CN112866255A - Block chain-based data transmission quality verification method, system, device and medium - Google Patents
Block chain-based data transmission quality verification method, system, device and medium Download PDFInfo
- Publication number
- CN112866255A CN112866255A CN202110086411.7A CN202110086411A CN112866255A CN 112866255 A CN112866255 A CN 112866255A CN 202110086411 A CN202110086411 A CN 202110086411A CN 112866255 A CN112866255 A CN 112866255A
- Authority
- CN
- China
- Prior art keywords
- data
- verification
- block chain
- identifier
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 81
- 230000005540 biological transmission Effects 0.000 title claims abstract description 72
- 238000000034 method Methods 0.000 title claims abstract description 49
- 206010011878 Deafness Diseases 0.000 claims abstract description 8
- 238000013524 data verification Methods 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 18
- 238000004364 calculation method Methods 0.000 claims description 14
- 238000003860 storage Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 10
- 238000012790 confirmation Methods 0.000 claims description 7
- 238000009826 distribution Methods 0.000 claims description 2
- 238000012986 modification Methods 0.000 description 8
- 230000004048 modification Effects 0.000 description 8
- 238000004422 calculation algorithm Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000006872 improvement Effects 0.000 description 3
- 239000000463 material Substances 0.000 description 3
- 230000000644 propagated effect Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 239000010977 jade Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method, a system, a device and a medium for checking data transmission quality based on a block chain, relating to the field of data transmission quality checking and comprising the following steps: calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted; the first identification is sent to each node in the block chain network through the block chain network, and the first identification uplink is stored in the block chain network; transmitting data to be transmitted to a data receiver; the data receiver calculates and obtains a second identification of the received data based on the received data; sending a transmission data verification request to the blockchain network; after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares the second identifier with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result; the invention checks the transmission data together through the node consensus of the block chain network, ensures the integrity of the transmission data, and simultaneously ensures the universality and the value of the transmission data.
Description
Technical Field
The present invention relates to the field of data quality verification, and in particular, to a method, a system, an apparatus, and a medium for verifying data transmission quality based on a block chain.
Background
The existing data acquisition and aggregation management method forms intensive data resource libraries such as a database, a big data center and the like, and is matched with system tools and methods such as data sharing and exchange and the like. In the process of monitoring the data acquisition quality, if the data acquisition quality is directly involved in data reading and writing operation, the data acquisition quality is influenced by security risk, stability and trust degree and cannot be approved or accepted by a large running data system
The traditional data transmission process is only carried out in a data source and a data transmission receiver, the transmitted data cannot be approved by multiple parties, the credibility of the data does not reach the sharing use requirement, and the use value of the data is reduced.
Disclosure of Invention
The invention aims to solve the technical problems that in the prior art, the transmitted data can only be approved by a transmitting party and a receiving party, and the integrity of the data is not approved by other parties, so that the data received by the receiving party of the data cannot be used by other parties, and the universality and the value of the data are reduced.
In order to achieve the above object, the present invention provides a block chain-based data transmission quality verification method, including:
obtaining data to be transmitted, and calculating to obtain a first identifier of the data to be transmitted based on the data to be transmitted;
the first identification is sent to each node in the block chain network through the block chain network, and after the nodes achieve common identification confirmation, the first identification uplink is stored in the block chain network;
transmitting data to be transmitted to a data receiver;
the data receiving party receives the received data and calculates and obtains a second identifier of the received data based on the received data;
transmitting a transmission data verification request to the blockchain network based on the second identifier, and broadcasting the verification request in the blockchain network;
and after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares a second identifier in the verification request with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result.
The method checks the transmission data together through the node consensus of the block chain network, ensures the integrity of the transmission data, and simultaneously ensures the universality and the value of the transmission data.
Preferably, the method obtains the first hash value of the data to be transmitted through calculation, and takes the first hash value obtained through calculation as the identifier of the data to be transmitted; the method obtains the second hash value of the received data through calculation, and takes the second hash value obtained through calculation as the identification of the received data.
Preferably, the broadcast mode of the check request in the blockchain network in the method is full-network broadcast or directional broadcast.
Preferably, for the nodes which do not send feedback information, the blockchain network repeatedly sends the check request or periodically polls the nodes until all the nodes included in the check request receive the check request.
Preferably, the method sends the verification result to the verification requester after obtaining the data transmission quality verification result.
Preferably, the checking requesting party in the method counts the checking result, wherein the checking result is the proportion of the node which is checked to be correct to the total node; if the ratio is greater than or equal to a preset threshold value, judging that the data transmission quality is qualified; and if the proportion is smaller than the preset threshold value, judging that the data transmission quality is unqualified.
Preferably, the method further comprises: deploying a verification program at all nodes in the blockchain network, wherein the verification program is used for verifying transmission data;
the node deployment verification program comprises the following steps:
authenticating a combined machine identity of a distribution deployment file;
the identity authentication process and the result are linked to be stored;
after receiving the deployment requirement, the combined machine encrypts the distributed deployment file, and sends the encrypted deployment file to the node to be installed;
after receiving the encrypted deployment file, the node to be installed decrypts the encrypted deployment file by using a private key carried by the node to be installed, and installs the decrypted file on the node of the node to complete verification program deployment of the node on the blockchain network.
The invention also provides a data transmission quality verification system based on the block chain, which comprises:
the first calculation unit is used for obtaining data to be transmitted and calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted;
the uplink unit is used for sending the first identifier to each node in the block chain network through the block chain network, and storing the first identifier uplink in the block chain network after the nodes achieve the common identifier confirmation;
the transmission unit is used for transmitting the data to be transmitted to a data receiver;
the second calculation unit is used for the data receiving party to receive the received data and calculate and obtain a second identifier of the received data based on the received data;
a sending unit, configured to send a transmission data verification request to the blockchain network based on the second identifier, and broadcast the verification request in the blockchain network;
and the verification unit is used for sending deaf information to the verification request sender after the node receives the verification broadcast information, comparing a second identifier in the verification request with the first identifier stored in the block chain, and acquiring a data transmission quality verification result based on the comparison result.
The invention also provides a device for checking the data transmission quality based on the block chain, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the method for checking the data transmission quality based on the block chain when executing the computer program.
The present invention also provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for checking the quality of data transmission based on block chains.
One or more technical schemes provided by the invention at least have the following technical effects or advantages:
the invention checks the transmitted data together through the node consensus of the block chain network, ensures the integrity of the transmitted data, ensures the universality and the value of the transmitted data, and solves the technical problems that the transmitted data can only be approved by a transmitting party and a receiving party, the integrity of the data is not approved by other parties, the data received by the receiving party of the data can not be used by other parties, and the universality and the value of the data are reduced in the prior art.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention;
fig. 1 is a schematic flow chart of a block chain-based data transmission quality verification method;
fig. 2 is a schematic diagram of a block chain-based data transmission quality verification system.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflicting with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described and thus the scope of the present invention is not limited by the specific embodiments disclosed below.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Example one
Referring to fig. 1, fig. 1 is a schematic flow chart of a block chain-based data transmission quality verification method, an embodiment of the present invention provides a block chain-based data transmission quality verification method, including:
obtaining data to be transmitted, and calculating to obtain a first identifier of the data to be transmitted based on the data to be transmitted;
the first identification is sent to each node in the block chain network through the block chain network, and after the nodes achieve common identification confirmation, the first identification uplink is stored in the block chain network;
transmitting data to be transmitted to a data receiver;
the data receiving party receives the received data and calculates and obtains a second identifier of the received data based on the received data;
transmitting a transmission data verification request to the blockchain network based on the second identifier, and broadcasting the verification request in the blockchain network;
and after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares a second identifier in the verification request with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result.
The invention is described in detail below by way of example, without the process being restricted to the following embodiments:
s1: extracting data to be transmitted, calculating a hash value of the transmitted data through an algorithm, using the hash value as an identifier of the transmitted data, sending the hash value to each node through a block chain network, and after the nodes achieve common identification confirmation, uplink storing the uplink on the block chain network; the algorithm may be a hash algorithm, or may be any algorithm capable of calculating a hash value of data, and the specific type and form of the algorithm are not limited in the present invention.
S2: all nodes deploy verification programs which can verify the transmission data;
and (3) deploying a verification program:
s2.1: performing identity authentication on the combined machine for distributing the deployment file;
s2.2: performing uplink storage for the identity authentication process and result in the step S2.1;
s2.3: after receiving the deployment requirement, the combined machine encrypts the distributed deployment file, and sends the encrypted deployment file to the node to be installed;
s2.4: after receiving the encrypted deployment file, the node to be installed decrypts the encrypted deployment file by using a private key carried by the node to be installed, installs the decrypted file on the node of the node to complete the verification program deployment of the node on the blockchain network
S3: a receiver of transmission data calculates the received transmission data after receiving the transmission data to obtain the hash of the received transmission data, and sends a transmission data verification request to the block chain network according to the hash, and the block chain network performs whole network broadcasting or directional broadcasting according to the verification request;
s4: according to step S3, when receiving the check broadcast information, the node side sends the received deaf information to the check requester, and the blockchain network repeatedly sends check requests or periodic polling messages to the nodes that do not send feedback information until the consensus nodes included in the check requests all receive the check requests;
s5: and after receiving the verification request information, the node side compares the hash in the verification request with the original hash stored on the chain to complete verification. After the verification is finished, sending a verification result to a verification requester, and counting the verification result by the verification requester, wherein the verification result represents the proportion of the nodes which are verified to be correct to the total nodes;
s6: and comparing the verification result obtained in the step S5 with a preset threshold, if the verification result is greater than or equal to the preset threshold, determining that the data transmission quality is qualified, and if the verification result is less than the preset threshold, determining that the data transmission quality is unqualified.
The size of the preset threshold value can be flexibly adjusted according to actual needs in practical application, and the specific size of the preset threshold value is not limited by the invention.
Example two
Referring to fig. 2, fig. 2 is a schematic diagram illustrating a block chain-based data transmission quality verification system, an embodiment of the present invention provides a block chain-based data transmission quality verification system, including:
the first calculation unit is used for obtaining data to be transmitted and calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted;
the uplink unit is used for sending the first identifier to each node in the block chain network through the block chain network, and storing the first identifier uplink in the block chain network after the nodes achieve the common identifier confirmation;
the transmission unit is used for transmitting the data to be transmitted to a data receiver;
the second calculation unit is used for the data receiving party to receive the received data and calculate and obtain a second identifier of the received data based on the received data;
a sending unit, configured to send a transmission data verification request to the blockchain network based on the second identifier, and broadcast the verification request in the blockchain network;
and the verification unit is used for sending deaf information to the verification request sender after the node receives the verification broadcast information, comparing a second identifier in the verification request with the first identifier stored in the block chain, and acquiring a data transmission quality verification result based on the comparison result.
EXAMPLE III
The invention also provides a device for checking the data transmission quality based on the block chain, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the method for checking the data transmission quality based on the block chain when executing the computer program.
The processor may be a Central Processing Unit (CPU), or other general-purpose processor, a digital signal processor (digital signal processor), an Application Specific Integrated Circuit (Application Specific Integrated Circuit), an off-the-shelf programmable gate array (field programmable gate array) or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may be used for storing the computer program and/or the module, and the processor may implement various functions of the device for checking quality of data transmission based on a block chain in the invention by operating or executing data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a smart memory card, a secure digital card, a flash memory card, at least one magnetic disk storage device, a flash memory device, or other volatile solid state storage device.
Example four
The present invention also provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for checking the quality of data transmission based on block chains.
The device for verifying data transmission quality based on the block chain can be stored in a computer readable storage medium if the device is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, all or part of the flow in the method of implementing the embodiments of the present invention may also be stored in a computer readable storage medium through a computer program, and when the computer program is executed by a processor, the computer program may implement the steps of the above-described method embodiments. Wherein the computer program comprises computer program code, an object code form, an executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying said computer program code, a recording medium, a usb-disk, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read-only memory, a random access memory, a point carrier signal, a telecommunications signal, a software distribution medium, etc. It should be noted that the computer readable medium may contain content that is appropriately increased or decreased as required by legislation and patent practice in the jurisdiction.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of this specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which the elements and sequences of the process are recited in the specification, the use of alphanumeric characters, or other designations, is not intended to limit the order in which the processes and methods of the specification occur, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
For each patent, patent application publication, and other material, such as articles, books, specifications, publications, documents, etc., cited in this specification, the entire contents of each are hereby incorporated by reference into this specification. Except where the application history document does not conform to or conflict with the contents of the present specification, it is to be understood that the application history document, as used herein in the present specification or appended claims, is intended to define the broadest scope of the present specification (whether presently or later in the specification) rather than the broadest scope of the present specification. It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (10)
1. A block chain-based data transmission quality verification method is characterized by comprising the following steps:
obtaining data to be transmitted, and calculating to obtain a first identifier of the data to be transmitted based on the data to be transmitted;
the first identification is sent to each node in the block chain network through the block chain network, and after the nodes achieve common identification confirmation, the first identification uplink is stored in the block chain network;
transmitting data to be transmitted to a data receiver;
the data receiving party receives the received data and calculates and obtains a second identifier of the received data based on the received data;
transmitting a transmission data verification request to the blockchain network based on the second identifier, and broadcasting the verification request in the blockchain network;
and after receiving the verification broadcast information, the node sends deaf information to a verification request sender, compares a second identifier in the verification request with the first identifier stored in the block chain, and obtains a data transmission quality verification result based on the comparison result.
2. The checking method for the block chain-based data transmission quality according to claim 1, wherein the method obtains the first hash value of the data to be transmitted by calculation, and uses the first hash value obtained by calculation as the identifier of the data to be transmitted; the method obtains the second hash value of the received data through calculation, and takes the second hash value obtained through calculation as the identification of the received data.
3. The method of claim 1, wherein the broadcast mode of the check request in the blockchain network is a full-network broadcast or a directional broadcast.
4. The blockchain-based data transmission quality verification method according to claim 1, wherein for nodes that do not send feedback information, the blockchain network repeatedly sends verification requests or periodically polls the nodes to such nodes until all nodes included in the verification requests receive the verification requests.
5. The block chain based data transmission quality verification method according to claim 1, wherein the method sends the verification result to the verification requester after obtaining the data transmission quality verification result.
6. The block chain-based data transmission quality verification method according to claim 5, wherein the verification requester counts a verification result, wherein the verification result is a ratio of a node which is verified to be correct to a total node; if the ratio is greater than or equal to a preset threshold value, judging that the data transmission quality is qualified; and if the proportion is smaller than the preset threshold value, judging that the data transmission quality is unqualified.
7. The blockchain-based data transmission quality verification method according to claim 1, wherein the method further comprises: deploying a verification program at all nodes in the blockchain network, wherein the verification program is used for verifying transmission data;
the node deployment verification program comprises the following steps:
authenticating a combined machine identity of a distribution deployment file;
the identity authentication process and the result are linked to be stored;
after receiving the deployment requirement, the combined machine encrypts the distributed deployment file, and sends the encrypted deployment file to the node to be installed;
after receiving the encrypted deployment file, the node to be installed decrypts the encrypted deployment file by using a private key carried by the node to be installed, and installs the decrypted file on the node of the node to complete verification program deployment of the node on the blockchain network.
8. A block chain based data transmission quality verification system, the system comprising:
the first calculation unit is used for obtaining data to be transmitted and calculating and obtaining a first identifier of the data to be transmitted based on the data to be transmitted;
the uplink unit is used for sending the first identifier to each node in the block chain network through the block chain network, and storing the first identifier uplink in the block chain network after the nodes achieve the common identifier confirmation;
the transmission unit is used for transmitting the data to be transmitted to a data receiver;
the second calculation unit is used for the data receiving party to receive the received data and calculate and obtain a second identifier of the received data based on the received data;
a sending unit, configured to send a transmission data verification request to the blockchain network based on the second identifier, and broadcast the verification request in the blockchain network;
and the verification unit is used for sending deaf information to the verification request sender after the node receives the verification broadcast information, comparing a second identifier in the verification request with the first identifier stored in the block chain, and acquiring a data transmission quality verification result based on the comparison result.
9. A blockchain based data transmission quality verification apparatus comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the blockchain based data transmission quality verification method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for checking the quality of block chain based data transmission according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110086411.7A CN112866255A (en) | 2021-01-22 | 2021-01-22 | Block chain-based data transmission quality verification method, system, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110086411.7A CN112866255A (en) | 2021-01-22 | 2021-01-22 | Block chain-based data transmission quality verification method, system, device and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112866255A true CN112866255A (en) | 2021-05-28 |
Family
ID=76007803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110086411.7A Pending CN112866255A (en) | 2021-01-22 | 2021-01-22 | Block chain-based data transmission quality verification method, system, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112866255A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113569300A (en) * | 2021-09-27 | 2021-10-29 | 环球数科集团有限公司 | Block chain data processing system based on cloud computing |
CN113723819A (en) * | 2021-08-31 | 2021-11-30 | 成都航空职业技术学院 | Education evaluation data transmission method and system based on Internet of things |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190036712A1 (en) * | 2017-07-26 | 2019-01-31 | Alibaba Group Holding Limited | Digital certificate management method, apparatus, and system |
CN111324666A (en) * | 2020-02-14 | 2020-06-23 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain |
CN111583041A (en) * | 2020-05-13 | 2020-08-25 | 中国银行股份有限公司 | Block chain-based bond issue data storage and verification processing method and device |
CN111988402A (en) * | 2020-08-20 | 2020-11-24 | 支付宝(杭州)信息技术有限公司 | Data verification method and device and electronic equipment |
CN112070502A (en) * | 2020-11-10 | 2020-12-11 | 支付宝(杭州)信息技术有限公司 | Data verification method and system based on block chain |
US20210012336A1 (en) * | 2019-07-11 | 2021-01-14 | Advanced New Technologies Co., Ltd. | Shared blockchain data storage |
-
2021
- 2021-01-22 CN CN202110086411.7A patent/CN112866255A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190036712A1 (en) * | 2017-07-26 | 2019-01-31 | Alibaba Group Holding Limited | Digital certificate management method, apparatus, and system |
US20210012336A1 (en) * | 2019-07-11 | 2021-01-14 | Advanced New Technologies Co., Ltd. | Shared blockchain data storage |
CN111324666A (en) * | 2020-02-14 | 2020-06-23 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain |
CN111583041A (en) * | 2020-05-13 | 2020-08-25 | 中国银行股份有限公司 | Block chain-based bond issue data storage and verification processing method and device |
CN111988402A (en) * | 2020-08-20 | 2020-11-24 | 支付宝(杭州)信息技术有限公司 | Data verification method and device and electronic equipment |
CN112070502A (en) * | 2020-11-10 | 2020-12-11 | 支付宝(杭州)信息技术有限公司 | Data verification method and system based on block chain |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113723819A (en) * | 2021-08-31 | 2021-11-30 | 成都航空职业技术学院 | Education evaluation data transmission method and system based on Internet of things |
CN113723819B (en) * | 2021-08-31 | 2024-05-31 | 成都航空职业技术学院 | Educational evaluation data transmission method and system based on Internet of things |
CN113569300A (en) * | 2021-09-27 | 2021-10-29 | 环球数科集团有限公司 | Block chain data processing system based on cloud computing |
CN113569300B (en) * | 2021-09-27 | 2021-11-30 | 环球数科集团有限公司 | Block chain data processing system based on cloud computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111027086B (en) | Private data protection method and system | |
US20230244807A1 (en) | Controlling access to datasets described in a cryptographically signed record | |
CN111049825B (en) | Secure multi-party computing method and system based on trusted execution environment | |
US8966248B2 (en) | Secure software file transfer systems and methods for vehicle control modules | |
US9515832B2 (en) | Process authentication and resource permissions | |
US20140150096A1 (en) | Method for assuring integrity of mobile applications and apparatus using the method | |
CN111914293B (en) | Data access right verification method and device, computer equipment and storage medium | |
CN113656780B (en) | Cross-chain access control method and device | |
CN113472790B (en) | Information transmission method, client and server based on HTTPS protocol | |
CN112866255A (en) | Block chain-based data transmission quality verification method, system, device and medium | |
WO2020173019A1 (en) | Access certificate verification method and device, computer equipment and storage medium | |
CN111311258B (en) | Block chain-based trusted transaction method, device, system, equipment and medium | |
US20210182848A1 (en) | Identification and authorization of transactions via smart contracts | |
CN111340483A (en) | Data management method based on block chain and related equipment | |
CN111988262B (en) | Authentication method, authentication device, server and storage medium | |
CN113779536A (en) | User access method, system, electronic device and medium | |
CN111143788B (en) | License processing method, electronic device, and storage medium | |
CN110399706B (en) | Authorization authentication method, device and computer system | |
CN110381114B (en) | Interface request parameter processing method and device, terminal equipment and medium | |
CN111030816A (en) | Authentication method and device for access platform of evidence obtaining equipment and storage medium | |
US20200028689A1 (en) | Location-based and time-based photo authentication | |
CN114861144A (en) | Data authority processing method based on block chain | |
US20220100485A1 (en) | Applet package sending method and device, electronic apparatus, and computer readable medium | |
CN115935379A (en) | Service processing method, device, equipment and computer readable storage medium | |
CN114640491A (en) | Communication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210528 |