CN115118460A - Block chain-based data integrity verification method and system - Google Patents

Block chain-based data integrity verification method and system Download PDF

Info

Publication number
CN115118460A
CN115118460A CN202210635675.8A CN202210635675A CN115118460A CN 115118460 A CN115118460 A CN 115118460A CN 202210635675 A CN202210635675 A CN 202210635675A CN 115118460 A CN115118460 A CN 115118460A
Authority
CN
China
Prior art keywords
data
central control
control module
transmission rate
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210635675.8A
Other languages
Chinese (zh)
Inventor
余利华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210635675.8A priority Critical patent/CN115118460A/en
Publication of CN115118460A publication Critical patent/CN115118460A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0894Packet rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field, in particular to a data integrity verification method and system based on a block chain. The method comprises the following steps: step S1, before the integrity verification of the data is started, the central control module controls the user terminal to block the data and transmits the data after the data is blocked to the encryption module; step S2, encrypting the data block and sending to the server; step S3, the central control module control server sends the data information to the data integrity verification module, step S4, the central control module performs preliminary determination on the transmission condition of the system according to the data integrity actually transmitted to the data integrity verification module, and further determines the data transmission condition of the system according to the data transmission rate detected by the data transmission rate detection device, and the system includes: the invention discloses a user terminal, an encryption module, a server and a data integrity verification module, which improve the accuracy and the verification efficiency of data integrity verification.

Description

Block chain-based data integrity verification method and system
Technical Field
The invention relates to the technical field of block chains, in particular to a data integrity verification method and system based on a block chain.
Background
The block chain is a chain structure formed by combining data blocks in a sequential connection mode according to a time sequence, and is a distributed account book which is guaranteed in a cryptographic mode and cannot be tampered and forged. Node information of the blockchain is commonly maintained by participants of all blockchains, so that all information on the blockchain is public and transparent, and the information is permanently reserved once issued and cannot be tampered. The public verification and non-tampering characteristics of the blockchain enable the blockchain to be used as a trusted third party to solve the concern of users in a cloud computing environment, all results can be issued to the blockchain, and all users of the blockchain carry out authentication and maintenance. Therefore, the block chain is combined to the cloud computing field, the defects of the cloud computing environment are overcome by using the advantages of the block chain, and the data security of the user can be guaranteed more effectively.
Chinese patent publication No.: CN 113553627A. Disclosed are a method, a system, a device and a medium for verifying data integrity based on a block chain, wherein the method comprises the following steps: receiving real-time integrity information sent by a user side, wherein the real-time integrity information is generated by cloud storage data based on a preset data processing rule; and searching whether original integrity information consistent with the real-time integrity information exists in the block chain network or not to obtain a searching result. The integrity information of the original data is stored in the blockchain network, and the data integrity verification is carried out in the blockchain network, so that the integrity information of the original data is prevented from being tampered and deleted, and the reliability of the data integrity verification is improved. Therefore, the method, the system, the equipment and the medium for verifying the data integrity based on the block chain have the following problems: the accuracy and efficiency of data integrity verification is low.
Disclosure of Invention
Therefore, the invention provides an automatic paper discharging device for a real object stamp management and control device, which is used for solving the problems of low accuracy and low verification efficiency of data integrity verification in the prior art.
In order to achieve the above object, the present invention provides a data integrity verification method based on a block chain, including:
step S1, before the integrity verification of the data is started, the central control module controls the user terminal to perform data blocking operation and transmits each data block which is completed by data blocking to the encryption module; step S2, when the encryption module finishes receiving the data blocks, the central control module controls the encryption module to encrypt each data block and sends the encrypted data blocks to a server; step S3, when the server receives the data block transmitted by the encryption module, the central control module controls the server to decrypt each data block, and according to the decrypted data, searches whether the same data information as the data information sent by the user terminal exists in the block chain, sends the data information to the data integrity verification module, and detects the transmission rate of the data in the process of transmitting the data to the data integrity verification module through the user terminal; step S4, when the central control module judges that the uploading time of the data information reaches the preset transmission time, the central control module carries out primary judgment on the transmission condition of the system according to the integrity of the data actually transmitted to the data integrity verification module, and further judges the data transmission condition of the system according to the data transmission rate detected by the data transmission rate detection device, when the central control module finishes the judgment on the data transmission condition, the time length of delayed transmission detection is adjusted according to the difference value of the integrity of the actual data and the integrity of the preset number, and after the delay time, the central control module controls the verification module to carry out secondary detection on the integrity of the data and further judges the transmission condition of the data.
Further, in step S4, when the data integrity verification module receives the data transmitted from the user terminal, the central control module determines the data transmission status of the system according to the actual integrity S of the data received by the data integrity verification module, and the central control module is provided with a preset first preset integrity S1, a second preset integrity S2 and a third preset integrity S3, where S1 < S2 < S3,
if S is not more than S1, the central control module preliminarily judges that the system is intercepted and carries out reverse tracking on the equipment intercepting the data;
if S1 is greater than S2, the central control module preliminarily judges that the data transmission is poor and controls the data transmission rate detection device to detect the data transmission rate;
if S2 is larger than S3, the central control module preliminarily judges that data transmission is not finished and delay detection is required, calculates the difference value Delta S between the actual integrity and the preset integrity and determines the delay detection time length according to the Delta S;
if S is greater than S3, the central control module judges that the data integrity is qualified and the data transmission is normal.
Further, when the central control module determines that S is less than or equal to S1, the central control module determines the intercepted address of the system according to whether the data transmission rate generates a sudden change in the period, the central control module is provided with a preset first data transmission rate sudden change value P1 and a preset second data transmission rate sudden change value P2, wherein P1 is less than P2,
if P is not more than P1, the central control module judges that the actual data transmission rate mutation value is in the allowable range and does not determine the address corresponding to the transmission rate mutation value;
if P is more than P1 and less than or equal to P2, the central control module judges that the actual data transmission rate mutation value exceeds an allowable range, calculates the difference value delta P between the actual data transmission rate mutation value and a preset first data transmission rate mutation value, further determines whether interception exists according to the delta P, and sets delta P = P-P1;
if P > P2, the central control module judges that the actual data transmission rate mutation value exceeds the allowable range, determines the address corresponding to the mutation value as the address intercepted by the system, and sends the address to the server for storage.
Further, when the central control module determines that P is more than P1 and less than or equal to P2, the central control module further determines whether interception exists according to the difference value delta P between the actual data transmission rate mutation value and the preset data transmission rate mutation value, wherein the central control module is provided with a preset first data transmission rate mutation value difference value delta P1 and a preset second data transmission rate mutation difference value delta P2, the delta P1 is less than delta P2,
if the delta P is less than or equal to the delta P1, the central control module judges that the difference value of the actual data transmission rate mutation value and the preset data transmission rate mutation value is in an allowable range and judges that the address corresponding to the transmission rate mutation value is not determined;
if delta P1 is smaller than delta P and is not larger than delta P2, the central control module judges that the difference value of the actual data transmission rate mutation value and the preset data transmission rate mutation value is in an allowable range and sends an address corresponding to the transmission rate mutation value to the server to serve as a reserved address;
if delta P is > -delta P2, the central control module judges that the difference value between the actual data transmission rate mutation value and the preset data transmission rate mutation value exceeds the allowable range, determines the address corresponding to the mutation value as the address intercepted by the system and sends the address to the server for storage.
Further, when the central control module determines that S1 is more than or equal to S2, the data transmission condition is further determined according to the actual data transmission rate detected by the actual transmission rate detection device, the central control module is provided with a preset first transmission rate Q1 and a preset second transmission rate Q2, wherein Q1 is more than Q2,
if Q is not more than Q1, the central control module judges that the network environment is congested and sends out an alarm of poor transmission;
if Q is more than Q1 and less than or equal to Q2, the central control module judges that data transmission is poor, detects the load of the server and judges whether to postpone tasks which are simultaneously carried out in the load of the server or not according to the load;
if Q is more than Q2, the central control module determines that the data transmission rate is qualified and the data is intercepted.
Further, when the central control module determines that Q1 is greater than Q and not greater than Q2, the central control module controls the load detection device to detect whether the load amount simultaneously transmitted by the server delays the data transmission task which is simultaneously performed to determine, wherein the central control module is provided with a preset first transmission load amount D1 and a preset second transmission load amount D2, wherein D1 is greater than D2,
if D is less than or equal to D1, the central control module judges that the actual transmission load is lower than the allowable range and increases the number of the transmitted data blocks;
if D1 is larger than D and is not larger than D2, the central control module judges that the actual transmission load is within the allowable range and does not delay the data transmission tasks transmitted simultaneously;
if D is larger than D2, the central control module judges that the actual transmission load quantity exceeds the allowable range and postpones the data transmission task transmitted simultaneously.
Further, when the central control module determines that S is greater than or equal to S2 and less than or equal to S3, the delay duration is determined according to a difference Δ S between the actual integrity of the data received by the data integrity verification module and a preset integrity, Δ S = S3-S, the central control module is provided with a preset first preset integrity difference Δ S1, a second preset integrity difference Δ S2, a first preset delay duration t1 and a second preset delay duration t2, Δ S1 is less than Δ S2, t1 is less than t2,
if the time length of 0 & ltdelta & gt is less than or equal to the time length of delta & ltdelta & gt 1, the central control module judges that the receiving of the data by the verification module is delayed for t1 time length detection;
if the time length of the delta S1 is less than or equal to the time length of the delta S2, the central control module judges that the time length of the data receiving delay t2 of the verification module is longer and then detects the data;
and if the Delta S is more than the Delta S2, the central control module judges that the data transmission is poor and carries out secondary detection on the data transmission rate.
Further, after the central control module delays t1, the central control module controls the data integrity detection program to detect the data integrity S' again,
if S' > S3, the central control module determines that the data is not intercepted and does not perform backward tracing on the data;
and if S' is less than or equal to S3, the central control module judges that the data is intercepted and carries out backward tracing.
Further, after the central control module delays t2, the central control module controls the data integrity detection program to detect the data integrity S 'again and further determines whether the data is intercepted according to the difference between S' and S3,
if S' > S3, the central control module judges that the data has the condition of poor transmission and sends out data transmission problem alarm;
if S 'is less than or equal to S3, calculating Delta S', and setting Delta S '= S3-S';
if the value of Delta S is more than 0 and less than or equal to Delta S1, the central control module determines to delay for a time period of t1 and detects the data transmission rate Q to determine whether the condition of poor data transmission exists;
if the number of the delta S is less than delta S1 and is less than or equal to delta S2, the central control module judges that the data are intercepted and sends out an alarm that the data are intercepted;
if the delta S is more than the delta S2, the central control module judges that the data transmission is blocked and sends out a data transmission problem alarm.
A system for block chain based data integrity verification method using the method of any one of claims 1 to 9, comprising:
the user terminal is used for carrying out blocking operation and data encryption operation on the data and sending the data subjected to the blocking operation and the encryption to the server;
the encryption module is connected with the user terminal and is used for encrypting the data block transmitted by the user terminal;
the server is connected with the encryption module and used for receiving the data encryption information transmitted by the encryption module, decrypting the data encryption confidence, searching whether the block chain has the same data information as the data information sent by the user terminal according to the decrypted data after the information decryption is finished, and sending the data information to the data integrity verification module;
and the data integrity verification module is connected with the server and used for verifying the integrity of the data transmitted by the user terminal according to the data information received by the server.
Compared with the prior art, the method has the advantages that the preset data integrity, the preset data transmission rate mutation value and the preset integrity difference value are set, the transmission condition of the system can be preliminarily judged according to the actual data integrity, the data transmission condition of the system is further judged according to the data transmission rate detected by the data transmission rate detection device, the time length of delay transmission detection can be adjusted according to the difference value of the actual data integrity and the preset data integrity, the accuracy of data integrity verification, the accurate monitoring of the data transmission rate of the data integrity verification and the data integrity verification efficiency are improved, and the accuracy and the verification efficiency of the data integrity verification are improved.
Furthermore, the method can judge the data transmission condition of the system according to the actual integrity degree by presetting the first preset integrity degree, the second preset integrity degree and the third preset integrity degree, so that the accurate judgment of the data integrity verification is improved, and the accuracy and the verification efficiency of the data integrity verification are further improved.
Furthermore, the method of the invention can determine the intercepted address of the system according to whether the data transmission rate generates the mutation in the period by setting the preset first data transmission rate mutation value and the preset second data transmission rate mutation value, thereby improving the supervision capacity of the data transmission process and further realizing the improvement of the accuracy and the verification efficiency of the data integrity verification.
Furthermore, the method of the invention can further judge whether interception exists according to the difference value delta P between the actual data transmission rate mutation value and the preset data transmission rate mutation value by setting the preset first data transmission rate mutation value difference value and the preset second data transmission rate mutation value, thereby improving the accurate identification capability of whether the interception exists in the data transmission process and further realizing the improvement of the accuracy and the verification efficiency of the data integrity verification.
Furthermore, the method of the invention can further judge the data transmission condition according to the actual data transmission rate detected by the actual transmission rate detection device by setting the preset first transmission rate and the preset second transmission rate, thereby improving the accurate judgment capability of data transmission and further realizing the improvement of the accuracy and the verification efficiency of data integrity verification.
Furthermore, the method of the invention can judge whether the simultaneously transmitted data transmission task is delayed or not according to the detected simultaneously transmitted load capacity by setting the preset first transmission load capacity and the preset second transmission load capacity, thereby improving the accurate adjustment capability of the data transmission task and further realizing the improvement of the accuracy and the verification efficiency of the data integrity verification.
Furthermore, the method of the present invention sets the preset first preset integrity difference, the second preset integrity difference, the first preset delay duration t1, and the second preset delay duration, and can determine the delay duration according to the difference between the actual integrity and the preset integrity, thereby realizing accurate determination of the delay duration, and further realizing improvement of accuracy and verification efficiency of data integrity verification.
Furthermore, the method of the invention can further judge the data integrity by re-detecting the data integrity after the delay time, thereby improving the deep confirmation capability of the transmission process influencing the data integrity and further realizing the improvement of the accuracy and the verification efficiency of the data integrity verification.
Furthermore, the method provided by the invention can be used for detecting the data integrity again by controlling the data integrity detection program and further judging whether the data is intercepted or not, so that the further accurate determination of the data transmission process condition related to the data integrity is realized, and the accuracy and the verification efficiency of the data integrity verification are further improved.
The system provided by the invention can verify the data integrity by arranging the user terminal, the server and the data integrity verification module, improves the accuracy of data integrity verification, and further improves the accuracy and the verification efficiency of data integrity verification.
Drawings
FIG. 1 is a flowchart of a block chain-based data integrity verification method according to an embodiment of the present invention;
fig. 2 is a system block diagram of a block chain-based data integrity verification system according to an embodiment of the present invention.
Detailed Description
In order that the objects and advantages of the invention will be more clearly understood, the invention is further described below with reference to examples; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are only for explaining the technical principle of the present invention, and do not limit the scope of the present invention.
Referring to fig. 1, a block chain-based data integrity verification method includes:
step S1, before the integrity verification of the data is started, the central control module controls the user terminal to perform data blocking operation and transmits each data block which is completed by data blocking to the encryption module;
step S2, when the encryption module finishes receiving the data blocks, the central control module controls the encryption module to encrypt each data block and sends the encrypted data blocks to a server;
step S3, when the server receives the data block transmitted by the encryption module, the central control module controls the server to decrypt each data block, and according to the decrypted data, searches whether the same data information as the data information sent by the user terminal exists in the block chain, sends the data information to the data integrity verification module, and detects the transmission rate of the data in the process of transmitting the data to the data integrity verification module through the user terminal;
step S4, when the central control module judges that the uploading time of the data information reaches the preset transmission time, the central control module carries out primary judgment on the transmission condition of the system according to the integrity of the data actually transmitted to the data integrity verification module, and further judges the data transmission condition of the system according to the data transmission rate detected by the data transmission rate detection device, when the central control module finishes the judgment on the data transmission condition, the time length of delayed transmission detection is adjusted according to the difference value of the integrity of the actual data and the integrity of the preset number, and after the delay time, the central control module controls the verification module to carry out secondary detection on the integrity of the data and further judges the transmission condition of the data.
According to the invention, through setting the preset data integrity, the preset data transmission rate mutation value and the preset integrity difference value, the transmission condition of the system can be preliminarily judged according to the actual data integrity, the data transmission condition of the system can be further judged according to the data transmission rate detected by the data transmission rate detection device, the delay transmission detection duration can be adjusted according to the difference value of the actual data integrity and the preset data integrity, the accuracy of data integrity verification, the accurate monitoring of the data transmission rate of the data integrity verification and the data integrity verification efficiency are improved, and the accuracy and the verification efficiency of the data integrity verification are improved.
Specifically, in step S4, when the data integrity verification module receives the data transmitted from the user terminal, the central control module determines the data transmission condition of the system according to the actual integrity S of the data received by the data integrity verification module, and the central control module is provided with a preset first preset integrity S1, a second preset integrity S2 and a third preset integrity S3, where S1 < S2 < S3,
if S is not more than S1, the central control module preliminarily judges that the system is intercepted and carries out reverse tracking on the equipment intercepting the data;
if S1 is greater than S2, the central control module preliminarily judges that the data transmission is poor and controls the data transmission rate detection device to detect the data transmission rate;
if S2 is larger than S3, the central control module preliminarily judges that data transmission is not finished and delay detection is required, calculates the difference value Delta S between the actual integrity and the preset integrity and determines the delay detection time length according to the Delta S;
if S is greater than S3, the central control module judges that the data integrity is qualified and the data transmission is normal.
According to the method, the first preset integrity, the second preset integrity and the third preset integrity are preset, so that the data transmission condition of the system can be judged according to the actual integrity, the accurate judgment of the data integrity verification is improved, and the accuracy and the verification efficiency of the data integrity verification are further improved.
Specifically, when the central control module determines that S is less than or equal to S1, the central control module determines the intercepted address of the system according to whether the data transmission rate generates a sudden change in the period, the central control module is provided with a preset first data transmission rate sudden change value P1 and a preset second data transmission rate sudden change value P2, wherein P1 is less than P2,
if P is not more than P1, the central control module judges that the actual data transmission rate mutation value is in the allowable range and does not determine the address corresponding to the transmission rate mutation value;
if P is more than P1 and less than or equal to P2, the central control module judges that the actual data transmission rate mutation value exceeds an allowable range, calculates the difference value delta P between the actual data transmission rate mutation value and a preset first data transmission rate mutation value, further determines whether interception exists according to the delta P, and sets delta P = P-P1;
and if P is more than P2, the central control module judges that the actual data transmission rate mutation value exceeds the allowable range, determines the address corresponding to the mutation value as the address intercepted by the system and sends the address to the server for storage.
The method of the invention can determine the intercepted address of the system according to whether the data transmission rate generates the mutation or not in the period by setting the preset first data transmission rate mutation value and the preset second data transmission rate mutation value, thereby improving the supervision capability of the data transmission process and further realizing the improvement of the accuracy and the verification efficiency of the data integrity verification.
Specifically, when the central control module judges that P is more than P1 and less than or equal to P2, whether interception exists is further judged according to the difference value delta P between the actual data transmission rate mutation value and the preset data transmission rate mutation value, the central control module is provided with a preset first data transmission rate mutation value difference value delta P1 and a preset second data transmission rate mutation difference value delta P2, wherein delta P1 is less than delta P2,
if the delta P is less than or equal to the delta P1, the central control module judges that the difference value of the actual data transmission rate mutation value and the preset data transmission rate mutation value is in an allowable range and judges that the address corresponding to the transmission rate mutation value is not determined;
if delta P1 is smaller than delta P and is not larger than delta P2, the central control module judges that the difference value of the actual data transmission rate mutation value and the preset data transmission rate mutation value is in an allowable range and sends an address corresponding to the transmission rate mutation value to the server to serve as a reserved address;
if delta P is > -delta P2, the central control module judges that the difference value between the actual data transmission rate mutation value and the preset data transmission rate mutation value exceeds the allowable range, determines the address corresponding to the mutation value as the address intercepted by the system, and sends the address to the server for storage.
According to the method, the difference value of the preset first data transmission rate mutation value and the preset second data transmission rate mutation value are set, whether interception exists can be further judged according to the difference value delta P of the actual data transmission rate mutation value and the preset data transmission rate mutation value, the accurate identification capability of whether the interception condition exists in the data transmission process is improved, and the accuracy and the verification efficiency of data integrity verification are further improved.
Specifically, the central control module further determines the data transmission situation according to the actual data transmission rate detected by the actual transmission rate detection device when the determination S1 is greater than S2, the central control module is provided with a preset first transmission rate Q1 and a preset second transmission rate Q2, wherein Q1 is less than Q2,
if Q is not more than Q1, the central control module judges that the network environment is congested and sends out an alarm of poor transmission;
if Q is more than Q1 and less than or equal to Q2, the central control module judges that data transmission is poor, detects the load of the server and judges whether to postpone tasks which are simultaneously carried out in the load of the server or not according to the load;
if Q is more than Q2, the central control module determines that the data transmission rate is qualified and the data is intercepted.
According to the method, the preset first transmission rate and the preset second transmission rate are set, so that the data transmission condition can be further judged according to the actual data transmission rate detected by the actual transmission rate detection device, the accurate judgment capability of data transmission is improved, and the accuracy and the verification efficiency of data integrity verification are further improved.
Specifically, when the central control module determines that Q1 is greater than Q and less than or equal to Q2, the central control module controls the load detection device to detect whether the load amount simultaneously transmitted by the server delays the data transmission task which is simultaneously performed to perform determination, the central control module is provided with a preset first transmission load amount D1 and a preset second transmission load amount D2, wherein D1 is greater than D2,
if D is less than or equal to D1, the central control module judges that the actual transmission load is lower than the allowable range and increases the number of the transmitted data blocks;
if D1 is greater than D and less than or equal to D2, the central control module judges that the actual transmission load is within the allowable range and does not delay the data transmission tasks transmitted simultaneously;
if D is larger than D2, the central control module judges that the actual transmission load quantity exceeds the allowable range and postpones the data transmission task transmitted simultaneously.
According to the method, the first transmission load capacity and the second transmission load capacity are preset, whether the data transmission tasks which are simultaneously transmitted are delayed or not can be judged according to the detected simultaneously transmitted load capacity, the accurate adjustment capacity of the data transmission tasks is improved, and the accuracy and the verification efficiency of the data integrity verification are further improved.
Specifically, when the central control module determines that S is greater than S2 and less than or equal to S3, the delay time duration is determined according to the difference value deltaS between the actual integrity and the preset integrity of the data received by the data integrity verification module, and deltaS = S3-S, the central control module is provided with a preset first preset integrity difference value deltaS 1, a second preset integrity difference value deltaS 2, a first preset delay time duration t1 and a second preset delay time duration t2, deltaS 1 is less than deltaS 2, t1 is less than t2,
if the time length of 0 & ltdelta & gt is less than or equal to the time length of delta & ltdelta & gt 1, the central control module judges that the receiving of the data by the verification module is delayed for t1 time length detection;
if the time length of the delta S1 is less than or equal to the time length of the delta S2, the central control module judges that the time length of the data receiving delay t2 of the verification module is longer and then detects the data;
and if the delta S is > -the delta S2, the central control module judges that the data transmission is poor and carries out secondary detection on the data transmission rate.
According to the method, the preset first preset integrity difference value, the preset second integrity difference value, the first preset delay time t1 and the second preset delay time are set, so that the delay time can be determined according to the difference between the actual integrity and the preset integrity, the accurate determination of the delay time is realized, and the accuracy and the verification efficiency of data integrity verification are further improved.
Specifically, after the central control module delays t1, the central control module controls the data integrity detection program to detect the data integrity S' again,
if S' > S3, the central control module determines that the data is not intercepted and does not perform backward tracing on the data;
and if S' is less than or equal to S3, the central control module judges that the data is intercepted and carries out backward tracing.
The method of the invention can further judge the data integrity by re-detecting the data integrity after the delay time, improves the deep confirmation capability of the transmission process influencing the data integrity, and further realizes the improvement of the accuracy and the verification efficiency of the data integrity verification.
Specifically, after the central control module delays t2, the central control module controls the data integrity detection program to detect the data integrity S 'again and further determines whether the data is intercepted according to the difference between S' and S3,
if S' > S3, the central control module judges that the data has the condition of poor transmission and sends out data transmission problem alarm;
if S 'is less than or equal to S3, calculating Delta S', and setting Delta S '= S3-S';
if the value of Delta S is more than 0 and less than or equal to Delta S1, the central control module determines to delay for a time period of t1 and detects the data transmission rate Q to determine whether the condition of poor data transmission exists;
if the delta S1 is smaller than the delta S and is less than or equal to the delta S2, the central control module judges that the data are intercepted and sends out an alarm for intercepting the data;
if the delta S is more than the delta S2, the central control module judges that the data transmission is blocked and sends out a data transmission problem alarm.
The method provided by the invention realizes further accurate determination of the data transmission process condition related to the data integrity by controlling the data integrity detection program to detect the data integrity again and further judging whether the data is intercepted, and further realizes improvement of the accuracy and the verification efficiency of the data integrity verification.
Referring to fig. 2, a system for block chain-based data integrity verification using the method of any one of claims 1 to 9 includes:
the user terminal is used for carrying out blocking operation and data encryption operation on the data and sending the data subjected to the blocking operation and the encryption to the server;
the encryption module is connected with the user terminal and is used for encrypting the data block transmitted by the user terminal;
the server is connected with the encryption module and used for receiving the data encryption information transmitted by the encryption module, decrypting the data encryption confidence, searching whether the block chain has the same data information as the data information sent by the user terminal according to the decrypted data after the information decryption is finished, and sending the data information to the data integrity verification module;
and the data integrity verification module is connected with the server and used for verifying the integrity of the data transmitted by the user terminal according to the data information received by the server.
The system provided by the invention can verify the data integrity by arranging the user terminal, the server and the data integrity verification module, improves the accuracy of data integrity verification, and further improves the accuracy and the verification efficiency of data integrity verification.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention; various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The data integrity verification method based on the block chain is characterized by comprising the following steps:
step S1, before the integrity verification of the data is started, the central control module controls the user terminal to perform data blocking operation and transmits each data block which is completed by data blocking to the encryption module;
step S2, when the encryption module finishes receiving the data blocks, the central control module controls the encryption module to encrypt each data block and sends the encrypted data blocks to a server;
step S3, when the server receives the data block transmitted by the encryption module, the central control module controls the server to decrypt each data block, and according to the decrypted data, searches whether the same data information as the data information sent by the user terminal exists in the block chain, sends the data information to the data integrity verification module, and detects the transmission rate of the data in the process of transmitting the data to the data integrity verification module through the user terminal;
step S4, when the central control module judges that the uploading time of the data information reaches the preset transmission time, the central control module carries out primary judgment on the transmission condition of the system according to the integrity of the data actually transmitted to the data integrity verification module, and further judges the data transmission condition of the system according to the data transmission rate detected by the data transmission rate detection device, when the central control module finishes the judgment on the data transmission condition, the time length of delayed transmission detection is adjusted according to the difference value of the integrity of the actual data and the integrity of the preset number, and after the delay time, the central control module controls the verification module to carry out secondary detection on the integrity of the data and further judges the transmission condition of the data.
2. The method of claim 1, wherein in the step S4, when the data integrity verification module receives the data transmitted from the user terminal, the central control module determines the data transmission status of the system according to the actual integrity S of the data received by the data integrity verification module, and the central control module has a preset first preset integrity S1, a second preset integrity S2 and a third preset integrity S3, wherein S1 < S2 < S3,
if S is not more than S1, the central control module preliminarily judges that the system is intercepted and carries out reverse tracking on the equipment intercepting the data;
if S1 is greater than S2, the central control module preliminarily judges that the data transmission is poor and controls the data transmission rate detection device to detect the data transmission rate;
if S2 is larger than S3, the central control module preliminarily judges that data transmission is not finished and delay detection is required, calculates the difference value Delta S between the actual integrity and the preset integrity and determines the delay detection time length according to the Delta S;
if S is greater than S3, the central control module judges that the data integrity is qualified and the data transmission is normal.
3. The method of claim 2, wherein the central control module determines the intercepted address according to whether the data transmission rate changes abruptly within a period when the determination S is less than or equal to S1, the central control module has a preset first data transmission rate abrupt change value P1 and a preset second data transmission rate abrupt change value P2, wherein P1 < P2,
if P is not more than P1, the central control module judges that the actual data transmission rate mutation value is in the allowable range and does not determine the address corresponding to the transmission rate mutation value;
if P is more than P1 and less than or equal to P2, the central control module judges that the actual data transmission rate mutation value exceeds an allowable range, calculates the difference value delta P between the actual data transmission rate mutation value and a preset first data transmission rate mutation value, further determines whether interception exists according to the delta P, and sets delta P = P-P1;
and if P is more than P2, the central control module judges that the actual data transmission rate mutation value exceeds the allowable range, determines the address corresponding to the mutation value as the address intercepted by the system and sends the address to the server for storage.
4. The method of claim 3, wherein the central control module further determines whether there is an interception based on a difference Δ P between an actual data transmission rate mutation value and a preset data transmission rate mutation value when determining P1 < P ≦ P2, the central control module having a preset first data transmission rate mutation value difference Δ P1 and a preset second data transmission rate mutation difference Δ P2, wherein Δ P1 <. DELTA.P 2,
if the delta P is less than or equal to the delta P1, the central control module judges that the difference value of the actual data transmission rate mutation value and the preset data transmission rate mutation value is in an allowable range and judges that the address corresponding to the transmission rate mutation value is not determined;
if delta P1 is smaller than delta P and is not larger than delta P2, the central control module judges that the difference value of the actual data transmission rate mutation value and the preset data transmission rate mutation value is in an allowable range and sends an address corresponding to the transmission rate mutation value to the server to serve as a reserved address;
if delta P is > -delta P2, the central control module judges that the difference value between the actual data transmission rate mutation value and the preset data transmission rate mutation value exceeds the allowable range, determines the address corresponding to the mutation value as the address intercepted by the system, and sends the address to the server for storage.
5. The method of claim 4, wherein the central control module further determines the data transmission condition according to the actual data transmission rate detected by the actual transmission rate detection device when determining S1 < S ≦ S2, wherein the central control module is provided with a preset first transmission rate Q1 and a preset second transmission rate Q2, wherein Q1 < Q2,
if Q is not more than Q1, the central control module judges that the network environment is congested and sends out an alarm of poor transmission;
if Q is more than Q1 and less than or equal to Q2, the central control module judges that data transmission is poor, detects the load of the server and judges whether to postpone tasks which are simultaneously carried out in the load of the server according to the load;
if Q is more than Q2, the central control module determines that the data transmission rate is qualified and the data is intercepted.
6. The method as claimed in claim 5, wherein the central control module controls the load detection device to detect whether the load amount simultaneously transmitted by the servers is delayed for the data transmission task performed simultaneously when determining that Q1 < Q ≦ Q2, and the central control module is configured with a preset first transmission load amount D1 and a preset second transmission load amount D2, where D1 < D2,
if D is less than or equal to D1, the central control module judges that the actual transmission load is lower than the allowable range and increases the number of the transmitted data blocks;
if D1 is larger than D and is not larger than D2, the central control module judges that the actual transmission load is within the allowable range and does not delay the data transmission tasks transmitted simultaneously;
if D is larger than D2, the central control module judges that the actual transmission load exceeds the allowable range and postpones the data transmission tasks transmitted simultaneously.
7. The block chain-based data integrity verification method of claim 6, wherein the central control module determines the delay duration according to the difference Δ S between the actual integrity and the preset integrity of the data received by the data integrity verification module when the determination S2 < S ≦ S3, and sets Δ S = S3-S, the central control module is provided with a preset first preset integrity difference Δ S1, a second preset integrity difference Δ S2, a first preset delay duration t1 and a second preset delay duration t2, Δ S1 < [ delta ] S2, and t1 < t2,
if the time length of 0 & ltdelta & gt is less than or equal to the time length of delta & ltdelta & gt 1, the central control module judges that the receiving of the data by the verification module is delayed for t1 time length detection;
if the time length of the delta S1 is less than or equal to the time length of the delta S2, the central control module judges that the time length of the data receiving delay t2 of the verification module is longer and then detects the data;
and if the Delta S is more than the Delta S2, the central control module judges that the data transmission is poor and carries out secondary detection on the data transmission rate.
8. The blockchain-based data integrity verification method of claim 7, wherein after the central control module delays t1, the central control module controls the data integrity detection program to re-detect the data integrity S',
if S' > S3, the central control module determines that the data is not intercepted and does not perform backward tracing on the data;
and if S' is less than or equal to S3, the central control module judges that the data is intercepted and carries out backward tracing.
9. The blockchain-based data integrity verification method of claim 8, wherein after the central control module delays t2, the central control module controls the data integrity check program to re-check the data integrity S 'and further determines whether the data is intercepted according to the difference between S' and S3,
if S' > S3, the central control module judges that the data has the condition of poor transmission and sends out data transmission problem alarm;
if S 'is less than or equal to S3, calculating Delta S', and setting Delta S '= S3-S';
if the value of Delta S is more than 0 and less than or equal to Delta S1, the central control module determines to delay for a time period of t1 and detects the data transmission rate Q to determine whether the condition of poor data transmission exists;
if the delta S1 is smaller than the delta S and is less than or equal to the delta S2, the central control module judges that the data are intercepted and sends out an alarm for intercepting the data;
if the delta S is more than the delta S2, the central control module judges that the data transmission is blocked and sends out a data transmission problem alarm.
10. A system for using the blockchain-based data integrity verification method of any one of claims 1 to 9, comprising:
the user terminal is used for carrying out blocking operation and data encryption operation on the data and sending the data subjected to the blocking operation and the encryption to the server;
the encryption module is connected with the user terminal and is used for encrypting the data block transmitted by the user terminal;
the server is connected with the encryption module and used for receiving the data encryption information transmitted by the encryption module, decrypting the data encryption confidence, searching whether the block chain has the same data information as the data information sent by the user terminal according to the decrypted data after the information decryption is finished, and sending the data information to the data integrity verification module;
and the data integrity verification module is connected with the server and used for verifying the integrity of the data transmitted by the user terminal according to the data information received by the server.
CN202210635675.8A 2022-06-07 2022-06-07 Block chain-based data integrity verification method and system Pending CN115118460A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210635675.8A CN115118460A (en) 2022-06-07 2022-06-07 Block chain-based data integrity verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210635675.8A CN115118460A (en) 2022-06-07 2022-06-07 Block chain-based data integrity verification method and system

Publications (1)

Publication Number Publication Date
CN115118460A true CN115118460A (en) 2022-09-27

Family

ID=83325892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210635675.8A Pending CN115118460A (en) 2022-06-07 2022-06-07 Block chain-based data integrity verification method and system

Country Status (1)

Country Link
CN (1) CN115118460A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760935A (en) * 2023-08-21 2023-09-15 湖南马栏山视频先进技术研究院有限公司 Data fence system based on image data transmission
CN116824824A (en) * 2023-01-28 2023-09-29 太原杰安易科技有限公司 Wireless signal acquisition and transmission system based on node controller for coal dressing

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811450A (en) * 2015-04-22 2015-07-29 电子科技大学 Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing
KR101586439B1 (en) * 2014-08-29 2016-01-18 고려대학교 산학협력단 User data integrity verification method and apparatus capable of guaranteeing privacy
US20170331837A1 (en) * 2014-12-08 2017-11-16 Samsung Electronics Co., Ltd. Method and apparatus for providing integrity check data
KR20180029846A (en) * 2016-09-13 2018-03-21 현대자동차주식회사 Method for communication based on automotive safety integrity level in automotive network and apparatus for the same
US20190354133A1 (en) * 2018-05-21 2019-11-21 Samsung Electronics Co., Ltd. System for transceiving data based on clock transition time
CN113553627A (en) * 2021-09-23 2021-10-26 四川大学 Block chain-based data integrity verification method, system, device and medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101586439B1 (en) * 2014-08-29 2016-01-18 고려대학교 산학협력단 User data integrity verification method and apparatus capable of guaranteeing privacy
US20170331837A1 (en) * 2014-12-08 2017-11-16 Samsung Electronics Co., Ltd. Method and apparatus for providing integrity check data
CN104811450A (en) * 2015-04-22 2015-07-29 电子科技大学 Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing
KR20180029846A (en) * 2016-09-13 2018-03-21 현대자동차주식회사 Method for communication based on automotive safety integrity level in automotive network and apparatus for the same
US20190354133A1 (en) * 2018-05-21 2019-11-21 Samsung Electronics Co., Ltd. System for transceiving data based on clock transition time
CN113553627A (en) * 2021-09-23 2021-10-26 四川大学 Block chain-based data integrity verification method, system, device and medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116824824A (en) * 2023-01-28 2023-09-29 太原杰安易科技有限公司 Wireless signal acquisition and transmission system based on node controller for coal dressing
CN116824824B (en) * 2023-01-28 2023-11-21 太原杰安易科技有限公司 Wireless signal acquisition and transmission system based on node controller for coal dressing
CN116760935A (en) * 2023-08-21 2023-09-15 湖南马栏山视频先进技术研究院有限公司 Data fence system based on image data transmission
CN116760935B (en) * 2023-08-21 2023-10-17 湖南马栏山视频先进技术研究院有限公司 Data fence system based on image data transmission

Similar Documents

Publication Publication Date Title
CN115118460A (en) Block chain-based data integrity verification method and system
US6978017B2 (en) Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system
US8239676B2 (en) Secure proximity verification of a node on a network
US5440633A (en) Communication network access method and system
US8051292B2 (en) System for proximity determination
US6223286B1 (en) Multicast message transmission device and message receiving protocol device for realizing fair message delivery time for multicast message
CN101036341B (en) Regular content check system
CN112968910B (en) Replay attack prevention method and device
CN114826780B (en) Block chain based multi-level authority management system and method
CN117812582B (en) Guard mode data supervision method and system for vehicle
CN111583482A (en) Access control system based on two-dimensional code and control method thereof
CN112702417B (en) Method for preventing replay of edge calculation message
CN112667928B (en) Prefix and identification data secure subscription method and system based on Handle system
CN116980138A (en) Online transaction security system
CN116527365A (en) System and method for realizing air traffic control heterogeneous data sharing
CN110446207A (en) A kind of production of cigarettes area illegal wireless access positioning and blocking-up method
CN115001713B (en) Instant message encryption system based on commercial cryptographic algorithm in medical field
US20020069357A1 (en) Method and system for identification in a telecommunication system
CN114372251B (en) Credit data security and privacy protection method
CN113794780B (en) Site real-time control method and system for platform area edge terminal
CN116541386A (en) Automatic information deleting method and system based on time synchronization and trusted time counting
Bocan et al. Adaptive threshold puzzles
CN117319011A (en) Communication safety monitoring system and method based on big data
CN115765972A (en) Md 5-based web login password encryption method and system
CN118337777A (en) Network communication safety protection system based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination