02-21 杭州趣链科技有限公司 Data source sharing method based on block chain
CN110928880A (en) * 2019-11-19 2020-03-27 腾讯科技(深圳)有限公司 Data processing method, device, terminal and medium based on block chain
CN111611552A (en) * 2020-05-21 2020-09-01 浩云科技股份有限公司 License authorization method and device based on combination of software and hardware

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
区块链中的隐私保护技术;翟社平等;《西安邮电大学学报》;20180910(第05期);全文 *
基于区块链的视听媒体收视调查平台设计;黄昆仑等;《现代电视技术》;20191215(第12期);全文 *

Also Published As

Publication number Publication date
CN112765687A (en) 2021-05-07

Similar Documents

Publication Publication Date Title
CN112789824B (en) Block chain system, information transmission method, system, device and computer medium
CN111464518B (en) Method and device for sending and verifying cross-link communication data
CN103023876B (en) A kind of network terminal and safety certification thereof, registration activation method, server
CN104537293B (en) Authenticating device and system
CN111431903B (en) Cross-link relay method, device and computer readable storage medium
CN112165382B (en) Software authorization method and device, authorization server side and terminal equipment
CN112508563B (en) Cross-chain transaction credibility verification method and device and computer equipment
CN110189128A (en) A kind of algorithm and device of the distributed common recognition quickly generated for block
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
US20140136431A1 (en) Digitally secured electronic titles for products in supply chains
CN103561006B (en) Application authentication method and device and application authentication server based on Android
CN103368916A (en) Technology for generating trusted identity certification of computer terminal based on hardware information
CN109985389A (en) Cards game anti-cheating method and its system based on block chain intelligence contract
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
CN109816386A (en) Data get through method on a kind of chain of the unified identity authentication based on block chain
CN107273514A (en) A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system
CN108880789B (en) Hardware product anti-counterfeiting tracing method, node equipment and system
CN110381055A (en) RFID system privacy-protection certification protocol method in healthcare supply chain
CN109933987A (en) For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN115840787B (en) Block chain-based supply chain data sharing method, device, equipment and medium
CN108496194A (en) A kind of method, server-side and the system of verification terminal legality
CN112769548A (en) Block chain numerical information transmission method, system, device and computer medium
CN117560137A (en) Block chain service device, block chain service system and communication method
CN112765687B (en) Data source identification method based on block chain
CN109523382A (en) The method of independent common recognition block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant