CN114626849A - Data protection method and protection device based on block chain - Google Patents
Data protection method and protection device based on block chain Download PDFInfo
- Publication number
- CN114626849A CN114626849A CN202210257313.XA CN202210257313A CN114626849A CN 114626849 A CN114626849 A CN 114626849A CN 202210257313 A CN202210257313 A CN 202210257313A CN 114626849 A CN114626849 A CN 114626849A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- fingerprint
- message
- format
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012545 processing Methods 0.000 claims abstract description 13
- 238000004806 packaging method and process Methods 0.000 claims description 4
- 239000000284 extract Substances 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 230000002452 interceptive effect Effects 0.000 abstract description 9
- 230000003993 interaction Effects 0.000 description 7
- 230000006399 behavior Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Technology Law (AREA)
- Marketing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data protection method based on a block chain, which comprises the following steps: s1, collecting multi-source heterogeneous data; s2, processing the collected multi-source heterogeneous data into a data stream with a specified format, extracting start time, end time and service type from the data stream, and generating a data fingerprint; s3, assembling the obtained start time, end time, service type and data fingerprint into a message; and S4, storing the generated message on the block chain, wherein the original data is still stored in a local database and/or a local file. The multi-source heterogeneous data is converted into the message only containing the start time, the end time, the service type and the data fingerprint and stored in the block chain, the technical problem that in the prior art, the overhead of computing resources, storage resources and bandwidth resources of the block chain is overlarge due to the fact that all data need to be recorded and linked up one by one is solved, and the problems that interactive data of a client and a security company are easy to delete and tamper and the safety and completeness of the data cannot be guaranteed can be solved.
Description
Technical Field
The application belongs to the technical field of information data security, and particularly relates to a data protection method and a data protection device based on a block chain.
Background
With the wider business range of the security company, the interaction data of the client and the security company is more and more, such as transaction data of the client, operation behaviors of the client, browsing records of the client and the like. The information system is more and more complex, electronic data is easy to delete and tamper, when clients dispute data, security companies are difficult to prove that the data are credible, and the legal rights and interests of the clients are difficult to guarantee.
In general, a customer and a security company generate various interactive data, and the security company directly stores the interactive data in databases, local files and logs of a plurality of business systems. However, in a centralized storage mode of the security company, data is easy to lose and tamper, completeness and safety of the data cannot be guaranteed, and third-party supervision is lacked.
The securities company can also typically desensitize the customer's interaction data with the securities company and upload it directly to the public chain or alliance chain platform. Most of service or transaction information recorded in the blockchain comes from the client, and comprises the individual identity, transaction record, time and place and other related sensitive information of the client, and if the private data is illegally acquired and applied, the rights and interests of the client can be greatly damaged, and personal and property safety risks are brought. Although the block chain account book is shared among the nodes in the control area, and the account book records all service related information on the whole block chain, although the information on the block chain account book can be processed by necessary processing such as encryption, the information still has a large risk of being cracked, so that the private data of a client is leaked. The existing scheme has the following two defects: on one hand, the interaction amount of the client and the security company is large, the data amount of the client and the security company which are all transmitted to a public chain or a alliance chain is large, synchronization is not timely, and on the other hand, business data are easily acquired by other organizations, such as the number of active clients per day and the number of clicks per day, and business secrets are leaked.
Disclosure of Invention
In view of the above, in one aspect, some embodiments disclose a block chain-based data protection method for enhancing credibility of multiple types of interactive data between a security company and a client, the block chain-based data protection method including the steps of:
s1, collecting multi-source heterogeneous data;
s2, processing the collected multi-source heterogeneous data into a data stream with a specified format, extracting start time, end time and service type from the data stream, and generating a data fingerprint;
s3, assembling the obtained start time, end time, service type and data fingerprint into a message;
and S4, storing the message generated by splicing on the block chain, wherein the original data is still stored in a local database and/or a local file.
Further, some embodiments disclose a method for data protection based on a block chain, further comprising:
s5, generating the data fingerprint to be verified from the data in the local database and the local file according to the selected start time, end time and service type;
and S6, comparing the generated data fingerprint to be verified with the data fingerprint in the message which is stored on the block chain and corresponds to the selected starting time, ending time and service type, and if the two fingerprints are consistent, the data in the local database and/or the local file is credible.
Some embodiments disclose a data protection method based on a block chain, wherein the data fingerprint is an MD5 value.
Some embodiments disclose the data protection method based on the block chain, the data stream of the specified format includes a data stream of a uniform format or a data stream of a specific format, wherein the uniform format includes a JSON format and an avro format, and the specific format includes a text format, a picture format, a voice format and a video format.
Some embodiments disclose a block chain based data protection method, wherein the local database comprises a relational database and a non-relational database.
In another aspect, some embodiments disclose a block chain based data protection apparatus for performing a block chain based data protection method, the protection apparatus including:
the data acquisition module is configured for acquiring multi-source heterogeneous data;
the data processing module is configured for processing the acquired multi-source heterogeneous data into a data stream with a specified format, extracting start time, end time and service type from the data stream and generating a data fingerprint;
the packaging module is configured to assemble the obtained starting time, ending time, service type and data fingerprint into a message;
and the data uplink module is configured to forward the generated message to the block chain.
Further, some embodiments disclose the data protection apparatus based on the blockchain, further including a data authentication module configured to generate a to-be-verified data fingerprint from data in the local database and the local file according to the selected start time, end time, and service type; and comparing the generated data fingerprint to be verified with the data fingerprint in the message which is stored on the block chain and corresponds to the selected starting time, the ending time and the service type, and if the two fingerprints are consistent, the data in the local database and/or the local file is credible.
Some embodiments disclose the block chain-based data protection apparatus, further comprising a data caching module configured to store the message to be uplinked in the message middleware.
Some embodiments disclose the data protection device based on the block chain, further comprising a scheduling module configured to control data acquisition of the data acquisition module.
In some embodiments of the block chain-based data protection apparatus disclosed in the above embodiments, the data uplink module specifically includes:
the authority authentication unit is used for authenticating the authority of the inspector;
the request unit is used for initiating a connection request to the block chain server;
a connection unit, configured to establish a connection to the requested blockchain server;
and the uploading unit is used for uploading the message to the block chain server.
According to the data protection method based on the block chain, the multi-source heterogeneous data is converted into the message only containing the start time, the end time, the service type and the data fingerprint and stored on the block chain, the technical problem that in the prior art, the overhead of computing resources, storage resources and bandwidth resources of the block chain is too large in the process that all data are required to be recorded and linked up one by one is solved, and the problems that interactive data of a client and a security company are easy to delete and tamper and the safety and completeness of the data cannot be guaranteed can be solved.
Drawings
FIG. 1 is a schematic flow chart of a block chain-based data protection method;
fig. 2 is a block chain-based data protection apparatus composition diagram.
Detailed Description
The word "embodiment" as used herein, is not necessarily to be construed as preferred or advantageous over other embodiments, including any embodiment illustrated as "exemplary". Performance index tests in the examples of this application, unless otherwise indicated, were performed using routine experimentation in the art. It is to be understood that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure.
Unless defined otherwise, technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; other test methods and techniques not specifically mentioned in the present application are those commonly employed by those of ordinary skill in the art.
The terms "substantially" and "about" are used herein to describe small fluctuations. For example, they may mean less than or equal to ± 5%, such as less than or equal to ± 2%, such as less than or equal to ± 1%, such as less than or equal to ± 0.5%, such as less than or equal to ± 0.2%, such as less than or equal to ± 0.1%, such as less than or equal to ± 0.05%. Numerical data represented or presented herein in a range format is used merely for convenience and brevity and thus should be interpreted flexibly to include not only the numerical values explicitly recited as the limits of the range, but also to include all the individual numerical values or sub-ranges encompassed within that range as if each numerical value and sub-range is explicitly recited. For example, a numerical range of "1 to 5%" should be interpreted to include not only the explicitly recited values of 1% to 5%, but also include individual values and sub-ranges within the indicated range. Thus, included in this numerical range are individual values, such as 2%, 3.5%, and 4%, and sub-ranges, such as 1% to 3%, 2% to 4%, and 3% to 5%, etc. This principle applies equally to ranges reciting only one numerical value. Moreover, such an interpretation applies regardless of the breadth of the range or the characteristics being described. The time zone referred to herein is typically a period of time defined by a start time and an end time.
In this document, including the claims, conjunctions such as "comprising," including, "" carrying, "" having, "" containing, "" involving, "" containing, "and the like are understood to be open-ended, i.e., to mean" including but not limited to. Only the conjunctions "consisting of … …" and "consisting of … …" are closed conjunctions.
In the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present application may be practiced without some of these specific details. In the examples, some methods, means, instruments, apparatuses, etc. known to those skilled in the art are not described in detail in order to highlight the subject matter of the present application.
On the premise of no conflict, the technical features disclosed in the embodiments of the present application may be combined arbitrarily, and the obtained technical solution belongs to the content disclosed in the embodiments of the present application.
The following describes a block chain-based data protection method and protection device with reference to the embodiment and fig. 1.
In some embodiments, a method for data protection based on a blockchain includes the steps of:
s1, a data acquisition step, namely acquiring multi-source heterogeneous data;
s2, a data processing step, namely processing the collected multi-source heterogeneous data into a data stream with a specified format, extracting start time, end time and service type from the data stream, and generating data fingerprints by protecting data segments of the start time, the end time and the service type; generally, inquiring specified starting time and ending time, converting all data of corresponding service types in the time region into a byte stream, and further generating a data fingerprint of the byte stream; the time zone referred to in the embodiments herein is generally a period of time defined by a start time and an end time;
s3, a data packaging step, namely splicing the obtained start time, end time, service type and data fingerprint into a message;
and S4, data chaining, wherein the message generated by splicing is stored in the block chain, and the original data is still stored in a local database and/or a local file.
Generally, the customer's interaction data with the security company includes: the method comprises the following steps of business handling, important notification, investor education, appropriateness management, agreement signing, rule learning, short message WeChat telephone communication content, risk prompting and other important interactive behaviors, and a large amount of background data can be generated in the handling of each business. The data types include: pictures, voice, database records, log files, etc. The data is stored in different places according to different data types of the client, for example, transaction stream data of the client is stored in a database, and an agreement signing file of the client is stored in a local file. Behavior data such as click-to-read browsing and the like are stored in a big data platform, and real-time data are stored in a message queue such as Kafka. The multi-source heterogeneous data are collected and then are processed in a unified mode, the collected original large-scale data are processed into a data stream containing the start time, the end time, the service types and the data fingerprints, a unified message format is generated, the message is uploaded to a block chain through distributed data caching, the original multi-source heterogeneous data are still stored in a local database and a local file of each service system of a security company, and abuse of other participants on the block chain is avoided; when the data needs to be verified whether to be credible or not, the client selects time and service types, because the starting time and the ending time of each service type when producing the data fingerprint are stored in the original system, the starting time and the ending time of the specified time are searched from the original system, all data of the service type between the starting time and the ending time are obtained to generate the data fingerprint to be verified, the data fingerprint is compared with the data fingerprint on the block chain, and if the data fingerprint is consistent, the data is verified to be credible. On one hand, the method is used for solving the problems that the interactive data of the client and the security company is easy to delete and tamper, the safety and completeness of the data cannot be ensured and the like, and the protection on the rights and interests of investors is promoted; on the other hand, the technical problem of overlarge consumption of computing resources, storage resources and bandwidth resources of a block chain caused by the process of recording all data and uplink one by one in the prior art is solved.
As an alternative embodiment, all relevant data are selected according to the set service type and time interval, all relevant data in the time interval form a data stream, and a data fingerprint generator is used for generating a data fingerprint of the area data.
Selecting all relevant data according to the service type and the time interval, wherein all the relevant data refer to all recorded information of a certain service in the selected time interval, and the time interval can be a time period determined by any timing unit, such as month, day, hour and the like; for example, stock trading data for all clients # 1-20 in 2022, fund trading data for all clients # 1-20 in 2022, and account opening data for all clients # 1-20 in 2022. It may also be a finer grained region of time such as minutes, seconds, etc. such as the stock trading data of all customers from 9 o 'clock 30 to 9 o' clock 35 of month 1/20 of 2022, with the aim of reducing the time of data processing when a data fingerprint is generated a single time, as well as reducing the amount of data and calculations required by a customer to verify that the data is authentic.
As an alternative embodiment, the data fingerprint generator preferably generates a function with MD5 values, and the generated data fingerprint is MD5 values.
As an alternative embodiment, the data stream generated by the data protection method based on the block chain has a set format, and generally, the data stream includes a data stream with a uniform format or a data stream with a specific format, where the uniform format includes a JSON format and an avro format, and the specific format includes a file format, a picture format, a voice format, and a video format.
As an alternative embodiment, the original data of the data protection method based on the block chain is stored in a local database and/or a local file, wherein the local database includes a relational database and a non-relational database.
As an alternative embodiment, the data protection method based on the block chain further includes a data authentication step, specifically including:
s5, generating the data to be verified from the data in the local database and the local file according to the selected start time, end time and service type; generally, whether data in a local database and/or a local file is tampered or trusted needs to be verified, a specific time zone and a specific service type can be selected, and then all data of the service type in the time zone are used for generating a to-be-verified data fingerprint; generally, the selected specific time region is shorter, so that the data volume contained in the time region is small, the processing time for generating the data fingerprint is shortened, the data transmission efficiency is improved, and the verification efficiency is improved; generally, the data is segmented at a finer time granularity, which enables the verification of whether the local data is authentic.
And S6, comparing the generated data fingerprint to be verified with the data fingerprint in the message which is stored on the block chain and corresponds to the start time, the end time and the service type, and if the two fingerprints are consistent, the data in the local database and/or the local file is credible. In general, the start time and the end time of the data fingerprint to be verified correspond to the start time and the end time of the data fingerprint stored in the block chain.
As an alternative embodiment, the data protection method based on the block chain further includes a data caching step, where the generated to-be-uplink message is stored in the message middleware. The preferred embodiment is that the Kafka exists to prevent the overload of the block chain system caused by the excessive data amount during data interaction. One Kafka topoc may be put in the entire data stream, or may be divided into multiple topocs per service.
As an alternative embodiment, the process of forwarding the packet to the blockchain includes:
the authority authentication step, the data checking person inputs the application authority to verify the identity and the authority;
a request step, which is to initiate a connection request to a block chain server;
a connection step, establishing connection with the requested block chain server;
and uploading, namely uploading the message to the selected block chain server.
As an optional embodiment, the data protection device based on the blockchain further includes a data scheduling step, in which the service system data is used as a data acquisition object, the data acquisition object is added into a scheduling list, and a data monitoring time interval and a data acquisition time interval are set. As an alternative embodiment, different time intervals are set for the acquisition time of different service system data, for example, the acquisition interval of some service systems is set to every 5 minutes, the acquisition interval of other service systems is set to every hour, and the acquisition interval of some service systems is set to all days.
Some embodiments disclose a data protection apparatus based on a blockchain, for performing a method of data protection based on a blockchain, the data protection apparatus comprising:
the data acquisition module is configured for acquiring multi-source heterogeneous data; generally, the customer's interaction data with the security company includes: important interactive behaviors such as service handling, important notification, investor education, appropriateness management, protocol signing, rule learning, short message WeChat telephone communication content, risk prompt and the like, wherein a large amount of background data can be generated in the handling of each service; the data types include: pictures, voice, database records, log files, etc. The data is stored in different places according to different data types of the client, for example, transaction flow data of the client is stored in a database, and an agreement signing file of the client is stored in a local file; behavior data such as clicking, reading, browsing and the like are stored in a big data platform, and real-time data are stored in a message queue such as Kafka;
the data processing module is configured to process the acquired multi-source heterogeneous data into a data stream with a specified format, extract the start time, the end time and the service type of a time region from the data stream and generate a data stream of a data fingerprint; as an alternative embodiment, all relevant data are selected according to the set service type and time interval, all relevant data in the time interval form a data stream, and a data fingerprint generator is used for generating a data fingerprint of the area data. Generally, all relevant data are selected according to the service type and the time interval, the all relevant data refer to all recorded information of a certain service in the selected time interval, and the time interval can be a time period determined by any timing unit, such as month, day, hour and the like; for example, stock trading data for all clients # 1-20 in 2022, fund trading data for all clients # 1-20 in 2022, and account opening data for all clients # 1-20 in 2022. But also a finer-grained time zone such as minutes, seconds, etc., such as the stock trading data of all clients from 9 o 'clock 30 to 9 o' clock 35 of No. 20 of No. 1 month of 2022, aiming at reducing the time of data processing when generating data fingerprints once, and also reducing the amount of data and calculation required when the clients verify whether the data is authentic;
as an alternative embodiment, the data fingerprint generator preferably selects the MD5 value generation function;
the packaging module is configured to generate messages with a uniform format from the obtained time region start time, end time, service type and data fingerprint data stream; for example, the encapsulation module extracts the target data and encapsulates the extracted target data field into a message, wherein the field comprises a service type, a start time, an end time and a data fingerprint;
and the data uplink module is configured to forward the generated message to the block chain. Typically, the data uplink module reads the message from the message middleware and forwards the message encapsulated with the target data field to a blockchain platform, for example, preferably a public-trust blockchain platform such as the above certificate chain.
As an optional embodiment, the data protection apparatus based on the blockchain further includes a data authentication module configured to generate to-be-verified data fingerprints from data in the local database and the local file according to the selected start time, end time, and service type; and comparing the generated data fingerprint to be verified with the data fingerprint in the message which is stored on the block chain and corresponds to the selected starting time, the ending time and the service type, and if the two fingerprints are consistent, the data in the local database and/or the local file is credible.
The data protection device based on the block chain collects and then uniformly processes multi-source heterogeneous data, the collected original large-scale data is processed into a data stream containing start time, end time, service types and data fingerprints, a uniform message format is generated, the message is uploaded to the block chain through distributed data caching, the original multi-source heterogeneous data is still stored in a local database and a local file of each service system of a security company, and abuse of other participants on the block chain is avoided; and when the data needs to be verified whether to be credible or not, the client selects a time area and a service type to generate a data fingerprint to be verified, the data fingerprint is compared with the data fingerprint on the block chain, and if the data fingerprint is consistent, the data is proved to be credible.
As an optional embodiment, the block chain-based data protection apparatus further includes a data caching module configured to store the message to be uplinked in the message middleware. In a preferred embodiment, the message to be uplinked is stored in Kafka, so as to prevent overload of the blockchain system caused by too large data amount during data interaction. All messages can be put into one kafka Topic, or all messages can be put into a plurality of topics according to service division. The classification cache of the message is realized and a message output interface is provided.
As an optional embodiment, the data protection apparatus based on a block chain further includes a scheduling module configured to control data acquisition by the data acquisition module, specifically, the data acquisition module takes service system data as a data acquisition object, adds the data acquisition object to a scheduling list, and sets a data monitoring time interval and a data acquisition time interval. As an alternative embodiment, different time intervals are set for the acquisition time of different service system data, for example, the acquisition interval of some service systems is set to every 5 minutes, the acquisition interval of other service systems is set to every hour, and the acquisition interval of some service systems is set to all days.
As an alternative embodiment, the data uplink module specifically includes: the authority authentication unit is used for authenticating the authority of the inspector; the request unit is used for initiating a connection request to the block chain server; a connection unit for establishing a connection to the requested blockchain server; and the uploading unit is used for uploading the message to the block chain server. For example, a POST format is used to send a data uplink request to the blockchain and receive a return message; if finding that the failure information is returned, the data uplink request can be carried out again; if the status code returned by the server is 1, the uplink is successful, and if the status code is-1, the uplink is failed.
According to the data protection method based on the block chain, the multi-source heterogeneous data is converted into the message only containing the start time, the end time, the service type and the data fingerprint and stored on the block chain, the technical problem that in the prior art, the overhead of computing resources, storage resources and bandwidth resources of the block chain is too large in the process that all data are required to be recorded and linked up one by one is solved, and the problems that interactive data of a client and a security company are easy to delete and tamper and the safety and completeness of the data cannot be guaranteed can be solved.
The technical solutions and the technical details disclosed in the embodiments of the present application are only examples to illustrate the inventive concept of the present application, and do not constitute a limitation on the technical solutions of the present application, and all the conventional changes, substitutions, combinations, and the like made to the technical details disclosed in the present application have the same inventive concept as the present application and are within the protection scope of the claims of the present application.
Claims (10)
1. The data protection method based on the block chain is characterized by comprising the following steps:
s1, collecting multi-source heterogeneous data;
s2, processing the collected multi-source heterogeneous data into a data stream with a specified format, and extracting the start time, the end time and the service type from the data stream to generate a data fingerprint;
s3, assembling the obtained start time, end time, service type and data fingerprint into a message;
and S4, storing the assembled message on the block chain, wherein the original data is still stored in a local database and/or a local file.
2. The method for block chain based data protection according to claim 1, further comprising the steps of:
s5, generating the data fingerprint to be verified from the data in the local database and/or the local file according to the selected start time, end time and service type;
and S6, comparing the generated data fingerprint to be verified with the data fingerprint in the message which is stored on the block chain and corresponds to the start time, the end time and the service type, and if the two fingerprints are consistent, the data in the local database and/or the local file is credible.
3. The blockchain-based data protection method of claim 1, wherein the data fingerprint is an MD5 value.
4. The method for protecting data based on block chain as claimed in claim 1, wherein the specified format data stream comprises a uniform format data stream or a specific format data stream, wherein the uniform format comprises JSON format and avro format, and the specific format comprises text format, picture format, voice format and video format.
5. The blockchain-based data protection method of claim 1, wherein the local database includes a relational database and a non-relational database.
6. A data protection device based on a block chain, which is used for executing the data protection method of any one of claims 1 to 5, and is characterized by comprising:
the data acquisition module is configured for acquiring multi-source heterogeneous data;
the data processing module is configured to process the acquired multi-source heterogeneous data into a data stream with a specified format, extract start time, end time and service type from the data stream and generate a data fingerprint;
the packaging module is configured to assemble the obtained starting time, ending time, service type and data fingerprint into a message;
and the data uplink module is configured to forward the assembled message to the block chain.
7. The blockchain-based data protection device of claim 6, further comprising:
the data authentication module is configured to generate a to-be-verified data fingerprint from data in the local database and/or the local file according to the selected starting time, the selected ending time and the selected service type; and comparing the generated data fingerprint to be verified with the data fingerprint in the message which is stored on the block chain and corresponds to the start time, the end time and the service type, and if the two fingerprints are consistent, determining that the data in the local database and/or the local file is credible.
8. The blockchain-based data protection device of claim 6, further comprising a data caching module configured to store messages to be uplinked in message middleware.
9. The blockchain-based data protection device of claim 6, further comprising a scheduling module configured to control data acquisition by the data acquisition module.
10. The device according to claim 6, wherein the data uplink module further comprises:
the authority authentication unit is used for authenticating the authority of the inspector;
the request unit is used for initiating a connection request to the block chain server;
a connection unit, configured to establish a connection to the requested blockchain server;
and the uploading unit is used for uploading the message to the block chain server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210257313.XA CN114626849A (en) | 2022-03-16 | 2022-03-16 | Data protection method and protection device based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210257313.XA CN114626849A (en) | 2022-03-16 | 2022-03-16 | Data protection method and protection device based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114626849A true CN114626849A (en) | 2022-06-14 |
Family
ID=81901703
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210257313.XA Pending CN114626849A (en) | 2022-03-16 | 2022-03-16 | Data protection method and protection device based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114626849A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116668451A (en) * | 2023-04-10 | 2023-08-29 | 中泰证券股份有限公司 | Data storage method, equipment and medium for securities business |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040012A (en) * | 2018-06-19 | 2018-12-18 | 西安电子科技大学 | A kind of data security protecting and sharing method based on block chain and system and application |
CN112100265A (en) * | 2020-09-17 | 2020-12-18 | 博雅正链(北京)科技有限公司 | Multi-source data processing method and device for big data architecture and block chain |
-
2022
- 2022-03-16 CN CN202210257313.XA patent/CN114626849A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040012A (en) * | 2018-06-19 | 2018-12-18 | 西安电子科技大学 | A kind of data security protecting and sharing method based on block chain and system and application |
CN112100265A (en) * | 2020-09-17 | 2020-12-18 | 博雅正链(北京)科技有限公司 | Multi-source data processing method and device for big data architecture and block chain |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116668451A (en) * | 2023-04-10 | 2023-08-29 | 中泰证券股份有限公司 | Data storage method, equipment and medium for securities business |
CN116668451B (en) * | 2023-04-10 | 2024-01-23 | 中泰证券股份有限公司 | Data storage method, equipment and medium for securities business |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109034833B (en) | Product tracing information management system and method based on block chain | |
US10831902B2 (en) | Data verification methods and systems using a hash tree, such as a time-centric Merkle hash tree | |
US11296863B2 (en) | Blockchain enterprise data management | |
US20190207751A1 (en) | Blockchain enterprise data management | |
CN113438084B (en) | Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp | |
US20160283920A1 (en) | Authentication and verification of digital data utilizing blockchain technology | |
CN110716932B (en) | Data processing method, system, device and storage medium | |
CN111291394B (en) | False information management method, false information management device and storage medium | |
CN111339141B (en) | Data transmission method, block chain node equipment and medium | |
CN109951490A (en) | Webpage integrity assurance, system and electronic equipment based on block chain | |
CN110689348B (en) | Revenue verification method, device, terminal and medium based on alliance chain | |
CN104504014A (en) | Data processing method and device based on large data platform | |
CN112364059B (en) | Correlation matching method, device, equipment and storage medium under multi-rule scene | |
CN113792308A (en) | Government affair sensitive data oriented security behavior risk analysis method | |
Liang et al. | Research on IoT forensics system based on blockchain technology | |
CN114626849A (en) | Data protection method and protection device based on block chain | |
CN104539636A (en) | Video evidence service system | |
CN111506661B (en) | Content access management method, device and storage medium | |
CN112667706A (en) | Method and device for identifying stolen account | |
CN112507304A (en) | Information management system for retired soldiers | |
CN111444265A (en) | Government affair information sharing system based on block chain | |
Dorigo | Security information and event management | |
CN113938694B (en) | Method for realizing safe broadcasting control from recording broadcasting to live broadcasting | |
Heo et al. | Understanding block and transaction logs of permissionless blockchain networks | |
CN117118640A (en) | Data processing method, device, computer equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |