CN115118529A - Data transmission method based on block chain - Google Patents

Data transmission method based on block chain Download PDF

Info

Publication number
CN115118529A
CN115118529A CN202211036552.9A CN202211036552A CN115118529A CN 115118529 A CN115118529 A CN 115118529A CN 202211036552 A CN202211036552 A CN 202211036552A CN 115118529 A CN115118529 A CN 115118529A
Authority
CN
China
Prior art keywords
data
control module
central control
preset
actual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211036552.9A
Other languages
Chinese (zh)
Other versions
CN115118529B (en
Inventor
张恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Chuangzhi Xingkong Cloud Information Technology Co ltd
Original Assignee
Guangzhou Hongri Hengtian Photoelectric Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Hongri Hengtian Photoelectric Technology Co ltd filed Critical Guangzhou Hongri Hengtian Photoelectric Technology Co ltd
Priority to CN202211036552.9A priority Critical patent/CN115118529B/en
Publication of CN115118529A publication Critical patent/CN115118529A/en
Application granted granted Critical
Publication of CN115118529B publication Critical patent/CN115118529B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/02Capturing of monitoring data
    • H04L43/022Capturing of monitoring data by sampling
    • H04L43/024Capturing of monitoring data by sampling by adaptive sampling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of block chains, in particular to a data transmission method based on a block chain, which comprises the following steps: step S1, the data acquisition module acquires data and sends the acquired data to a block chain platform after the acquisition is finished; step S2, the block chain platform encrypts the data according to the received data and generates a first encryption key; step S3, the user side encrypts data according to the received first encryption key to obtain first encrypted data; step S4, the central control module identifies the data capacity according to the data collected by the data collection module and adjusts the data transmission monitoring frequency to a corresponding value according to the actual capacity of the data; and step S5, the central control module judges whether second encrypted data is added to the first target node according to the adjusted data leakage actual risk value. The invention realizes the improvement of the safety and the reliability of data transmission in the block chain.

Description

Data transmission method based on block chain
Technical Field
The invention relates to the technical field of block chains, in particular to a data transmission method based on a block chain.
Background
With the development of the blockchain technology, the application of the blockchain is more and more extensive, but in the process of the blockchain application, the safety problem of data transmission of the blockchain exists.
Chinese patent publication No.: CN 113987530A. Disclosed are a data transmission method and system, belonging to the block chain technical field, in particular to a data transmission method and system based on the block chain. The method comprises the following steps: encrypting data to be linked by using block chain encryption information to obtain first encrypted data; encrypting the first encrypted data by using an original secret key of the data acquisition equipment to obtain second encrypted data; and transmitting the second encrypted data to a data acquisition platform for data analysis service based on an NBIOT protocol. Therefore, the data transmission method and the data transmission system have the following problems: the security and reliability of data transmission in the block chain are insufficient.
Disclosure of Invention
Therefore, the invention provides a data transmission method based on a block chain, which is used for overcoming the problem that the safety and the reliability of data transmission in the block chain in the prior art are insufficient.
In order to achieve the above object, the present invention provides a data transmission method based on a block chain, including: step S1, the data acquisition module acquires data and sends the acquired data to the block chain platform after the acquisition is finished; step S2, the block chain platform encrypts the data according to the received data to generate a first encryption key and sends the generated first encryption key to the user terminal; step S3, the user side encrypts data according to the received first encryption key to obtain first encrypted data and sends the first encrypted data to a plurality of corresponding block chain data target nodes; step S4, when the block chain transmits data, the central control module identifies the capacity of the data according to the data acquired by the data acquisition module and adjusts the data transmission monitoring frequency to a corresponding value according to the actual capacity of the data, the central control module preliminarily judges whether to adjust the actual risk value of data leakage according to the actual data transmission speed reaching the target node and the actual capacity of the data block and adjusts the actual risk value of data leakage to the corresponding value according to the difference value between the actual data transmission speed and the preset data transmission speed when the judgment is finished; step S5, when the first target node receives the data, the central control module determines whether to add the second encrypted data to the first target node according to the adjusted data leakage actual risk value, and adjusts the encryption range of the second encrypted data to a corresponding value according to the difference between the adjusted data leakage actual risk value and the preset data leakage risk value when the determination is completed, and when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module secondarily adjusts the data monitoring frequency to a corresponding value according to the difference between the actual distance between the first target node and the second target node and the preset node distance.
Further, the central control module adjusts the monitoring frequency of the data according to the capacity E of the data block acquired by the data acquisition module, the central control module is provided with a preset first data block capacity E1 and a preset second data block capacity E2, wherein E1 is less than E2,
if E is less than or equal to E1, the central control module judges that the actual capacity of the data block is within the allowable range;
if E1 is larger than E and smaller than or equal to E2, the actual capacity of the central control module data block exceeds an allowable range, the difference value delta E between the actual capacity of the data block and the preset first data block capacity is calculated, the monitoring frequency of data transmission is adjusted according to the delta E, and delta E = E-E1 is set;
if E is larger than E2, the central control module judges that the actual capacity of the data block exceeds the allowable range, monitors the waiting time of the receiving end and judges whether to suspend the data transmission according to the waiting time.
Further, when the central control module completes the judgment of whether the data monitoring frequency is adjusted and the capacity E of the data block acquired by the data acquisition module meets E1 < E ≦ E2, the central control module adjusts the monitoring frequency of data transmission according to the difference delta E between the capacity of the actual data block and the capacity of the preset data block, and is provided with a preset first data block capacity difference delta E1, a preset second data block capacity delta E2, a preset first data monitoring frequency adjustment coefficient alpha 1, a preset second data monitoring frequency adjustment coefficient alpha 2 and a preset data monitoring frequency F0, wherein delta E1 < deltaE 2, 1 < alpha 2,
if the delta E is less than or equal to the delta E1, the central control module judges that the data monitoring frequency is not adjusted;
if delta E1 is less than delta E and less than delta E2, the central control module judges that the data monitoring frequency is adjusted by using alpha 1;
if delta E > -delta E2, the central control module determines to adjust the data monitoring frequency using alpha 2;
when the central controller adjusts the data monitoring frequency by using α i, i =1,2 is set, and the adjusted data monitoring frequency is denoted as F ', and F' = F0 × α i is set.
Further, when the central control module completes the adjustment of the data monitoring frequency and the data reaches the first target node, the central control module preliminarily determines whether to adjust the actual risk value of data leakage according to the actual data transmission speed reaching the target node and the actual data block capacity, the central control module is provided with a preset data transmission speed V0,
if V is less than or equal to V0 and E is more than E1, the central control module judges that the actual data transmission speed exceeds the allowable range, calculates the difference value delta V between the actual data transmission speed and the preset data transmission speed, adjusts the actual data leakage risk value to a corresponding value according to the delta V, and sets delta V = V0-V;
and if V is greater than V0 and E is less than or equal to E1, the central control module judges that the actual data transmission speed is within an allowable range and does not adjust the actual data leakage risk value.
Further, when the central control module finishes the determination of whether the data leakage risk exists, the actual transmission speed V of the data satisfies V not more than V0, and the actual capacity E of the data block satisfies E > E1, the central control module adjusts the preset data leakage risk value to a corresponding value according to the difference between the actual transmission speed of the data and the preset data transmission speed, the central control module is provided with a preset first data transmission speed difference Δ V1, a preset second data transmission speed difference Δ V2, a preset first data leakage risk value adjustment coefficient β 1, a preset second data leakage risk value adjustment coefficient β 2, and a preset data leakage risk value S0, wherein Δ V1 is less than Δ V2, 1 < β 2,
if the delta V is less than or equal to the delta V1, the central control module judges that the actual risk value of data leakage is not adjusted;
if delta V1 is less than delta V and less than or equal to delta V2, the central control module judges that the actual risk value of data leakage is adjusted by using beta 1;
if DeltaV is > DeltaV 2, the central control module judges that the data leakage actual risk value is adjusted by using beta 2;
when the central control module adjusts the data leakage actual risk value by using β j, j =1,2 is set, and the adjusted data leakage actual risk value is recorded as S ', and S' = S0 × (2 + β j)/3 is set.
Further, when the first target node receives the data, the central control module determines whether to add second encrypted data to the first target node according to the adjusted data leakage actual risk value, where the second encrypted data includes: the actual transmission speed from the user side to the first target node, the transmission speed of the preset data, the capacity of the data block, the adjusted actual risk value of data leakage and the distance from the first target node to the second target node, the central control module is provided with a preset first risk value S1 of data leakage and a preset second risk value S2 of data leakage, wherein S1 is less than S2,
if S' is less than or equal to S1, the central control module judges that second encrypted data are not added to the first target node;
if S1 is greater than S ' and less than or equal to S2, the central control module judges that second encrypted data are added to the first target node, calculates the difference value deltaS ' between the adjusted data leakage actual risk value and the preset risk value, and adjusts the encryption range of the second encrypted data to a corresponding value according to the deltaS ';
if S' > S2, the central control module judges whether to adjust the data monitoring frequency for the second time according to the actual distance between the first target node and the second target node of the data by adding the second encrypted data to the first target node.
Further, when the central control module completes the determination of whether to add the second encrypted data to the first target node, the central control module adjusts the encryption range of the second encrypted data to a corresponding value according to the difference between the adjusted actual risk value of data leakage and the preset risk value, the central control module is provided with a first actual risk value difference Δ S1 ', a preset second risk value difference Δ S2', a preset first encryption range adjustment coefficient γ 1, a preset encryption range adjustment coefficient γ 2 and a preset second encryption data encryption range R0, wherein Δ S1 '<Δs 2', 1 < γ 2,
if the delta S 'is less than or equal to the delta S1', the central control module judges that the encryption range of the second encrypted data is not adjusted;
if delta S1 ' <deltaS ' ≦ delta S2 ', the central control module determines to adjust the second encrypted data encryption range using gamma 1;
if Δ S '>. Δ S2', the central control module determines to adjust the encryption range of the second encrypted data using γ 2;
when the central control module adjusts the second encryption data encryption range by using γ k, setting k =1,2, and setting R '= R0 × (1 + γ k)/2 as the adjusted second encryption data encryption range is denoted as R'.
Further, when the central control module finishes adjusting the encryption range of the second encrypted data, the central control module judges whether the block chain server fails according to the difference value between the adjusted data leakage actual risk value and the preset risk value, the central control module is provided with a preset maximum data leakage risk value difference value delta Smax',
if the delta S 'is less than or equal to the delta Smax', the central control module judges that the block chain server has no fault;
and if the delta S '> [ delta ] Smax', the central control module judges that the block chain server has a fault and sends out a maintenance notice.
Further, when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module judges whether to perform secondary adjustment on the data monitoring frequency according to the actual distance D between the first target node and the second target node of the data, the central control module is provided with a preset node distance D0,
if D is not more than D0, the central control module judges that the data monitoring frequency is not adjusted for the second time;
if D is larger than D0, the central control module judges that the actual distance between the first target node and the second target node exceeds an allowable range, calculates the difference value delta D between the actual distance and the distance of the preset node, adjusts the data monitoring frequency to a corresponding value according to delta D, and sets delta D = D-D1.
Further, when the central control module completes the determination of whether to perform the secondary adjustment on the data monitoring frequency, the central control performs the secondary adjustment on the data monitoring frequency according to the difference between the actual distance between the first target node and the second target node and the preset node distance, the central control module is provided with a preset first node distance difference Δ D1, a preset second node distance difference Δ D2, a preset three-data monitoring frequency adjustment coefficient α 3 and a preset fourth data monitoring frequency adjustment coefficient α 4, wherein Δ D1 is smaller than Δ D2, 1 is larger than α 3 and smaller than α 4 and smaller than α 1 and smaller than α 2,
if the delta D is less than or equal to the delta D1, the central control module judges that the data monitoring frequency after the first adjustment is not adjusted;
if delta D1 is less than delta D and less than delta D2, the central control module performs secondary adjustment on the data monitoring frequency by using alpha 3;
if DeltaD > DeltaD 2, the central control module judges that alpha 4 is used for carrying out secondary adjustment on the data monitoring frequency;
when the central control module adjusts the data monitoring frequency by using α i, i =3,4 is set, the adjusted data monitoring frequency is recorded as F ", and F" = F' × α i is set.
Compared with the prior art, the method has the advantages that the monitoring frequency of the data can be adjusted through the preset data block capacity set by the central control module before the data are transmitted in the block chain by setting the preset data block capacity, the preset data monitoring frequency, the preset data transmission speed, the preset data leakage risk value and the preset node distance, the monitoring capability of stealing the data in the data transmission process is improved by adjusting the data monitoring frequency, the safety of data transmission is improved, when the data are transmitted in the block chain, the leakage risk value of the data is correspondingly adjusted through the preset data transmission speed set by the central control module and the actual data transmission speed, and when the first target node receives the data, the central control module secondarily adjusts the data monitoring frequency according to the distance between the first target node and the second target node, the safety of data transmission in the block chain is improved, and the safety and the reliability of data transmission in the block chain are improved.
Furthermore, the method of the invention can adjust the monitoring frequency of the data according to the size of the data block acquired by the data acquisition module by setting the preset first data block capacity and the preset second data block capacity, thereby improving the safety monitoring capability of the data in the data transmission process and further realizing the improvement of the safety and reliability of the data transmission in the block chain.
Furthermore, the method of the invention can adjust the monitoring frequency of data transmission according to the difference between the capacity of the actual data block and the capacity of the preset data block by setting the preset first data block capacity difference, the preset second data block capacity, the preset first data monitoring frequency adjustment coefficient, the preset second data monitoring frequency and the preset data monitoring frequency, thereby realizing the improvement of the data monitoring range, the monitoring capability of the stolen risk of the large-capacity data in the transmission process and further realizing the improvement of the safety and the reliability of the data transmission in the block chain.
Furthermore, by setting the preset data transmission speed, the method of the invention can preliminarily judge whether to adjust the risk value of data leakage according to the actual data transmission speed reaching the target node and the actual data block capacity, thereby improving the accurate adjustment capability of the data leakage risk and further improving the safety and reliability of data transmission in the block chain.
Furthermore, the method of the present invention adjusts the actual risk value of data leakage to a corresponding value according to the difference between the actual data transmission speed and the preset data transmission speed by setting the preset first data transmission speed difference value, the preset second data transmission speed difference value, the preset first data leakage risk value adjustment coefficient, the preset second data leakage risk value adjustment coefficient and the preset data leakage risk, so as to improve the accurate adjustment capability of the data leakage risk, realize the accurate monitoring of the safety of the data transmission process, and further realize the improvement of the safety and the reliability of the data transmission in the block chain.
Furthermore, the method of the present invention can determine whether to add the second encrypted data to the first target node according to the adjusted actual risk value of data leakage by setting the preset first data leakage risk value and the preset second data leakage risk value, thereby achieving the determination of whether to add the second encrypted data in the process of receiving data by the first target node, and further achieving the improvement of the security and reliability of data transmission in the block chain.
Furthermore, the method of the invention can adjust the encryption range of the second encrypted data to a corresponding value according to the difference between the adjusted actual risk value of data leakage and the preset risk value by setting the preset first data leakage risk value difference, the preset second data leakage risk value difference, the preset first encryption range adjustment coefficient, the preset encryption range adjustment coefficient and the preset second encrypted data encryption range, thereby improving the accurate adjustment capability of the encryption range of the second encrypted data, improving the transmission security of the first target node to the second target node, and further improving the security and reliability of data transmission in the block chain.
Furthermore, the method of the invention can judge whether the block chain server fails according to the difference between the adjusted actual risk value of data leakage and the preset risk value by setting the difference between the preset maximum actual risk value of data leakage, thereby improving the identification capability of the failure and further realizing the improvement of the safety and reliability of data transmission in the block chain.
Furthermore, the method of the invention can judge whether to adjust the data monitoring frequency for the second time according to the actual distance between the first target node and the second target node of the data by setting the preset node distance, thereby realizing the improvement of the safety of data transmission from the first target node to the second target node and further realizing the improvement of the safety and reliability of data transmission in the block chain.
Furthermore, the method of the invention can carry out secondary adjustment on the data monitoring frequency according to the difference between the actual distance between the first target node and the second target node and the distance between the preset nodes by setting the preset first node distance difference, the preset second node distance difference, the preset three-data monitoring frequency adjustment coefficient and the preset fourth data monitoring frequency adjustment coefficient, thereby further improving the data transmission safety and further realizing the improvement on the safety and the reliability of data transmission in the block chain.
Drawings
Fig. 1 is a flowchart of a data transmission method based on a block chain according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a step S4 of the method for data transmission based on a blockchain according to an embodiment of the present invention;
fig. 3 is a detailed flowchart of step S5 of the data transmission method based on block chains according to the embodiment of the present invention;
fig. 4 is a detailed flowchart of step S3 of the data transmission method based on a blockchain according to the embodiment of the present invention.
Detailed Description
In order that the objects and advantages of the invention will be more clearly understood, the invention is further described below with reference to examples; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are only for explaining the technical principle of the present invention, and do not limit the scope of the present invention.
Referring to fig. 1, fig. 2, fig. 3 and fig. 4, which are a flowchart of a data transmission method based on a block chain, a detailed flowchart of step S4, a detailed flowchart of step S5 and a detailed flowchart of step S3 according to an embodiment of the present invention, respectively, the data transmission method based on a block chain includes:
step S1, the data acquisition module acquires data and sends the acquired data to the block chain platform after the acquisition is finished;
step S2, the blockchain platform encrypts data according to the received data to generate a first encryption key and sends the generated first encryption key to the user side;
step S3, the user side encrypts data according to the received first encryption key to obtain first encrypted data and sends the first encrypted data to a plurality of corresponding block chain data target nodes;
step S4, when the block chain transmits data, the central control module identifies the capacity of the data according to the data acquired by the data acquisition module and adjusts the data transmission monitoring frequency to a corresponding value according to the actual capacity of the data, the central control module preliminarily judges whether to adjust the actual risk value of data leakage according to the actual transmission speed of the data reaching the target node and the actual capacity of the data block and adjusts the actual risk value of data leakage to the corresponding value according to the difference between the actual transmission speed of the data and the preset data transmission speed when the judgment is finished;
step S5, when the first target node receives the data, the central control module determines whether to add the second encrypted data to the first target node according to the adjusted data leakage actual risk value, and adjusts the encryption range of the second encrypted data to a corresponding value according to the difference between the adjusted data leakage actual risk value and the preset data leakage risk value when the determination is completed, and when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module secondarily adjusts the data monitoring frequency to a corresponding value according to the difference between the actual distance between the first target node and the second target node and the preset node distance.
The method of the invention can adjust the monitoring frequency of the data through the preset data block capacity set by the central control module before the data is transmitted in the block chain by setting the preset data block capacity, the preset data monitoring frequency, the preset data transmission speed, the preset data leakage risk value and the preset node distance, improves the monitoring capability of stealing the data in the data transmission process by adjusting the data monitoring frequency, improves the safety of data transmission, correspondingly adjusts the leakage risk value of the data through the preset data transmission speed set by the central control module and the actual transmission speed of the data when the data is transmitted in the block chain, and secondarily adjusts the data monitoring frequency according to the distance between the first target node and the second target node when the first target node receives the data, the safety of data transmission in the block chain is improved, and the safety and the reliability of data transmission in the block chain are improved.
Referring to fig. 1, the central control module adjusts the monitoring frequency of the data according to the capacity E of the data block acquired by the data acquisition module, and the central control module has a preset first data block capacity E1 and a preset second data block capacity E2, where E1 is less than E2,
if E is less than or equal to E1, the central control module judges that the actual capacity of the data block is within an allowable range;
if E1 is larger than E and smaller than or equal to E2, the actual capacity of the central control module data block exceeds an allowable range, the difference value delta E between the actual capacity of the data block and the preset first data block capacity is calculated, the monitoring frequency of data transmission is adjusted according to the delta E, and delta E = E-E1 is set;
if E is larger than E2, the central control module judges that the actual capacity of the data block exceeds the allowable range, monitors the waiting time of the receiving end and judges whether to suspend the data transmission according to the waiting time.
According to the method, the preset first data block capacity and the preset second data block capacity are set, the monitoring frequency of the data can be adjusted according to the size of the data block acquired by the data acquisition module, the safety monitoring capability of the data in the data transmission process is improved, and the safety and the reliability of data transmission in a block chain are further improved.
As shown in fig. 1, when the central control module completes the determination of whether to adjust the data monitoring frequency and the capacity E of the data block acquired by the data acquisition module satisfies E1 < E ≦ E2, the central control module adjusts the monitoring frequency of data transmission according to the difference Δ E between the capacity of the actual data block and the capacity of the preset data block, and the central control module is provided with a preset first data block capacity difference Δ E1, a preset second data block capacity Δ E2, a preset first data monitoring frequency adjustment coefficient α 1, a preset second data monitoring frequency adjustment coefficient α 2, and a preset data monitoring frequency F0, where E1 is less than Δ E2, and 1 < α 2,
if the delta E is less than or equal to the delta E1, the central control module judges that the data monitoring frequency is not adjusted;
if delta E1 is less than delta E and less than delta E2, the central control module judges that the data monitoring frequency is adjusted by using alpha 1;
if delta E > -delta E2, the central control module determines to adjust the data monitoring frequency using alpha 2;
when the central controller adjusts the data monitoring frequency by using α i, i =1,2 is set, and the adjusted data monitoring frequency is denoted as F ', and F' = F0 × α i is set.
According to the method, the difference value of the capacity of the preset first data block, the capacity of the preset second data block, the regulation coefficient of the preset first data monitoring frequency, the preset second data monitoring frequency and the preset data monitoring frequency are set, so that the monitoring frequency of data transmission can be regulated according to the difference value of the capacity of the actual data block and the capacity of the preset data block, the improvement of the data monitoring range is realized, the monitoring capability of the stolen risk of the large-capacity data in the transmission process is realized, and the safety and the reliability of the data transmission in a block chain are further improved.
Continuing to refer to fig. 1 and fig. 2, when the central control module completes the adjustment of the data monitoring frequency and the data reaches the first target node, the central control module preliminarily determines whether to adjust the risk value of data leakage according to the actual data transmission speed reaching the target node and the actual data block capacity, the central control module is provided with a preset data transmission speed V0,
if V is less than or equal to V0 and E is more than E1, the central control module judges that the actual data transmission speed exceeds the allowable range, calculates the difference value delta V between the actual data transmission speed and the preset data transmission speed, adjusts the actual data leakage risk value to a corresponding value according to the delta V, and sets delta V = V0-V;
and if V is greater than V0 and E is less than or equal to E1, the central control module judges that the actual data transmission speed is within an allowable range and does not adjust the actual data leakage risk value.
According to the method, the preset data transmission speed is set, whether the risk value of data leakage exists can be preliminarily judged according to the actual data transmission speed reaching the target node and the actual data block capacity, the accurate adjustment capability of the data leakage risk is improved, and the safety and the reliability of data transmission in a block chain are further improved.
Continuing to refer to fig. 2, when the central control module completes the determination of whether there is a data leakage risk, and the actual transmission speed V of the data satisfies V ≦ V0 and the actual capacity E of the data block satisfies E1, the central control module adjusts the actual data leakage risk value to a corresponding value according to the difference between the actual data transmission speed and the preset data transmission speed, and the central control module is provided with a preset first data transmission speed difference Δ V1, a preset second data transmission speed difference Δ V2, a preset first data leakage risk value adjustment coefficient β 1, a preset second data leakage risk value adjustment coefficient β 2, and a preset data leakage risk S0, where Δ V1 is less than Δ V2, 1 < β 2,
if the delta V is less than or equal to the delta V1, the central control module judges that the actual risk value of data leakage is not adjusted;
if the delta V1 is smaller than the delta V and is equal to or less than the delta V2, the central control module judges that the data leakage actual risk value is adjusted by using beta 1;
if DeltaV > DeltaV 2, the central control module judges that the data leakage actual risk value is adjusted by using beta 2;
when the central control module adjusts the data leakage actual risk value by using β j, j =1,2 is set, and the adjusted data leakage actual risk value is recorded as S ', and S' = S0 × (2 + β j)/3 is set.
According to the method, the difference value of the data transmission speed is preset, the difference value of the second data transmission speed is preset, the adjustment coefficient of the first data leakage risk value is preset, the adjustment coefficient of the second data leakage risk value is preset, and the preset data leakage risk is set, so that the actual data leakage risk value can be adjusted to the corresponding value according to the difference value of the actual data transmission speed and the preset data transmission speed, the accurate adjustment capability of the data leakage risk is improved, the accurate safety monitoring of the data transmission process is realized, and the safety and the reliability of data transmission in a block chain are further improved.
As shown in fig. 3, when the first target node receives the data, the central control module determines whether to add second encrypted data to the first target node according to the adjusted actual risk value of data leakage, where the second encrypted data includes: the actual transmission speed from the user side to the first target node, the transmission speed of the preset data, the capacity of the data block, the adjusted actual risk value of data leakage and the distance from the first target node to the second target node, the central control module is provided with a preset first risk value S1 of data leakage and a preset second risk value S2 of data leakage, wherein S1 is less than S2,
if S' is less than or equal to S1, the central control module judges that second encrypted data are not added to the first target node;
if S1 is greater than S ' and less than or equal to S2, the central control module judges that second encrypted data are added to the first target node, calculates the difference value deltaS ' between the adjusted data leakage actual risk value and the preset risk value, and adjusts the encryption range of the second encrypted data to a corresponding value according to the deltaS ';
if S' > S2, the central control module judges whether to adjust the data monitoring frequency for the second time according to the actual distance between the first target node and the second target node of the data by adding the second encrypted data to the first target node.
According to the method, the preset first data leakage risk value and the preset second data leakage risk value are set, whether the second encrypted data is added to the first target node or not can be judged according to the adjusted data leakage actual risk value, the judgment of whether the second encrypted data is added or not in the data receiving process of the first target node is achieved, and the safety and the reliability of data transmission in the block chain are further improved.
Continuing to refer to fig. 3, when the central control module completes the determination of whether to add the second encrypted data to the first target node, the central control module adjusts the encryption range of the second encrypted data to a corresponding value according to the difference between the adjusted actual risk value of data leakage and the preset risk value, and the central control module is provided with a first actual risk value difference Δ S1 ', a preset second risk value difference Δ S2', a preset first encryption range adjustment coefficient γ 1, a preset encryption range adjustment coefficient γ 2, and a preset second encryption data encryption range R0, where Δ S1 '<Δs 2', 1 < γ 2,
if the delta S 'is less than or equal to the delta S1', the central control module judges that the encryption range of the second encrypted data is not adjusted;
if Δ S1 ' <ΔS ' ≦ Δ S2 ', the central control module determines to adjust the second encrypted data encryption range using γ 1;
if Δ S '> [ Δ S2', the central control module determines to adjust the encryption range of the second encrypted data using γ 2;
when the central control module adjusts the second encryption data encryption range by using γ k, setting k =1,2, and setting R '= R0 × (1 + γ k)/2 as the adjusted second encryption data encryption range is denoted as R'.
According to the method, the preset first data leakage risk value difference value, the preset second data leakage risk value difference value, the preset first encryption range adjusting coefficient, the preset encryption range adjusting coefficient and the preset second encryption data encryption range are set, the encryption range of the second encryption data can be adjusted to a corresponding value according to the difference between the adjusted data leakage actual risk value and the preset risk value, the accurate adjusting capability of the encryption range of the second encryption data is improved, the transmission safety of the first target node to the second target node is improved, and the safety and the reliability of data transmission in a block chain are further improved.
Referring to fig. 1, when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module determines whether the blockchain server fails according to the difference between the adjusted actual risk value of data leakage and the preset risk value, the central control module has a preset maximum risk value difference Δ Smax',
if the delta S 'is less than or equal to the delta Smax', the central control module judges that the block chain server has no fault;
and if the delta S '> [ delta ] Smax', the central control module judges that the block chain server has a fault and sends out a maintenance notice.
According to the method, whether the block chain server fails or not can be judged according to the difference value between the adjusted actual risk value of data leakage and the preset risk value by setting the preset maximum data leakage risk value difference value, so that the fault identification capability is improved, and the safety and the reliability of data transmission in the block chain are further improved.
Continuing to refer to fig. 1, when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module determines whether to perform the secondary adjustment on the data monitoring frequency according to the actual distance D between the first target node and the second target node of the data, the central control module has a preset node distance D0,
if D is not more than D0, the central control module judges that the data monitoring frequency is not adjusted for the second time;
if D is larger than D0, the central control module judges that the actual distance between the first target node and the second target node exceeds an allowable range, calculates the difference value Delta D between the actual distance and the preset node distance, adjusts the data monitoring frequency to a corresponding value according to Delta D, and sets Delta D = D-D1.
According to the method, whether the data monitoring frequency is adjusted for the second time or not can be judged according to the actual distance between the first target node and the second target node of the data by setting the preset node distance, so that the safety of data transmission from the first target node to the second target node is improved, and the safety and the reliability of data transmission in a block chain are further improved.
Referring to fig. 3, when the central control module completes the determination of whether to perform the secondary adjustment on the data monitoring frequency, the central control performs the secondary adjustment on the data monitoring frequency according to the difference between the actual distance between the first target node and the second target node and the preset node distance, and the central control module is provided with a preset first node distance difference Δ D1, a preset second node distance difference Δ D2, a preset three-data monitoring frequency adjustment coefficient α 3, and a preset fourth data monitoring frequency adjustment coefficient α 4, wherein Δ D1 is less than Δ D2, 1 < α 3 < α 4 < α 1 < α 2,
if the delta D is less than or equal to the delta D1, the central control module judges that the data monitoring frequency after the first adjustment is not adjusted;
if delta D1 is less than delta D and less than delta D2, the central control module performs secondary adjustment on the data monitoring frequency by using alpha 3;
if DeltaD > DeltaD 2, the central control module judges that alpha 4 is used for carrying out secondary adjustment on the data monitoring frequency;
when the central control module adjusts the data monitoring frequency by using α i, i =3,4 is set, the adjusted data monitoring frequency is recorded as F ", and F" = F' × α i is set.
According to the method, the data monitoring frequency can be secondarily regulated according to the difference value between the actual distance between the first target node and the second target node and the distance between the preset nodes by setting the preset first node distance difference value, the preset second node distance difference value, the preset third data monitoring frequency regulation coefficient and the preset fourth data monitoring frequency regulation coefficient, so that the data transmission safety is further improved, and the safety and the reliability of data transmission in a block chain are further improved.
Example 1
In the data transmission method based on the block chain according to the embodiment of the present invention, when the central control module completes the determination of whether to adjust the data monitoring frequency, the central control module adjusts the monitoring frequency of data transmission according to the difference Δ E between the capacity of the actual data block and the capacity of the preset data block, and the central control module is provided with a preset first data block capacity difference Δ E1, a preset second data block capacity difference Δ E2, a preset first data monitoring frequency adjustment coefficient α 1, a preset second data monitoring frequency α 2, and a preset data monitoring frequency F0, where Δ E1=15G, Δ E2=20G, α 1=1.1, α 2=1.2, and F0=2Hz,
in this embodiment, Δ E =18G is obtained by the central control module, and at this time, the central control module determines that Δ E1 is less than Δ E and less than Δ E2 and adjusts the data monitoring frequency by using α 1, and the adjusted data monitoring frequency is denoted as F ', and F' =2Hz × 1.1=2.2Hz is set.
According to the method, the monitoring frequency of data transmission can be adjusted by setting the preset first data block capacity difference value, the preset second data block capacity, the preset first data monitoring frequency adjusting coefficient, the preset second data monitoring frequency and the preset data monitoring frequency, so that the data monitoring range is improved, the monitoring capability of the stolen risk of the large-capacity data in the transmission process is realized, and the safety and the reliability of data transmission in a block chain are further improved.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention; various modifications and alterations to this invention will become apparent to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A data transmission method based on a block chain is characterized by comprising the following steps:
step S1, the data acquisition module acquires data and sends the acquired data to the block chain platform after the acquisition is finished;
step S2, the blockchain platform encrypts data according to the received data to generate a first encryption key and sends the generated first encryption key to the user side;
step S3, the user side encrypts data according to the received first encryption key to obtain first encrypted data and sends the first encrypted data to a plurality of corresponding block chain data target nodes;
step S4, when the block chain transmits data, the central control module identifies the capacity of the data according to the data acquired by the data acquisition module and adjusts the data transmission monitoring frequency to a corresponding value according to the actual capacity of the data, the central control module preliminarily judges whether to adjust the actual risk value of data leakage according to the actual transmission speed of the data reaching the target node and the actual capacity of the data block and adjusts the actual risk value of data leakage to the corresponding value according to the difference between the actual transmission speed of the data and the preset data transmission speed when the judgment is finished;
step S5, when the first target node receives the data, the central control module determines whether to add the second encrypted data to the first target node according to the adjusted actual risk value of data leakage, and adjusts the encryption range of the second encrypted data to a corresponding value according to the difference between the adjusted actual risk value of data leakage and the preset risk value of data leakage when the determination is completed, and when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module secondarily adjusts the data monitoring frequency to a corresponding value according to the difference between the actual distance between the first target node and the second target node and the preset node distance.
2. The blockchain-based data transmission method according to claim 1, wherein the central control module adjusts a monitoring frequency of the data according to a capacity E of the data blocks collected by the data collection module, and the central control module is provided with a preset first data block capacity E1 and a preset second data block capacity E2, wherein E1 < E2,
if E is less than or equal to E1, the central control module judges that the actual capacity of the data block is within an allowable range;
if E1 is larger than E and smaller than or equal to E2, the actual capacity of the central control module data block exceeds an allowable range, the difference value delta E between the actual capacity of the data block and the preset first data block capacity is calculated, the monitoring frequency of data transmission is adjusted according to the delta E, and delta E = E-E1 is set;
if E is larger than E2, the central control module judges that the actual capacity of the data block exceeds the allowable range, monitors the waiting time of the receiving end and judges whether to suspend the data transmission according to the waiting time.
3. The method of claim 2, wherein when the central control module determines whether to adjust the data monitoring frequency and the capacity E of the data block collected by the data collection module satisfies E1 < E ≦ E2, the central control module adjusts the monitoring frequency of the data transmission according to the difference Δ E between the capacity of the actual data block and the capacity of the preset data block, and the central control module is provided with a preset first data block capacity difference Δ E1, a preset second data block capacity Δ E2, a preset first data monitoring frequency adjustment coefficient α 1, a preset second data monitoring frequency adjustment coefficient α 2, and a preset data monitoring frequency F0, wherein Δ E1 < [ delta ] E2, and 1 < α 2,
if the delta E is less than or equal to the delta E1, the central control module judges that the data monitoring frequency is not adjusted;
if delta E1 is less than delta E and less than delta E2, the central control module judges that the data monitoring frequency is adjusted by using alpha 1;
if delta E > -delta E2, the central control module determines to adjust the data monitoring frequency using alpha 2;
when the central controller adjusts the data monitoring frequency by using α i, i =1,2 is set, and the adjusted data monitoring frequency is denoted as F ', and F' = F0 × α i is set.
4. The blockchain-based data transmission method according to claim 3, wherein when the central control module completes the adjustment of the data monitoring frequency and data reaches a first target node, the central control module preliminarily determines whether to adjust the actual risk value of data leakage according to an actual data transmission speed reaching the target node and an actual data block capacity, the central control module is provided with a preset data transmission speed V0,
if V is less than or equal to V0 and E is more than E1, the central control module judges that the actual data transmission speed exceeds the allowable range, calculates the difference value delta V between the actual data transmission speed and the preset data transmission speed, adjusts the actual data leakage risk value to a corresponding value according to the delta V, and sets delta V = V0-V;
and if V is greater than V0 and E is less than or equal to E1, the central control module judges that the actual data transmission speed is within an allowable range and does not adjust the actual data leakage risk value.
5. The block chain-based data transmission method according to claim 4, wherein when the central control module completes the determination of whether there is a risk of data leakage and the actual transmission speed V of the data satisfies V0 and the actual capacity E of the data block satisfies E > E1, the central control module adjusts the actual risk value of data leakage to a corresponding value according to the difference between the actual transmission speed of the data and a preset data transmission speed, and the central control module is provided with a preset first data transmission speed difference Δ V1, a preset second data transmission speed difference Δ V2, a preset first data leakage risk value adjustment coefficient β 1, a preset second data leakage risk value adjustment coefficient β 2, and a preset data leakage risk value S0, wherein Δ V1 is less than Δ V2, 1 < β 2,
if the delta V is less than or equal to the delta V1, the central control module judges that the actual risk value of data leakage is not adjusted;
if delta V1 is less than delta V and less than or equal to delta V2, the central control module judges that the actual risk value of data leakage is adjusted by using beta 1;
if DeltaV > DeltaV 2, the central control module judges that the data leakage actual risk value is adjusted by using beta 2;
when the central control module adjusts the data leakage actual risk value by using β j, j =1,2 is set, and the adjusted data leakage actual risk value is recorded as S ', and S' = S0 × (2 + β j)/3 is set.
6. The blockchain-based data transmission method according to claim 5, wherein when the first target node receives the data, the central control module determines whether to add second encrypted data to the first target node according to the adjusted actual risk value of data leakage, where the second encrypted data includes: the actual transmission speed from the user side to the first target node, the transmission speed of the preset data, the capacity of the data block, the adjusted actual risk value of data leakage and the distance from the first target node to the second target node, the central control module is provided with a preset first risk value S1 of data leakage and a preset second risk value S2 of data leakage, wherein S1 is less than S2,
if S' is less than or equal to S1, the central control module judges that second encrypted data are not added to the first target node;
if S1 is greater than S ' and less than or equal to S2, the central control module judges that second encrypted data are added to the first target node, calculates the difference value deltaS ' between the adjusted data leakage actual risk value and the preset risk value, and adjusts the encryption range of the second encrypted data to a corresponding value according to the deltaS ';
if S' > S2, the central control module judges whether to adjust the data monitoring frequency for the second time according to the actual distance between the first target node and the second target node of the data by adding the second encrypted data to the first target node.
7. The blockchain-based data transmission method according to claim 6, wherein when the central control module completes the determination of whether to add the second encrypted data at the first target node, the central control module adjusts the encryption range of the second encrypted data to a corresponding value according to a difference between the adjusted actual risk value of data leakage and a preset risk value, the central control module is provided with a first data leakage risk value difference Δ S1 ', a preset second data leakage risk value difference Δ S2', a preset first encryption range adjustment coefficient γ 1, a preset encryption range adjustment coefficient γ 2, and a preset second encrypted data encryption range R0, wherein Δ S1 '<ΔS 2', 1 < γ 2,
if the delta S 'is less than or equal to the delta S1', the central control module judges that the encryption range of the second encrypted data is not adjusted;
if Δ S1 ' <ΔS ' ≦ Δ S2 ', the central control module determines to adjust the second encrypted data encryption range using γ 1;
if Δ S '> [ Δ S2', the central control module determines to adjust the encryption range of the second encrypted data using γ 2;
when the central control module adjusts the second encryption data encryption range by using γ k, setting k =1,2, and setting R '= R0 × (1 + γ k)/2 as the adjusted second encryption data encryption range is denoted as R'.
8. The blockchain-based data transmission method according to claim 7, wherein when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module determines whether the blockchain server is faulty according to a difference between the adjusted actual risk value of data leakage and a preset risk value, the central control module has a preset maximum risk value difference Δ Smax',
if the delta S 'is less than or equal to the delta Smax', the central control module judges that the block chain server has no fault;
and if the delta S '> [ delta ] Smax', the central control module judges that the block chain server has a fault and sends out a maintenance notice.
9. The blockchain-based data transmission method according to claim 8, wherein when the central control module completes the adjustment of the encryption range of the second encrypted data, the central control module determines whether to perform a secondary adjustment on the data monitoring frequency according to an actual distance D between a first target node and a second target node of the data, the central control module is provided with a preset node distance D0,
if D is not more than D0, the central control module judges that the data monitoring frequency is not adjusted for the second time;
if D is larger than D0, the central control module judges that the actual distance between the first target node and the second target node exceeds an allowable range, calculates the difference value Delta D between the actual distance and the preset node distance, adjusts the data monitoring frequency to a corresponding value according to Delta D, and sets Delta D = D-D1.
10. The block chain-based data transmission method according to claim 9, wherein the central control module secondarily adjusts the data monitoring frequency according to a difference between an actual distance between the first target node and the second target node and a preset node distance when the central control module completes the determination of whether to secondarily adjust the data monitoring frequency, the central control module is provided with a preset first node distance difference Δ D1, a preset second node distance difference Δ D2, a preset three data monitoring frequency adjustment coefficient α 3, and a preset fourth data monitoring frequency adjustment coefficient α 4, where Δ D1 is less than Δ D2, 1 < α 3 < α 4 < α 1 < α 2,
if the delta D is less than or equal to the delta D1, the central control module judges that the data monitoring frequency after the first adjustment is not adjusted;
if delta D1 is less than delta D and less than delta D2, the central control module performs secondary adjustment on the data monitoring frequency by using alpha 3;
if DeltaD > DeltaD 2, the central control module judges that alpha 4 is used for carrying out secondary adjustment on the data monitoring frequency;
when the central control module adjusts the data monitoring frequency by using α i, i =3,4 is set, the adjusted data monitoring frequency is recorded as F ", and F" = F' × α i is set.
CN202211036552.9A 2022-08-29 2022-08-29 Data transmission method based on block chain Active CN115118529B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211036552.9A CN115118529B (en) 2022-08-29 2022-08-29 Data transmission method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211036552.9A CN115118529B (en) 2022-08-29 2022-08-29 Data transmission method based on block chain

Publications (2)

Publication Number Publication Date
CN115118529A true CN115118529A (en) 2022-09-27
CN115118529B CN115118529B (en) 2022-11-29

Family

ID=83335720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211036552.9A Active CN115118529B (en) 2022-08-29 2022-08-29 Data transmission method based on block chain

Country Status (1)

Country Link
CN (1) CN115118529B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116824824A (en) * 2023-01-28 2023-09-29 太原杰安易科技有限公司 Wireless signal acquisition and transmission system based on node controller for coal dressing
CN117614645A (en) * 2023-10-23 2024-02-27 深圳市德航智能技术有限公司 Network data transmission encryption system in industrial computer communication

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254394A (en) * 2016-09-29 2016-12-21 北京神州绿盟信息安全科技股份有限公司 A kind of recording method and device of attack traffic
CN109269556A (en) * 2018-09-06 2019-01-25 深圳市中电数通智慧安全科技股份有限公司 A kind of equipment Risk method for early warning, device, terminal device and storage medium
CN109560544A (en) * 2018-12-03 2019-04-02 国网新疆电力有限公司阿克苏供电公司 A kind of power distribution network self-healing method and application based on relay protection and Intelligent reclosing
CN111160424A (en) * 2019-12-16 2020-05-15 南方电网科学研究院有限责任公司 NFC equipment fingerprint authentication method and system based on CNN image identification
CN111353172A (en) * 2020-03-02 2020-06-30 山东工商学院 Hadoop cluster big data access method and system based on block chain
CN113839904A (en) * 2020-06-08 2021-12-24 北京梆梆安全科技有限公司 Security situation sensing method and system based on intelligent networked automobile
CN114650179A (en) * 2022-03-29 2022-06-21 中国电信股份有限公司 Risk data monitoring method, device and system, electronic equipment and storage medium
WO2022142443A1 (en) * 2020-12-30 2022-07-07 南方科技大学 Blockchain-based data processing method and apparatus, electronic device, and storage medium
WO2022148051A1 (en) * 2021-01-07 2022-07-14 南方科技大学 Blockchain risk value management method and apparatus, and electronic device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254394A (en) * 2016-09-29 2016-12-21 北京神州绿盟信息安全科技股份有限公司 A kind of recording method and device of attack traffic
CN109269556A (en) * 2018-09-06 2019-01-25 深圳市中电数通智慧安全科技股份有限公司 A kind of equipment Risk method for early warning, device, terminal device and storage medium
CN109560544A (en) * 2018-12-03 2019-04-02 国网新疆电力有限公司阿克苏供电公司 A kind of power distribution network self-healing method and application based on relay protection and Intelligent reclosing
CN111160424A (en) * 2019-12-16 2020-05-15 南方电网科学研究院有限责任公司 NFC equipment fingerprint authentication method and system based on CNN image identification
CN111353172A (en) * 2020-03-02 2020-06-30 山东工商学院 Hadoop cluster big data access method and system based on block chain
CN113839904A (en) * 2020-06-08 2021-12-24 北京梆梆安全科技有限公司 Security situation sensing method and system based on intelligent networked automobile
WO2022142443A1 (en) * 2020-12-30 2022-07-07 南方科技大学 Blockchain-based data processing method and apparatus, electronic device, and storage medium
WO2022148051A1 (en) * 2021-01-07 2022-07-14 南方科技大学 Blockchain risk value management method and apparatus, and electronic device and storage medium
CN114650179A (en) * 2022-03-29 2022-06-21 中国电信股份有限公司 Risk data monitoring method, device and system, electronic equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
邢文凯: "《基于云计算数据查询的安全索引构建方法》", 《沈阳工业大学学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116824824A (en) * 2023-01-28 2023-09-29 太原杰安易科技有限公司 Wireless signal acquisition and transmission system based on node controller for coal dressing
CN116824824B (en) * 2023-01-28 2023-11-21 太原杰安易科技有限公司 Wireless signal acquisition and transmission system based on node controller for coal dressing
CN117614645A (en) * 2023-10-23 2024-02-27 深圳市德航智能技术有限公司 Network data transmission encryption system in industrial computer communication

Also Published As

Publication number Publication date
CN115118529B (en) 2022-11-29

Similar Documents

Publication Publication Date Title
CN115118529B (en) Data transmission method based on block chain
US5440633A (en) Communication network access method and system
US7724899B2 (en) Method for controlling security channel in MAC security network and terminal using the same
US20160255500A1 (en) Methods and Apparatuses Generating a Radio Base Station Key in a Cellular Radio System
CN1134943C (en) Secure packet radio network
US20150296376A1 (en) Communication system, communication unit, and communication method
CN114710353B (en) Risk management and control system based on AIoT intelligent edge gateway
CN114375036A (en) Method and device for data synchronization of 5G network, UDM device and storage medium
CN100388849C (en) Method of cipher key management, distribution, and transfer during subscriber switch in digital cellular mobile communication system
CN117351688B (en) Equipment construction remote control system based on 5G network
CN115118460A (en) Block chain-based data integrity verification method and system
CN113328851B (en) Method and system for randomly transmitting secret key under multilink condition
CN111629451B (en) Bluetooth slave node data communication seamless roaming method and device
CN116760935B (en) Data fence system based on image data transmission
CN111787534B (en) Data encryption and decryption method and device and electronic equipment
CN115883679B (en) Data security transmission method and system based on block chain
CN116596542A (en) Mobile secure payment method and system
CN101326756A (en) Method and device for controlling security channel in EPON
CN114666053B (en) Cloud video conference key distribution method and system based on quantum key encryption
CN116208421A (en) Security authentication management and control method, device, medium and server
CN113391951B (en) Multipoint centralized remote backup disaster recovery method and system based on Ethernet simplified transmission
CN112040480B (en) Industrial control system industrial protocol communication safety prevention and control method based on 5G communication
CN115174071A (en) Safe transmission method and system for remote upgrading scene of train-mounted software
CN110446207B (en) Illegal wireless access positioning and blocking method for cigarette production area
CN111953685B (en) Dynamic electric power monitoring network security analysis system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240719

Address after: Room 309, Third Floor, Industrial Building 1, No. 10 Silk Road, Zumiao Street, Chancheng District, Foshan City, Guangdong Province 528099

Patentee after: Foshan Chuangzhi Xingkong Cloud Information Technology Co.,Ltd.

Country or region after: China

Address before: Room B201, 2f, supporting service building, No. 8, Kesheng Road, Guangzhou Private Science Park, No. 1633, Beitai Road, Baiyun District, Guangzhou, Guangdong 510000

Patentee before: Guangzhou HongRi Hengtian Photoelectric Technology Co.,Ltd.

Country or region before: China