CN114124418A - Data processing method, device and system based on block chain and electronic equipment - Google Patents

Data processing method, device and system based on block chain and electronic equipment Download PDF

Info

Publication number
CN114124418A
CN114124418A CN202010879967.7A CN202010879967A CN114124418A CN 114124418 A CN114124418 A CN 114124418A CN 202010879967 A CN202010879967 A CN 202010879967A CN 114124418 A CN114124418 A CN 114124418A
Authority
CN
China
Prior art keywords
data
authentication
identity
data sender
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010879967.7A
Other languages
Chinese (zh)
Other versions
CN114124418B (en
Inventor
叶紫光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Henan Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Henan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Henan Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010879967.7A priority Critical patent/CN114124418B/en
Publication of CN114124418A publication Critical patent/CN114124418A/en
Application granted granted Critical
Publication of CN114124418B publication Critical patent/CN114124418B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The embodiment of the invention discloses a data processing method, a device and a system based on a block chain and electronic equipment, wherein the method comprises the following steps: when a sending instruction of a data sender to target data is received, acquiring authentication information for performing identity authentication on the data sender, wherein the authentication information comprises an identifier of the data sender, safety verification information and preset check information; sending authentication information for authenticating the identity of the data sender to a preset identity authenticator so that the identity authenticator authenticates the identity of the data sender based on the authentication information; and receiving an authentication result of the identity authentication of the data sending party, which is sent by the identity authentication party, and if the authentication result is that the authentication is passed, sending the target data to a data receiving party corresponding to the sending instruction. By the processing method, the safety of target data transmission can be improved.

Description

Data processing method, device and system based on block chain and electronic equipment
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a data processing method, apparatus, system and electronic device based on a block chain.
Background
With the rapid development of computer technology, terminal devices become necessities of life and work of people, and users can transmit data through the terminal devices, so that how to ensure the security of data transmission becomes the focus of attention of users.
At present, a Certificate Authority (CA) certificate may be issued to a terminal device by a certificate Authority, when data transmission is performed, a data sending party may send a local CA certificate and data to be transmitted to a data receiving party together, and the data receiving party may perform identity authentication on the data sending party according to the received CA certificate to confirm authenticity of the received data.
However, since the CA certificate is static and unchangeable, there is a security risk that an attacker may eavesdrop, scan or infiltrate for a long time, and thus, when performing the identity authentication and data transmission in the above manner, there are problems of poor accuracy of the identity authentication and poor security of the data transmission.
Disclosure of Invention
The embodiment of the invention aims to provide a data processing method based on a block chain, so as to solve the problems of poor identity authentication accuracy and poor data transmission safety during data transmission in the prior art.
To solve the above technical problem, the embodiment of the present invention is implemented as follows:
in a first aspect, a method for processing data based on a block chain according to an embodiment of the present invention is applied to a data sending side, and includes:
when a sending instruction of a data sender to target data is received, acquiring authentication information for performing identity authentication on the data sender, wherein the authentication information comprises an identifier of the data sender, safety verification information and preset check information, and the safety verification information is determined based on historical networking state data of the data sender stored in a preset block chain;
sending authentication information for authenticating the identity of the data sender to a preset identity authenticator so that the identity authenticator authenticates the identity of the data sender based on the authentication information;
and receiving an authentication result of the identity authentication of the data sending party, which is sent by the identity authentication party, and if the authentication result is that the authentication is passed, sending the target data to a data receiving party corresponding to the sending instruction.
In a second aspect, an embodiment of the present invention provides a data processing method based on a block chain, where the method is applied to a server, and includes:
after receiving an identifier of a data sender, acquiring a target block corresponding to the data sender from a preset block chain based on the identifier, wherein the target block stores historical networking state data of the data sender;
and determining safety verification information and preset verification information corresponding to the data sender based on historical networking state data stored in the target block, and sending the safety verification information and the preset verification information to the data sender so that the data sender sends authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of target data, wherein the authentication information comprises an identifier of the data sender, the safety verification information and the preset verification information.
In a third aspect, an embodiment of the present invention provides a data processing system based on a block chain, where the system includes: data sender equipment, identity authentication side equipment, data receiver and server, wherein:
the data sender equipment is used for sending the identifier of the data sender equipment to the server when receiving a sending instruction of the data sender to target data;
the server is used for acquiring a target block corresponding to the identifier of the data sender equipment from a preset block chain, and determining safety verification information and preset check information corresponding to the data sender equipment based on historical networking state data stored in the target block; sending the security verification information and preset verification information to the data sender equipment;
the data sender equipment is used for sending authentication information for authenticating the identity of the data sender equipment to the identity authenticator equipment, wherein the authentication information comprises an identifier of the data sender equipment, the safety verification information and preset verification information;
the identity authenticator device is used for sending the identifier of the data sender device to the server and receiving first safety verification information and first verification information which are sent by the server and correspond to the data sender device after the identity authentication of the data sender device is passed; performing identity authentication on the data sender equipment based on the first safety verification information, the first verification information and the authentication information, and sending an authentication result to the data sender equipment;
and the data sender equipment is used for receiving an authentication result of the identity authentication of the data sender equipment, which is sent by the identity authenticator equipment, and sending the target data to the data receiver equipment corresponding to the sending instruction if the authentication result is that the authentication is passed.
In a fourth aspect, an embodiment of the present invention provides a data processing apparatus based on a block chain, where the apparatus includes:
the data acquisition module is used for acquiring authentication information for authenticating the identity of the data sender when a sending instruction of the data sender to target data is received, wherein the authentication information comprises an identifier of the data sender, safety verification information and preset check information, and the safety verification information is determined based on historical networking state data of the data sender stored in a preset block chain;
the data sending module is used for sending authentication information for authenticating the identity of the data sending party to a preset identity authenticator so that the identity authenticator authenticates the identity of the data sending party based on the authentication information;
and the data receiving module is used for receiving an authentication result which is sent by the identity authenticator and used for authenticating the identity of the data sender, and if the authentication result is that the authentication is passed, the target data is sent to the data receiver corresponding to the sending instruction.
In a fifth aspect, an embodiment of the present invention provides a data processing apparatus based on a block chain, where the apparatus includes:
the block acquisition module is used for acquiring a target block corresponding to a data sender from a preset block chain based on an identification of the data sender after receiving the identification, wherein the target block stores historical networking state data of the data sender;
and the data sending module is used for determining safety verification information and preset check information corresponding to the data sender based on the historical networking state data stored in the target block, and sending the safety verification information and the preset check information to the data sender so that the data sender sends authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of target data, wherein the authentication information comprises an identifier of the data sender, the safety verification information and the preset check information.
In a sixth aspect, an embodiment of the present invention provides an electronic device, which includes a processor, a memory, and a computer program stored on the memory and executable on the processor, and when the computer program is executed by the processor, the steps of the block chain-based data processing method provided in the foregoing embodiments are implemented.
In a seventh aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the steps of the data processing method based on a blockchain provided in the foregoing embodiment.
As can be seen from the above technical solutions provided by the embodiments of the present invention, when a sending instruction of a data sender for target data is received, authentication information for performing identity authentication on the data sender is obtained, where the authentication information includes an identifier of the data sender, security verification information and preset verification information, the security verification information is determined based on historical networking state data of the data sender stored in a preset block chain, and the authentication information for performing identity authentication on the data sender is sent to a predetermined identity authenticator, so that the identity authenticator performs identity authentication on the data sender based on the authentication information, receives an authentication result for performing identity authentication on the data sender sent by the identity authenticator, and if the authentication result is that authentication is passed, sends the target data to a data receiver corresponding to the sending instruction. Therefore, the safety verification information is determined based on the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, the target data is sent to the data receiver after the data sender passes the identity authentication, and the safety of target data transmission can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic flow chart of a data processing method based on a block chain according to the present invention;
FIG. 2 is a flow chart of another data processing method based on block chains according to the present invention;
FIG. 3 is a flow chart of another data processing method based on block chains according to the present invention;
FIG. 4 is a flow chart illustrating another data processing method based on block chains according to the present invention;
FIG. 5 is a block chain-based data processing apparatus according to the present invention;
FIG. 6 is a schematic diagram of another block chain-based data processing apparatus according to the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to the present invention.
Detailed Description
The embodiment of the invention provides a data processing method, a device and a system based on a block chain and electronic equipment.
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
As shown in fig. 1, an execution main body of the method may be a device used by a data sender, where the device may be a terminal device or a server, the device may be a mobile terminal device used by the data sender, such as a mobile phone and a tablet computer, or a device such as a computer, and the server may be an independent server or a server cluster composed of multiple servers. The method may specifically comprise the steps of:
in S102, when a transmission instruction of the data sender to the target data is received, authentication information for authenticating the identity of the data sender is acquired.
The target data may be any data that can be sent, for example, the target data may be text data, picture data, audio data, and the like, the authentication information may include an identifier of a data sender, security verification information, and preset check information, the identifier of the data sender may be any identifier that can identify the identity of the data sender, for example, the identifier of the data sender may be user information of the data sender, device information of a terminal device used by the data sender, and the like, the security verification information may be determined based on historical networking state data of the data sender stored in a preset block chain, the historical networking state data may be historical networking state data of the data sender device within a preset time period (e.g., network identifier of an access network, access time of each networking, termination time, traffic data generated by networking, and the like), and the preset check information may be any information that can be used for authenticating the identity of the data sender And (4) information.
In implementation, with the rapid development of computer technology, terminal devices become necessities of life and work of people, and users can transmit data through the terminal devices, so how to ensure the security of data transmission becomes the focus of attention of users. At present, a CA certificate (verification Authority) may be issued to a terminal device by a certificate Authority, when data transmission is performed, a data sending party may send a local CA certificate and data to be transmitted to a data receiving party together, and the data receiving party may perform identity authentication on the data sending party according to the received CA certificate to confirm authenticity of the received data.
However, since the CA certificate is static and unchangeable, there is a security risk that an attacker may eavesdrop, scan or infiltrate for a long time, and thus, when performing the identity authentication and data transmission in the above manner, there are problems of poor accuracy of the identity authentication and poor security of the data transmission. Therefore, the embodiments of the present disclosure provide a technical solution that can solve the above problems, and refer to the following specifically.
For example, the user 1 may send the picture data to the user 2 through an instant messaging application installed in the terminal device, at this time, the user 1 is a data sender, and when the terminal device used by the user 1 detects a sending instruction of the user 1 to the picture data (i.e., target data), the data sender device may obtain the authentication information.
The identifier of the data sender may be an identity (such as a communication account, a user name, etc.) when the user 1 performs user registration in the instant messaging application, or an identity allocated to the user 1 by the instant messaging application when the user 1 performs user registration in the instant messaging application.
When detecting a sending instruction of the data sender to the target data, the data sender device may obtain pre-stored security verification information, or the data sender device may obtain historical networking state data of the data sender from a preset block chain, and determine the security verification information according to the obtained historical networking state data. For example, an average value of traffic data generated by a data sender in historical networking state data each time during networking may be used as the security verification information, and the determination method of the security verification information may be different according to different actual application scenarios, which is not specifically limited in the embodiments of the present specification.
The preset check information may be check information generated for a data sender, a sending instruction of the data sender, or target data, for example, the preset check information may be a random decimal generated for the data sender, or may be check information obtained by processing the target data based on a preset check algorithm (e.g., a preset hash algorithm). The preset check information may be generated in various ways, which may be different according to different actual application scenarios, and this is not specifically limited in this description embodiment.
In S104, the authentication information for authenticating the identity of the data sender is sent to a predetermined identity authenticator, so that the identity authenticator authenticates the identity of the data sender based on the authentication information.
The identity authenticator may be in the same local area network as the data sender, may be in a different local area network from the data sender, or may be a preset block node in a preset block chain.
In implementation, the identity authenticator may perform identity authentication on the data sender after receiving the authentication information, for example, the identity authenticator acquires historical networking state data of the data sender from a preset block chain according to an identifier of the data sender in the authentication information, determines corresponding security verification information according to the acquired historical networking state data, and performs identity authentication on the data sender after passing through the determined security verification information and the security verification information in the authentication information.
In addition, assuming that the preset verification information in the authentication information is verification information obtained by processing the security authentication information based on a preset verification algorithm, the identity authentication party may process the determined security verification information based on the preset verification algorithm to obtain first verification information, and perform identity authentication on the data sending party according to the first verification information and the preset verification information in the authentication information.
The method for authenticating the identity of the data sender based on the authentication information is an optional and realizable authentication method, and in an actual application scenario, there may be a plurality of different authentication methods, which may be different according to different actual application scenarios, and this is not specifically limited in the embodiments of the present specification.
And in S106, receiving an authentication result of the identity authentication of the data sending party, which is sent by the identity authentication party, and if the authentication result is that the authentication is passed, sending the target data to the data receiving party corresponding to the sending instruction.
In the implementation, a plurality of identity authentication parties can be provided, and when the authentication result sent by each identity authentication party is that the authentication is passed, the target data can be sent to the data receiving party corresponding to the sending instruction, so that the accuracy of identity authentication is improved, and the transmission safety of the target data is ensured.
The embodiment of the invention provides a data processing method based on a block chain, which comprises the steps of acquiring authentication information for performing identity authentication on a data sender when a sending instruction of the data sender for target data is received, wherein the authentication information comprises an identifier of the data sender, safety authentication information and preset check information, the safety authentication information is determined based on historical networking state data of the data sender stored in the preset block chain, the authentication information for performing the identity authentication on the data sender is sent to a preset identity authenticator, so that the identity authenticator performs the identity authentication on the data sender based on the authentication information, receives an authentication result for performing the identity authentication on the data sender sent by the identity authenticator, and if the authentication result is that the authentication is passed, the target data is sent to a data receiver corresponding to the sending instruction. Therefore, the safety verification information is determined based on the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, the target data is sent to the data receiver after the data sender passes the identity authentication, and the safety of target data transmission can be improved.
Example two
As shown in fig. 2, an execution main body of the method may be a device used by a data sender, where the device may be a terminal device or a server, the device may be a mobile terminal device used by the data sender, such as a mobile phone and a tablet computer, or a device such as a computer, and the server may be an independent server or a server cluster composed of multiple servers. The method may specifically comprise the steps of:
in S202, when a transmission instruction of the data sender to the target data is received, the identifier of the data sender is sent to the server, and the security verification information sent by the server is received.
Wherein the security verification information can be determined by the server based on historical networking state data of the data sender stored in the preset block chain
In implementation, the identifier of the data sender may be a user ID of the data sender when the data sender registers in the local area network, and the server may obtain historical networking state data of the data sender from a preset block chain according to the user ID, determine corresponding security verification information according to the obtained historical networking state data, and send the security verification information to the data sender.
After receiving the security verification information sent by the server, the authentication information may be sent to the identity authenticator, so that the identity authenticator performs identity authentication on the data sender, which may be specifically described in S204 or S206 to S208 described below.
In S204, the identifier of the identity authenticator is pulled from the server, and the authentication information for authenticating the identity of the data sender is sent to the predetermined identity authenticator based on the pulled identifier.
In implementation, the server may store the identifier of the identity authenticator in advance, pull the identifier of the identity authenticator from the server, and then send the authentication information to the predetermined identity authenticator based on the pulled identifier.
In S206, an information acquisition request for the identity authenticator is sent to the server.
The information acquisition request may include information such as an identifier of a data sender, a data type of target data to be sent, and a data security level.
In S208, the identifier of the identity authenticator sent by the server is received, and based on the received identifier, the authentication information for authenticating the identity of the data sender is sent to a predetermined identity authenticator.
In implementation, the server may determine a corresponding identity authenticator according to the information acquisition request, and then the server may send an identifier of the identity authenticator to the data sender, and the data sender sends authentication information for authenticating the identity of the data sender to a predetermined identity authenticator based on the received identifier.
For example, the server may determine, according to a preset correspondence between pre-stored data security levels and identity authenticators, an identity authenticator corresponding to the data security level of the target data in the information acquisition request, and then send an identifier of the determined identity authenticator to the data sender.
After sending the authentication information to the identity authenticator, S210 may be continuously executed, i.e., after S204 or S208, S210 may be continuously executed.
In S210, an authentication result of authenticating the identity of the data sending party sent by the identity authenticator is received, and if the authentication result is that the authentication is passed, the target data is sent to the data receiving party corresponding to the sending instruction.
For the specific processing procedure of S210, reference may be made to relevant contents of S106 in the first embodiment, which is not described herein again.
The embodiment of the invention provides a data processing method based on a block chain, which comprises the steps of acquiring authentication information for performing identity authentication on a data sender when a sending instruction of the data sender for target data is received, wherein the authentication information comprises an identifier of the data sender, safety authentication information and preset check information, the safety authentication information is determined based on historical networking state data of the data sender stored in the preset block chain, the authentication information for performing the identity authentication on the data sender is sent to a preset identity authenticator, so that the identity authenticator performs the identity authentication on the data sender based on the authentication information, receives an authentication result for performing the identity authentication on the data sender sent by the identity authenticator, and if the authentication result is that the authentication is passed, the target data is sent to a data receiver corresponding to the sending instruction. Therefore, the safety verification information is determined based on the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, the target data is sent to the data receiver after the data sender passes the identity authentication, and the safety of target data transmission can be improved.
EXAMPLE III
As shown in fig. 3, an embodiment of the present invention provides a data processing method based on a block chain, where an execution main body of the method may be a server, and the server may be an independent server or a server cluster composed of multiple servers. The method may specifically comprise the steps of:
in S302, after receiving the identifier of the data sender, a target block corresponding to the data sender is obtained from a preset block chain based on the identifier.
The target block can store historical networking state data of the data sender.
In implementation, when the data sender registers in the local area network, the local area network sends the user ID of the data sender and the registration time to the server. The server can establish a target block with the user ID as the unique identification for the data sending party in the preset block chain, and when the data sending party exits the local area network, the data sending party sends the initial time of the local area network connection, the termination time of the local area network connection and the flow data to the server.
In addition, the data sending party can also send the last data sending time of the local area network connection, the data sending time of the time and the flow data of the stage to the server based on the preset sending time. Meanwhile, when the data sender exits from the local area network, the data sender can send the last data sending time of the current connection to the local area network, the current data sending time and the flow data at the current stage to the server. The server can establish a new target block in the block chain, and the target block can record the initial time of the data sender connecting to the local area network this time, the termination time of the connecting to the local area network this time and the flow data generated this time.
After receiving the data transmission time of the last time, the data transmission time of this time and the flow data of this stage, the server may search for a corresponding target block in the block chain and add the data received this time to the target block. By continuous updating, the block chain can record the access time, termination time and all flow data of the data sender connected with the local area network. That is, the target block can store the access time and the termination time of each networking of the data sender and the traffic data generated by each networking.
In S304, based on the historical networking state data stored in the target block, security verification information and preset check information corresponding to the data sender are determined, and the security verification information and the preset check information are sent to the data sender, so that the data sender sends authentication information to a predetermined identity authenticator for identity authentication when receiving a sending instruction for the target data.
The authentication information may include an identifier of the data sender, security verification information, and preset verification information.
The embodiment of the invention provides a data processing method based on a block chain, which comprises the steps of obtaining a target block corresponding to a data sending party from a preset block chain based on an identification after receiving the identification of the data sending party, wherein the target block stores historical networking state data of the data sending party, determining safety verification information and preset check information corresponding to the data sending party based on the historical networking state data stored in the target block, and sending the safety verification information and the preset check information to the data sending party, so that the data sending party sends the authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of the target data, and the authentication information comprises the identification of the data sending party, the safety verification information and the preset check information. Therefore, the safety verification information is determined by the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, and the safety of data transmission can be improved.
Example four
As shown in fig. 4, an embodiment of the present invention provides a data processing method based on a block chain, where an execution main body of the method may be a server, and the server may be an independent server or a server cluster composed of multiple servers. The method may specifically comprise the steps of:
in S402, after receiving the identifier of the data sender, a target block corresponding to the data sender is obtained from a preset block chain based on the identifier.
For the specific processing procedure of S402, reference may be made to the relevant content of S302 in the third embodiment, which is not described herein again.
In S404, the access time and the termination time of each networking of the data sender stored in each target block and the traffic data generated by each networking of the data sender stored in each target block are obtained.
In S406, security authentication information corresponding to the data transmission side is generated based on the access time, the termination time, and the traffic data of each target block.
In implementation, the time difference between the access time and the termination time of each networking can be obtained, the maximum value and the minimum value in the traffic data generated by each networking can be obtained, the ratio of the difference value of the maximum value and the minimum value to the minimum value can be obtained, and then the following formula is used for obtaining the ratio
Figure BDA0002653817270000111
Determining safety verification information, wherein A is the safety verification information, i is the ith networking of a data sender, n is the total networking times of the data sender, and TiTime difference between access time and termination time for ith networking of data sender, DiThe ratio of the difference between the maximum and minimum values in the flow data generated for the ith networking to the minimum value, (D)i)maxIs the maximum value of the ratio of n number of networks.
In S408, the security authentication information and the preset check information are transmitted to the data transmitting side.
The embodiment of the invention provides a data processing method based on a block chain, which comprises the steps of obtaining a target block corresponding to a data sending party from a preset block chain based on an identification after receiving the identification of the data sending party, wherein the target block stores historical networking state data of the data sending party, determining safety verification information and preset check information corresponding to the data sending party based on the historical networking state data stored in the target block, and sending the safety verification information and the preset check information to the data sending party, so that the data sending party sends the authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of the target data, and the authentication information comprises the identification of the data sending party, the safety verification information and the preset check information. Therefore, the safety verification information is determined by the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, and the safety of data transmission can be improved.
EXAMPLE five
The embodiment of the invention provides a data processing system based on a block chain, which comprises: data sender equipment, identity authentication side equipment, data receiver and server, wherein:
the data sender device, the identity authenticator device, the data receiver and the server can be in the same local area network, and any two terminal devices in the local area network can communicate with each other, namely, all the terminal devices are connected.
In practical application, the local area network may be a vehicle networking, at this time, a vehicle terminal device is installed in each vehicle of the vehicle networking, the vehicle terminal devices (i.e., a data sender device, an identity authenticator device or a data receiver) may communicate with each other based on the vehicle networking, and the vehicle networking may also communicate with the server. The local area network may also be an internet of things, the terminal devices (i.e., the data sender device, the identity authenticator device, or the data receiver) may communicate with each other based on the internet of things, and the internet of things may also communicate with the server. The communication mode between the terminal device and the server in the local area network may be: each terminal device can be independently connected with the security server, or one terminal device can be selected from the local area network as the only connection end of the local area network and the security management server (namely, a message transfer station, which only transfers interactive messages), so that the connection between all the terminal devices in the local area network and the security management server is realized.
And the data sender device can be used for sending the identification of the data sender device to the server when receiving a sending instruction of the data sender to the target data.
The server may be configured to acquire a target block corresponding to the identifier of the data sender device from the preset block chain, and determine security verification information and preset check information corresponding to the data sender device based on historical networking state data stored in the target block. And sending the safety verification information and the preset verification information to the data sender equipment.
The data sender device may be configured to send authentication information for authenticating an identity of the data sender device to the identity authenticator device, where the authentication information may include an identifier of the data sender device, security verification information, and preset verification information.
The identity authenticator device may be configured to send the identifier of the data sender device to the server, and receive first security verification information and first verification information that are sent by the server and correspond to the data sender device after the identity authentication of the data sender device by the server is passed. The identity authentication may be performed on the data sender device based on the first security verification information, the first verification information, and the authentication result may be sent to the data sender device.
The data sender device may be configured to receive an authentication result, sent by the identity authenticator device, of performing identity authentication on the data sender device, and send the target data to the data receiver device corresponding to the sending instruction if the authentication result is that the authentication is passed. For example, the data sender device may send the user ID of the data sender (i.e., the identification of the data sender) to the server upon receiving a transmission instruction of the target data from the data sender.
After receiving the user ID, the server may obtain a corresponding target block from the preset block chain, determine corresponding security verification information according to historical networking state data stored in the target block, randomly generate a random decimal as preset verification information, and send the security verification information and the random decimal to the data sender device.
In addition, the server may determine the number of the identity authentication devices according to the security verification information and the random decimal, for example, the number of the identity authentication devices may be a product of the number of all the terminal devices in the local area network and the security verification information and a ceiling value of the random decimal, where the ceiling value of the random decimal may be a minimum integer value greater than the random decimal, and for example, if the random decimal is 1.2, the ceiling value of the random decimal is 2.
The server can randomly select a corresponding number of terminal devices from the terminal devices included in the local area network as the identity authentication devices according to the determined number of the identity authentication devices, and send the identification of the identity authentication devices to the data sender device.
The data sender equipment can send the authentication information to the corresponding identity authentication equipment according to the received identity of the identity authentication equipment.
After receiving the authentication information, the identity authentication device may first perform local identification comparison, and if the comparison is successful, receive the authentication information, and perform identity authentication on the data sender device based on the authentication information. The authentication device may send an identification of the sender of the data (e.g., a user ID and password of the sender of the data) to the server.
The server may authenticate the data sender based on the received user ID and the password of the data sender, and if the authentication is passed, may send the locally stored security verification information (i.e., the first security verification information) of the data sender and the number of the authentication devices (i.e., the first verification information) to the authentication device.
The identity authentication device may determine a verification value based on the first security verification information sent by the server, the random decimal (i.e., preset verification information) in the authentication information, and the number of all terminal devices in the local area network, perform identity authentication on the data sender according to the verification value and the number of the identity authentication devices (i.e., first verification information), and send an identity authentication result to the data sender device.
Under the condition that the authentication results sent by all the identity authenticator devices are authenticated, the data sender device can encrypt the target data based on a preset encryption algorithm and send the encrypted target data to the data receiver device so as to ensure the security of target data transmission.
The embodiment of the invention provides a data processing system based on a block chain, and because safety verification information is determined based on historical networking state data of a data sender stored in the block chain, the safety verification information has authenticity and dynamics, the difficulty of attack can be improved, namely the accuracy of identity verification of the data sender can be improved, after the identity authentication of the data sender is passed, target data is sent to a data receiver, and the safety of target data transmission can be improved.
EXAMPLE six
Based on the same idea, the above data processing method based on the block chain according to the embodiment of the present invention further provides a data processing apparatus based on the block chain, as shown in fig. 5.
The data processing apparatus includes: a data acquisition module 501, a data transmission determination module 502 and a data receiving module 503, wherein:
a data obtaining module 501, configured to obtain authentication information for performing identity authentication on a data sender when a sending instruction of the data sender for target data is received, where the authentication information includes an identifier of the data sender, security verification information, and preset verification information, and the security verification information is determined based on historical networking state data of the data sender stored in a preset block chain;
a data sending module 502, configured to send authentication information for authenticating the identity of the data sender to a predetermined identity authenticator, so that the identity authenticator performs identity authentication on the data sender based on the authentication information;
a data receiving module 503, configured to receive an authentication result that is sent by the identity authenticator and used for performing identity authentication on the data sending party, and if the authentication result is that authentication is passed, send the target data to a data receiving party corresponding to the sending instruction.
In this embodiment of the present invention, the data sending module 502 is configured to: pulling the identification of the identity authenticator from the server, and sending authentication information for authenticating the identity of the data sender to a preset identity authenticator based on the pulled identification; or; sending an information acquisition request aiming at the identity authentication party to a server; and receiving the identification of the identity authentication party sent by the server, and sending authentication information for performing identity authentication on the data sending party to a preset identity authentication party based on the received identification.
In this embodiment of the present invention, the data obtaining module 501 is configured to: when a sending instruction of the data sender to target data is received, sending the identification of the data sender to a server, and receiving safety verification information sent by the server, wherein the safety verification information is determined by the server based on historical networking state data of the data sender stored in the preset block chain.
The embodiment of the invention provides a data processing device based on a block chain, which is characterized in that when a sending instruction of a data sending party to target data is received, authentication information for performing identity authentication on the data sending party is obtained, the authentication information comprises an identification of the data sending party, safety verification information and preset check information, the safety verification information is determined based on historical networking state data of the data sending party stored in the preset block chain, the authentication information for performing identity authentication on the data sending party is sent to a preset identity authentication party, so that the identity authentication party performs identity authentication on the data sending party based on the authentication information, receives an authentication result for performing identity authentication on the data sending party sent by the identity authentication party, and if the authentication result is that the authentication is passed, the target data is sent to a data receiving party corresponding to the sending instruction. Therefore, the safety verification information is determined based on the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, the target data is sent to the data receiver after the data sender passes the identity authentication, and the safety of target data transmission can be improved.
EXAMPLE seven
Based on the same idea, the above data processing method based on the block chain according to the embodiment of the present invention further provides a data processing apparatus based on the block chain, as shown in fig. 6.
The data processing apparatus includes: a block obtaining module 601 and a data sending module 602, wherein:
the block acquisition module 601 is configured to, after receiving an identifier of a data sender, acquire a target block corresponding to the data sender from a preset block chain based on the identifier, where the target block stores historical networking state data of the data sender;
a data sending module 602, configured to determine, based on the historical networking state data stored in the target block, security verification information and preset check information corresponding to the data sender, and send the security verification information and the preset check information to the data sender, so that when the data sender receives a sending instruction for target data, the data sender sends authentication information to a predetermined identity authenticator for identity authentication, where the authentication information includes an identifier of the data sender, the security verification information, and the preset check information.
In this embodiment of the present invention, the data sending module 602 is configured to: acquiring the access time and the termination time of each networking of the data sender stored in each target block and the traffic data generated by each networking of the data sender stored in each target block; and generating security verification information corresponding to the data sender based on the access time, the termination time and the traffic data of each target block.
The embodiment of the invention provides a data processing device based on a block chain, which is characterized in that after an identification of a data sending party is received, a target block corresponding to the data sending party is obtained from a preset block chain based on the identification, historical networking state data of the data sending party is stored in the target block, safety verification information and preset check information corresponding to the data sending party are determined based on the historical networking state data stored in the target block, the safety verification information and the preset check information are sent to the data sending party, so that the data sending party sends the authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of the target data, and the authentication information comprises the identification of the data sending party, the safety verification information and the preset check information. Therefore, the safety verification information is determined by the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, and the safety of data transmission can be improved.
Example eight
Figure 7 is a schematic diagram of a hardware configuration of an electronic device implementing various embodiments of the invention,
the electronic device 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710, a power supply 711, and the like. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 7 does not constitute a limitation of the electronic device, and that the electronic device may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the electronic device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 710 is configured to, when receiving a sending instruction of a data sender for target data, obtain authentication information for performing identity authentication on the data sender, where the authentication information includes an identifier of the data sender, security verification information, and preset verification information, and the security verification information is determined based on historical networking state data of the data sender stored in a preset block chain; sending authentication information for authenticating the identity of the data sender to a preset identity authenticator so that the identity authenticator authenticates the identity of the data sender based on the authentication information; and receiving an authentication result of the identity authentication of the data sending party, which is sent by the identity authentication party, and if the authentication result is that the authentication is passed, sending the target data to a data receiving party corresponding to the sending instruction.
The processor 710 is further configured to pull the identifier of the identity authenticator from the server, and send authentication information for authenticating the identity of the data sender to a predetermined identity authenticator based on the pulled identifier; or; sending an information acquisition request aiming at the identity authentication party to a server; and receiving the identification of the identity authentication party sent by the server, and sending authentication information for performing identity authentication on the data sending party to a preset identity authentication party based on the received identification.
In addition, the processor 710 is further configured to, when receiving a sending instruction of the data sender for target data, send an identifier of the data sender to a server, and receive security verification information sent by the server, where the security verification information is determined by the server based on historical networking state data of the data sender stored in the preset block chain.
Or, the processor 710 is further configured to, after receiving an identifier of a data sender, obtain, based on the identifier, a target block corresponding to the data sender from a preset block chain, where the target block stores historical networking state data of the data sender; and determining safety verification information and preset verification information corresponding to the data sender based on historical networking state data stored in the target block, and sending the safety verification information and the preset verification information to the data sender so that the data sender sends authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of target data, wherein the authentication information comprises an identifier of the data sender, the safety verification information and the preset verification information.
In addition, the processor 710 is further configured to obtain an access time and a termination time of each networking of the data sender stored in each target block, and traffic data generated by each networking of the data sender stored in each target block; and generating security verification information corresponding to the data sender based on the access time, the termination time and the traffic data of each target block.
The embodiment of the invention provides electronic equipment, which is characterized in that when a sending instruction of a data sender for target data is received, authentication information for performing identity authentication on the data sender is obtained, the authentication information comprises an identification of the data sender, safety authentication information and preset check information, the safety authentication information is determined based on historical networking state data of the data sender stored in a preset block chain, the authentication information for performing identity authentication on the data sender is sent to a preset identity authenticator, so that the identity authenticator performs identity authentication on the data sender based on the authentication information, receives an authentication result for performing identity authentication on the data sender sent by the identity authenticator, and if the authentication result is that the authentication is passed, the target data is sent to a data receiver corresponding to the sending instruction. Therefore, the safety verification information is determined based on the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, the target data is sent to the data receiver after the data sender passes the identity authentication, and the safety of target data transmission can be improved.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 701 may be used for receiving and sending signals during a message transmission and reception process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 710; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 701 can also communicate with a network and other electronic devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user via the network module 702, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 703 may convert audio data received by the radio frequency unit 701 or the network module 702 or stored in the memory 709 into an audio signal and output as sound. Also, the audio output unit 703 may also provide audio output related to a specific function performed by the electronic apparatus 700 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 703 includes a speaker, a buzzer, a receiver, and the like.
The input unit 704 is used to receive audio or video signals. The input Unit 704 may include a Graphics Processing Unit (GPU) 7041 and a microphone 7042, and the Graphics processor 7041 processes image data of a still picture or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 706. The image frames processed by the graphic processor 7041 may be stored in the memory 709 (or other storage medium) or transmitted via the radio unit 701 or the network module 702. The microphone 7042 may receive sounds and may be capable of processing such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 701 in case of a phone call mode.
The electronic device 700 also includes at least one sensor 705, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 7061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 7061 and/or a backlight when the electronic device 700 is moved to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of an electronic device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 705 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 706 is used to display information input by the user or information provided to the user. The Display unit 706 may include a Display panel 7061, and the Display panel 7061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 707 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device. Specifically, the user input unit 707 includes a touch panel 7071 and other input devices 7072. The touch panel 7071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 7071 (e.g., operations by a user on or near the touch panel 7071 using a finger, a stylus, or any other suitable object or attachment). The touch panel 7071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 710, receives a command from the processor 710, and executes the command. In addition, the touch panel 7071 can be implemented by various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 707 may include other input devices 7072 in addition to the touch panel 7071. In particular, the other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 7071 may be overlaid on the display panel 7061, and when the touch panel 7071 detects a touch operation on or near the touch panel 7071, the touch operation is transmitted to the processor 710 to determine the type of the touch event, and then the processor 710 provides a corresponding visual output on the display panel 7061 according to the type of the touch event. Although the touch panel 7071 and the display panel 7061 are shown in fig. 7 as two separate components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 7071 and the display panel 7061 may be integrated to implement the input and output functions of the electronic device, which is not limited herein.
The interface unit 708 is an interface for connecting an external device to the electronic apparatus 700. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 708 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the electronic apparatus 700 or may be used to transmit data between the electronic apparatus 700 and the external device.
The memory 709 may be used to store software programs as well as various data. The memory 709 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 709 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 710 is a control center of the electronic device, connects various parts of the whole electronic device by using various interfaces and lines, performs various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory 709 and calling data stored in the memory 709, thereby monitoring the whole electronic device. Processor 710 may include one or more processing units; preferably, the processor 710 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 710.
The electronic device 700 may also include a power supply 711 (e.g., a battery) for providing power to the various components, and preferably, the power supply 711 may be logically coupled to the processor 710 via a power management system, such that functions of managing charging, discharging, and power consumption may be performed via the power management system.
Preferably, an embodiment of the present invention further provides an electronic device, which includes a processor 710, a memory 709, and a computer program stored in the memory 709 and capable of running on the processor 710, where the computer program is executed by the processor 510 to implement each process of the above data processing method embodiment based on the blockchain, and can achieve the same technical effect, and in order to avoid repetition, the details are not described here again.
Example nine
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above data processing method embodiment based on a block chain, and can achieve the same technical effect, and is not described herein again to avoid repetition. The computer-readable storage medium may be a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
The embodiment of the invention provides a computer-readable storage medium, which is characterized in that when a sending instruction of a data sender for target data is received, authentication information for performing identity authentication on the data sender is obtained, wherein the authentication information comprises an identification of the data sender, safety authentication information and preset check information, the safety authentication information is determined based on historical networking state data of the data sender stored in a preset block chain, the authentication information for performing identity authentication on the data sender is sent to a preset identity authenticator, so that the identity authenticator performs identity authentication on the data sender based on the authentication information, receives an authentication result for performing identity authentication on the data sender sent by the identity authenticator, and if the authentication result is that authentication is passed, the target data is sent to a data receiver corresponding to the sending instruction. Therefore, the safety verification information is determined based on the historical networking state data of the data sender stored in the block chain, so that the safety verification information has authenticity and dynamics, the attack difficulty can be improved, the accuracy of identity verification of the data sender can be improved, the target data is sent to the data receiver after the data sender passes the identity authentication, and the safety of target data transmission can be improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transient media) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present invention, and is not intended to limit the present invention. Various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the scope of the claims of the present invention.

Claims (10)

1. A data processing method based on block chain is applied to a data sender and comprises the following steps:
when a sending instruction of a data sender to target data is received, acquiring authentication information for performing identity authentication on the data sender, wherein the authentication information comprises an identifier of the data sender, safety verification information and preset check information, and the safety verification information is determined based on historical networking state data of the data sender stored in a preset block chain;
sending authentication information for authenticating the identity of the data sender to a preset identity authenticator so that the identity authenticator authenticates the identity of the data sender based on the authentication information;
and receiving an authentication result of the identity authentication of the data sending party, which is sent by the identity authentication party, and if the authentication result is that the authentication is passed, sending the target data to a data receiving party corresponding to the sending instruction.
2. The method according to claim 1, wherein the sending authentication information for authenticating the data sender to a predetermined identity authenticator comprises:
pulling the identification of the identity authenticator from the server, and sending authentication information for authenticating the identity of the data sender to a preset identity authenticator based on the pulled identification; or;
sending an information acquisition request aiming at the identity authentication party to a server;
and receiving the identification of the identity authentication party sent by the server, and sending authentication information for performing identity authentication on the data sending party to a preset identity authentication party based on the received identification.
3. The method according to claim 1, wherein the obtaining authentication information for authenticating the identity of the data sender when receiving the instruction for sending the target data from the data sender comprises:
when a sending instruction of the data sender to target data is received, sending the identification of the data sender to a server, and receiving safety verification information sent by the server, wherein the safety verification information is determined by the server based on historical networking state data of the data sender stored in the preset block chain.
4. A data processing method based on a block chain is applied to a server and comprises the following steps:
after receiving an identifier of a data sender, acquiring a target block corresponding to the data sender from a preset block chain based on the identifier, wherein the target block stores historical networking state data of the data sender;
and determining safety verification information and preset verification information corresponding to the data sender based on historical networking state data stored in the target block, and sending the safety verification information and the preset verification information to the data sender so that the data sender sends authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of target data, wherein the authentication information comprises an identifier of the data sender, the safety verification information and the preset verification information.
5. The method of claim 4, wherein the determining security authentication information corresponding to the data sender based on the historical networking state data stored by the target block comprises:
acquiring the access time and the termination time of each networking of the data sender stored in each target block and the traffic data generated by each networking of the data sender stored in each target block;
and generating security verification information corresponding to the data sender based on the access time, the termination time and the traffic data of each target block.
6. A blockchain-based data processing system, the system comprising: data sender equipment, identity authentication side equipment, data receiver and server, wherein:
the data sender equipment is used for sending the identifier of the data sender equipment to the server when receiving a sending instruction of the data sender to target data;
the server is used for acquiring a target block corresponding to the identifier of the data sender equipment from a preset block chain, and determining safety verification information and preset check information corresponding to the data sender equipment based on historical networking state data stored in the target block; sending the security verification information and preset verification information to the data sender equipment;
the data sender equipment is used for sending authentication information for authenticating the identity of the data sender equipment to the identity authenticator equipment, wherein the authentication information comprises an identifier of the data sender equipment, the safety verification information and preset verification information;
the identity authenticator device is used for sending the identifier of the data sender device to the server and receiving first safety verification information and first verification information which are sent by the server and correspond to the data sender device after the identity authentication of the data sender device is passed; performing identity authentication on the data sender equipment based on the first safety verification information, the first verification information and the authentication information, and sending an authentication result to the data sender equipment;
and the data sender equipment is used for receiving an authentication result of the identity authentication of the data sender equipment, which is sent by the identity authenticator equipment, and sending the target data to the data receiver equipment corresponding to the sending instruction if the authentication result is that the authentication is passed.
7. An apparatus for data processing based on a blockchain, the apparatus comprising:
the data acquisition module is used for acquiring authentication information for authenticating the identity of the data sender when a sending instruction of the data sender to target data is received, wherein the authentication information comprises an identifier of the data sender, safety verification information and preset check information, and the safety verification information is determined based on historical networking state data of the data sender stored in a preset block chain;
the data sending module is used for sending authentication information for authenticating the identity of the data sending party to a preset identity authenticator so that the identity authenticator authenticates the identity of the data sending party based on the authentication information;
and the data receiving module is used for receiving an authentication result which is sent by the identity authenticator and used for authenticating the identity of the data sender, and if the authentication result is that the authentication is passed, the target data is sent to the data receiver corresponding to the sending instruction.
8. An apparatus for data processing based on a blockchain, the apparatus comprising:
the block acquisition module is used for acquiring a target block corresponding to a data sender from a preset block chain based on an identification of the data sender after receiving the identification, wherein the target block stores historical networking state data of the data sender;
and the data sending module is used for determining safety verification information and preset check information corresponding to the data sender based on the historical networking state data stored in the target block, and sending the safety verification information and the preset check information to the data sender so that the data sender sends authentication information to a preset identity authentication party for identity authentication when receiving a sending instruction of target data, wherein the authentication information comprises an identifier of the data sender, the safety verification information and the preset check information.
9. An electronic device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the blockchain based data processing method according to any one of claims 1 to 3 or the steps of the blockchain based data processing method according to any one of claims 4 to 5.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the blockchain-based data processing method according to any one of claims 1 to 3 or the steps of the blockchain-based data processing method according to any one of claims 4 to 5.
CN202010879967.7A 2020-08-27 2020-08-27 Block chain-based data processing method, device and system and electronic equipment Active CN114124418B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010879967.7A CN114124418B (en) 2020-08-27 2020-08-27 Block chain-based data processing method, device and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010879967.7A CN114124418B (en) 2020-08-27 2020-08-27 Block chain-based data processing method, device and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN114124418A true CN114124418A (en) 2022-03-01
CN114124418B CN114124418B (en) 2023-11-21

Family

ID=80374825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010879967.7A Active CN114124418B (en) 2020-08-27 2020-08-27 Block chain-based data processing method, device and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN114124418B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018124857A1 (en) * 2017-01-02 2018-07-05 주식회사 코인플러그 Blockchain database-based method and terminal for authenticating user non-face-to-face by utilizing mobile id, and server utilizing method and terminal
CN108702622A (en) * 2017-11-30 2018-10-23 深圳前海达闼云端智能科技有限公司 Mobile network's access authentication method, device, storage medium and block chain node
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109493071A (en) * 2018-10-22 2019-03-19 北京首汽智行科技有限公司 Auth method based on block chain
CN110278256A (en) * 2019-06-13 2019-09-24 思力科(深圳)电子科技有限公司 Block chain node accesses cochain method, relevant device and system
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN110708170A (en) * 2019-12-13 2020-01-17 腾讯科技(深圳)有限公司 Data processing method and device and computer readable storage medium
CN110874464A (en) * 2018-09-03 2020-03-10 巍乾全球技术有限责任公司 Method and equipment for managing user identity authentication data

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018124857A1 (en) * 2017-01-02 2018-07-05 주식회사 코인플러그 Blockchain database-based method and terminal for authenticating user non-face-to-face by utilizing mobile id, and server utilizing method and terminal
CN108702622A (en) * 2017-11-30 2018-10-23 深圳前海达闼云端智能科技有限公司 Mobile network's access authentication method, device, storage medium and block chain node
CN110874464A (en) * 2018-09-03 2020-03-10 巍乾全球技术有限责任公司 Method and equipment for managing user identity authentication data
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109493071A (en) * 2018-10-22 2019-03-19 北京首汽智行科技有限公司 Auth method based on block chain
CN110278256A (en) * 2019-06-13 2019-09-24 思力科(深圳)电子科技有限公司 Block chain node accesses cochain method, relevant device and system
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain
CN110599190A (en) * 2019-09-27 2019-12-20 支付宝(杭州)信息技术有限公司 Identity authentication method and device based on block chain
CN110708170A (en) * 2019-12-13 2020-01-17 腾讯科技(深圳)有限公司 Data processing method and device and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡卫;吴邱涵;刘胜利;付伟;: "基于国密算法和区块链的移动端安全eID及认证协议设计", 信息网络安全, no. 07 *

Also Published As

Publication number Publication date
CN114124418B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
CN109600223B (en) Verification method, activation method, device, equipment and storage medium
CN108510022B (en) Two-dimensional code generation and verification method and server
CN109257336B (en) Block chain-based password information processing method and terminal equipment
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN106255102B (en) Terminal equipment identification method and related equipment
CN111597540B (en) Login method of application program, electronic device and readable storage medium
CN111598573B (en) Equipment fingerprint verification method and device
CN111404933B (en) Authentication method, electronic equipment and authentication server
CN109766705B (en) Circuit-based data verification method and device and electronic equipment
CN109145644B (en) Private key confusion and digital signature generation method and device and intelligent device
CN110769418A (en) Key updating method, terminal and network side equipment
CN108933670B (en) Digital signature method and device, mobile device and storage medium
CN113221150A (en) Data protection method and device
CN110166461B (en) User unified identification processing method, device, equipment and storage medium
CN109451143B (en) Call method and mobile terminal
CN109446794B (en) Password input method and mobile terminal thereof
CN114553612B (en) Data encryption and decryption method and device, storage medium and electronic equipment
CN115589286A (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN110851408A (en) File compression method, file decompression method and electronic equipment
CN114092101B (en) Transaction verification method and device, storage medium and electronic equipment
CN108737341B (en) Service processing method, terminal and server
CN110289950B (en) Key information generation method and device
CN109743289B (en) Data verification method and device based on neural network and electronic equipment
CN114124418B (en) Block chain-based data processing method, device and system and electronic equipment
CN110717163B (en) Interaction method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant