CN112866255A - Block chain-based data transmission quality verification method, system, device and medium - Google Patents

Block chain-based data transmission quality verification method, system, device and medium Download PDF

Info

Publication number
CN112866255A
CN112866255A CN202110086411.7A CN202110086411A CN112866255A CN 112866255 A CN112866255 A CN 112866255A CN 202110086411 A CN202110086411 A CN 202110086411A CN 112866255 A CN112866255 A CN 112866255A
Authority
CN
China
Prior art keywords
data
verification
block chain
identifier
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110086411.7A
Other languages
Chinese (zh)
Inventor
洪薇
洪健
李京昆
刘文思
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei Chenweixi Chain Information Technology Co ltd
Original Assignee
Hubei Chenweixi Chain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei Chenweixi Chain Information Technology Co ltd filed Critical Hubei Chenweixi Chain Information Technology Co ltd
Priority to CN202110086411.7A priority Critical patent/CN112866255A/en
Publication of CN112866255A publication Critical patent/CN112866255A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method, a system, a device and a medium for checking data transmission quality based on a block chain, relating to the field of data transmission quality checking and comprising the following steps: calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted; the first identification is sent to each node in the block chain network through the block chain network, and the first identification uplink is stored in the block chain network; transmitting data to be transmitted to a data receiver; the data receiver calculates and obtains a second identification of the received data based on the received data; sending a transmission data verification request to the blockchain network; after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares the second identifier with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result; the invention checks the transmission data together through the node consensus of the block chain network, ensures the integrity of the transmission data, and simultaneously ensures the universality and the value of the transmission data.

Description

Block chain-based data transmission quality verification method, system, device and medium
Technical Field
The present invention relates to the field of data quality verification, and in particular, to a method, a system, an apparatus, and a medium for verifying data transmission quality based on a block chain.
Background
The existing data acquisition and aggregation management method forms intensive data resource libraries such as a database, a big data center and the like, and is matched with system tools and methods such as data sharing and exchange and the like. In the process of monitoring the data acquisition quality, if the data acquisition quality is directly involved in data reading and writing operation, the data acquisition quality is influenced by security risk, stability and trust degree and cannot be approved or accepted by a large running data system
The traditional data transmission process is only carried out in a data source and a data transmission receiver, the transmitted data cannot be approved by multiple parties, the credibility of the data does not reach the sharing use requirement, and the use value of the data is reduced.
Disclosure of Invention
The invention aims to solve the technical problems that in the prior art, the transmitted data can only be approved by a transmitting party and a receiving party, and the integrity of the data is not approved by other parties, so that the data received by the receiving party of the data cannot be used by other parties, and the universality and the value of the data are reduced.
In order to achieve the above object, the present invention provides a block chain-based data transmission quality verification method, including:
obtaining data to be transmitted, and calculating to obtain a first identifier of the data to be transmitted based on the data to be transmitted;
the first identification is sent to each node in the block chain network through the block chain network, and after the nodes achieve common identification confirmation, the first identification uplink is stored in the block chain network;
transmitting data to be transmitted to a data receiver;
the data receiving party receives the received data and calculates and obtains a second identifier of the received data based on the received data;
transmitting a transmission data verification request to the blockchain network based on the second identifier, and broadcasting the verification request in the blockchain network;
and after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares a second identifier in the verification request with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result.
The method checks the transmission data together through the node consensus of the block chain network, ensures the integrity of the transmission data, and simultaneously ensures the universality and the value of the transmission data.
Preferably, the method obtains the first hash value of the data to be transmitted through calculation, and takes the first hash value obtained through calculation as the identifier of the data to be transmitted; the method obtains the second hash value of the received data through calculation, and takes the second hash value obtained through calculation as the identification of the received data.
Preferably, the broadcast mode of the check request in the blockchain network in the method is full-network broadcast or directional broadcast.
Preferably, for the nodes which do not send feedback information, the blockchain network repeatedly sends the check request or periodically polls the nodes until all the nodes included in the check request receive the check request.
Preferably, the method sends the verification result to the verification requester after obtaining the data transmission quality verification result.
Preferably, the checking requesting party in the method counts the checking result, wherein the checking result is the proportion of the node which is checked to be correct to the total node; if the ratio is greater than or equal to a preset threshold value, judging that the data transmission quality is qualified; and if the proportion is smaller than the preset threshold value, judging that the data transmission quality is unqualified.
Preferably, the method further comprises: deploying a verification program at all nodes in the blockchain network, wherein the verification program is used for verifying transmission data;
the node deployment verification program comprises the following steps:
authenticating a combined machine identity of a distribution deployment file;
the identity authentication process and the result are linked to be stored;
after receiving the deployment requirement, the combined machine encrypts the distributed deployment file, and sends the encrypted deployment file to the node to be installed;
after receiving the encrypted deployment file, the node to be installed decrypts the encrypted deployment file by using a private key carried by the node to be installed, and installs the decrypted file on the node of the node to complete verification program deployment of the node on the blockchain network.
The invention also provides a data transmission quality verification system based on the block chain, which comprises:
the first calculation unit is used for obtaining data to be transmitted and calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted;
the uplink unit is used for sending the first identifier to each node in the block chain network through the block chain network, and storing the first identifier uplink in the block chain network after the nodes achieve the common identifier confirmation;
the transmission unit is used for transmitting the data to be transmitted to a data receiver;
the second calculation unit is used for the data receiving party to receive the received data and calculate and obtain a second identifier of the received data based on the received data;
a sending unit, configured to send a transmission data verification request to the blockchain network based on the second identifier, and broadcast the verification request in the blockchain network;
and the verification unit is used for sending deaf information to the verification request sender after the node receives the verification broadcast information, comparing a second identifier in the verification request with the first identifier stored in the block chain, and acquiring a data transmission quality verification result based on the comparison result.
The invention also provides a device for checking the data transmission quality based on the block chain, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the method for checking the data transmission quality based on the block chain when executing the computer program.
The present invention also provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for checking the quality of data transmission based on block chains.
One or more technical schemes provided by the invention at least have the following technical effects or advantages:
the invention checks the transmitted data together through the node consensus of the block chain network, ensures the integrity of the transmitted data, ensures the universality and the value of the transmitted data, and solves the technical problems that the transmitted data can only be approved by a transmitting party and a receiving party, the integrity of the data is not approved by other parties, the data received by the receiving party of the data can not be used by other parties, and the universality and the value of the data are reduced in the prior art.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention;
fig. 1 is a schematic flow chart of a block chain-based data transmission quality verification method;
fig. 2 is a schematic diagram of a block chain-based data transmission quality verification system.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflicting with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described and thus the scope of the present invention is not limited by the specific embodiments disclosed below.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Example one
Referring to fig. 1, fig. 1 is a schematic flow chart of a block chain-based data transmission quality verification method, an embodiment of the present invention provides a block chain-based data transmission quality verification method, including:
obtaining data to be transmitted, and calculating to obtain a first identifier of the data to be transmitted based on the data to be transmitted;
the first identification is sent to each node in the block chain network through the block chain network, and after the nodes achieve common identification confirmation, the first identification uplink is stored in the block chain network;
transmitting data to be transmitted to a data receiver;
the data receiving party receives the received data and calculates and obtains a second identifier of the received data based on the received data;
transmitting a transmission data verification request to the blockchain network based on the second identifier, and broadcasting the verification request in the blockchain network;
and after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares a second identifier in the verification request with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result.
The invention is described in detail below by way of example, without the process being restricted to the following embodiments:
s1: extracting data to be transmitted, calculating a hash value of the transmitted data through an algorithm, using the hash value as an identifier of the transmitted data, sending the hash value to each node through a block chain network, and after the nodes achieve common identification confirmation, uplink storing the uplink on the block chain network; the algorithm may be a hash algorithm, or may be any algorithm capable of calculating a hash value of data, and the specific type and form of the algorithm are not limited in the present invention.
S2: all nodes deploy verification programs which can verify the transmission data;
and (3) deploying a verification program:
s2.1: performing identity authentication on the combined machine for distributing the deployment file;
s2.2: performing uplink storage for the identity authentication process and result in the step S2.1;
s2.3: after receiving the deployment requirement, the combined machine encrypts the distributed deployment file, and sends the encrypted deployment file to the node to be installed;
s2.4: after receiving the encrypted deployment file, the node to be installed decrypts the encrypted deployment file by using a private key carried by the node to be installed, installs the decrypted file on the node of the node to complete the verification program deployment of the node on the blockchain network
S3: a receiver of transmission data calculates the received transmission data after receiving the transmission data to obtain the hash of the received transmission data, and sends a transmission data verification request to the block chain network according to the hash, and the block chain network performs whole network broadcasting or directional broadcasting according to the verification request;
s4: according to step S3, when receiving the check broadcast information, the node side sends the received deaf information to the check requester, and the blockchain network repeatedly sends check requests or periodic polling messages to the nodes that do not send feedback information until the consensus nodes included in the check requests all receive the check requests;
s5: and after receiving the verification request information, the node side compares the hash in the verification request with the original hash stored on the chain to complete verification. After the verification is finished, sending a verification result to a verification requester, and counting the verification result by the verification requester, wherein the verification result represents the proportion of the nodes which are verified to be correct to the total nodes;
s6: and comparing the verification result obtained in the step S5 with a preset threshold, if the verification result is greater than or equal to the preset threshold, determining that the data transmission quality is qualified, and if the verification result is less than the preset threshold, determining that the data transmission quality is unqualified.
The size of the preset threshold value can be flexibly adjusted according to actual needs in practical application, and the specific size of the preset threshold value is not limited by the invention.
Example two
Referring to fig. 2, fig. 2 is a schematic diagram illustrating a block chain-based data transmission quality verification system, an embodiment of the present invention provides a block chain-based data transmission quality verification system, including:
the first calculation unit is used for obtaining data to be transmitted and calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted;
the uplink unit is used for sending the first identifier to each node in the block chain network through the block chain network, and storing the first identifier uplink in the block chain network after the nodes achieve the common identifier confirmation;
the transmission unit is used for transmitting the data to be transmitted to a data receiver;
the second calculation unit is used for the data receiving party to receive the received data and calculate and obtain a second identifier of the received data based on the received data;
a sending unit, configured to send a transmission data verification request to the blockchain network based on the second identifier, and broadcast the verification request in the blockchain network;
and the verification unit is used for sending deaf information to the verification request sender after the node receives the verification broadcast information, comparing a second identifier in the verification request with the first identifier stored in the block chain, and acquiring a data transmission quality verification result based on the comparison result.
EXAMPLE III
The invention also provides a device for checking the data transmission quality based on the block chain, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the method for checking the data transmission quality based on the block chain when executing the computer program.
The processor may be a Central Processing Unit (CPU), or other general-purpose processor, a digital signal processor (digital signal processor), an Application Specific Integrated Circuit (Application Specific Integrated Circuit), an off-the-shelf programmable gate array (field programmable gate array) or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may be used for storing the computer program and/or the module, and the processor may implement various functions of the device for checking quality of data transmission based on a block chain in the invention by operating or executing data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a smart memory card, a secure digital card, a flash memory card, at least one magnetic disk storage device, a flash memory device, or other volatile solid state storage device.
Example four
The present invention also provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for checking the quality of data transmission based on block chains.
The device for verifying data transmission quality based on the block chain can be stored in a computer readable storage medium if the device is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, all or part of the flow in the method of implementing the embodiments of the present invention may also be stored in a computer readable storage medium through a computer program, and when the computer program is executed by a processor, the computer program may implement the steps of the above-described method embodiments. Wherein the computer program comprises computer program code, an object code form, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying said computer program code, a recording medium, a usb-disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory, a random access memory, a point carrier signal, a telecommunications signal, a software distribution medium, etc. It should be noted that the computer readable medium may contain content that is appropriately increased or decreased as required by legislation and patent practice in the jurisdiction.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of this specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which the elements and sequences of the process are recited in the specification, the use of alphanumeric characters, or other designations, is not intended to limit the order in which the processes and methods of the specification occur, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
For each patent, patent application publication, and other material, such as articles, books, specifications, publications, documents, etc., cited in this specification, the entire contents of each are hereby incorporated by reference into this specification. Except where the application history document does not conform to or conflict with the contents of the present specification, it is to be understood that the application history document, as used herein in the present specification or appended claims, is intended to define the broadest scope of the present specification (whether presently or later in the specification) rather than the broadest scope of the present specification. It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A block chain-based data transmission quality verification method is characterized by comprising the following steps:
obtaining data to be transmitted, and calculating to obtain a first identifier of the data to be transmitted based on the data to be transmitted;
the first identification is sent to each node in the block chain network through the block chain network, and after the nodes achieve common identification confirmation, the first identification uplink is stored in the block chain network;
transmitting data to be transmitted to a data receiver;
the data receiving party receives the received data and calculates and obtains a second identifier of the received data based on the received data;
transmitting a transmission data verification request to the blockchain network based on the second identifier, and broadcasting the verification request in the blockchain network;
and after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares a second identifier in the verification request with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result.
2. The checking method for the block chain-based data transmission quality according to claim 1, wherein the method obtains the first hash value of the data to be transmitted by calculation, and uses the first hash value obtained by calculation as the identifier of the data to be transmitted; the method obtains the second hash value of the received data through calculation, and takes the second hash value obtained through calculation as the identification of the received data.
3. The method of claim 1, wherein the broadcast mode of the check request in the blockchain network is a full-network broadcast or a directional broadcast.
4. The blockchain-based data transmission quality verification method according to claim 1, wherein for nodes that do not send feedback information, the blockchain network repeatedly sends verification requests or periodically polls the nodes to such nodes until all nodes included in the verification requests receive the verification requests.
5. The block chain based data transmission quality verification method according to claim 1, wherein the method sends the verification result to the verification requester after obtaining the data transmission quality verification result.
6. The block chain-based data transmission quality verification method according to claim 5, wherein the verification requester counts a verification result, wherein the verification result is a ratio of a node which is verified to be correct to a total node; if the ratio is greater than or equal to a preset threshold value, judging that the data transmission quality is qualified; and if the proportion is smaller than the preset threshold value, judging that the data transmission quality is unqualified.
7. The blockchain-based data transmission quality verification method according to claim 1, wherein the method further comprises: deploying a verification program at all nodes in the blockchain network, wherein the verification program is used for verifying transmission data;
the node deployment verification program comprises the following steps:
authenticating a combined machine identity of a distribution deployment file;
the identity authentication process and the result are linked to be stored;
after receiving the deployment requirement, the combined machine encrypts the distributed deployment file, and sends the encrypted deployment file to the node to be installed;
after receiving the encrypted deployment file, the node to be installed decrypts the encrypted deployment file by using a private key carried by the node to be installed, and installs the decrypted file on the node of the node to complete verification program deployment of the node on the blockchain network.
8. A block chain based data transmission quality verification system, the system comprising:
the first calculation unit is used for obtaining data to be transmitted and calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted;
the uplink unit is used for sending the first identifier to each node in the block chain network through the block chain network, and storing the first identifier uplink in the block chain network after the nodes achieve the common identifier confirmation;
the transmission unit is used for transmitting the data to be transmitted to a data receiver;
the second calculation unit is used for the data receiving party to receive the received data and calculate and obtain a second identifier of the received data based on the received data;
a sending unit, configured to send a transmission data verification request to the blockchain network based on the second identifier, and broadcast the verification request in the blockchain network;
and the verification unit is used for sending deaf information to the verification request sender after the node receives the verification broadcast information, comparing a second identifier in the verification request with the first identifier stored in the block chain, and acquiring a data transmission quality verification result based on the comparison result.
9. A blockchain based data transmission quality verification apparatus comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the blockchain based data transmission quality verification method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for checking the quality of block chain based data transmission according to any one of claims 1 to 7.
CN202110086411.7A 2021-01-22 2021-01-22 Block chain-based data transmission quality verification method, system, device and medium Pending CN112866255A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110086411.7A CN112866255A (en) 2021-01-22 2021-01-22 Block chain-based data transmission quality verification method, system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110086411.7A CN112866255A (en) 2021-01-22 2021-01-22 Block chain-based data transmission quality verification method, system, device and medium

Publications (1)

Publication Number Publication Date
CN112866255A true CN112866255A (en) 2021-05-28

Family

ID=76007803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110086411.7A Pending CN112866255A (en) 2021-01-22 2021-01-22 Block chain-based data transmission quality verification method, system, device and medium

Country Status (1)

Country Link
CN (1) CN112866255A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569300A (en) * 2021-09-27 2021-10-29 环球数科集团有限公司 Block chain data processing system based on cloud computing
CN113723819A (en) * 2021-08-31 2021-11-30 成都航空职业技术学院 Education evaluation data transmission method and system based on Internet of things

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190036712A1 (en) * 2017-07-26 2019-01-31 Alibaba Group Holding Limited Digital certificate management method, apparatus, and system
CN111324666A (en) * 2020-02-14 2020-06-23 腾讯科技(深圳)有限公司 Data processing method and device based on block chain
CN111583041A (en) * 2020-05-13 2020-08-25 中国银行股份有限公司 Block chain-based bond issue data storage and verification processing method and device
CN111988402A (en) * 2020-08-20 2020-11-24 支付宝(杭州)信息技术有限公司 Data verification method and device and electronic equipment
CN112070502A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Data verification method and system based on block chain
US20210012336A1 (en) * 2019-07-11 2021-01-14 Advanced New Technologies Co., Ltd. Shared blockchain data storage

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190036712A1 (en) * 2017-07-26 2019-01-31 Alibaba Group Holding Limited Digital certificate management method, apparatus, and system
US20210012336A1 (en) * 2019-07-11 2021-01-14 Advanced New Technologies Co., Ltd. Shared blockchain data storage
CN111324666A (en) * 2020-02-14 2020-06-23 腾讯科技(深圳)有限公司 Data processing method and device based on block chain
CN111583041A (en) * 2020-05-13 2020-08-25 中国银行股份有限公司 Block chain-based bond issue data storage and verification processing method and device
CN111988402A (en) * 2020-08-20 2020-11-24 支付宝(杭州)信息技术有限公司 Data verification method and device and electronic equipment
CN112070502A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Data verification method and system based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113723819A (en) * 2021-08-31 2021-11-30 成都航空职业技术学院 Education evaluation data transmission method and system based on Internet of things
CN113723819B (en) * 2021-08-31 2024-05-31 成都航空职业技术学院 Educational evaluation data transmission method and system based on Internet of things
CN113569300A (en) * 2021-09-27 2021-10-29 环球数科集团有限公司 Block chain data processing system based on cloud computing
CN113569300B (en) * 2021-09-27 2021-11-30 环球数科集团有限公司 Block chain data processing system based on cloud computing

Similar Documents

Publication Publication Date Title
CN111027086B (en) Private data protection method and system
US20230244807A1 (en) Controlling access to datasets described in a cryptographically signed record
CN111049825B (en) Secure multi-party computing method and system based on trusted execution environment
US8966248B2 (en) Secure software file transfer systems and methods for vehicle control modules
US9515832B2 (en) Process authentication and resource permissions
US20140150096A1 (en) Method for assuring integrity of mobile applications and apparatus using the method
CN111914293B (en) Data access right verification method and device, computer equipment and storage medium
CN113656780B (en) Cross-chain access control method and device
CN113472790B (en) Information transmission method, client and server based on HTTPS protocol
CN112866255A (en) Block chain-based data transmission quality verification method, system, device and medium
WO2020173019A1 (en) Access certificate verification method and device, computer equipment and storage medium
CN111311258B (en) Block chain-based trusted transaction method, device, system, equipment and medium
US20210182848A1 (en) Identification and authorization of transactions via smart contracts
CN111340483A (en) Data management method based on block chain and related equipment
CN111988262B (en) Authentication method, authentication device, server and storage medium
CN113779536A (en) User access method, system, electronic device and medium
CN111143788B (en) License processing method, electronic device, and storage medium
CN110399706B (en) Authorization authentication method, device and computer system
CN110381114B (en) Interface request parameter processing method and device, terminal equipment and medium
CN111030816A (en) Authentication method and device for access platform of evidence obtaining equipment and storage medium
US20200028689A1 (en) Location-based and time-based photo authentication
CN114861144A (en) Data authority processing method based on block chain
US20220100485A1 (en) Applet package sending method and device, electronic apparatus, and computer readable medium
CN115935379A (en) Service processing method, device, equipment and computer readable storage medium
CN114640491A (en) Communication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210528