CN115776396A - Data processing method and device, electronic equipment and storage medium - Google Patents
Data processing method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN115776396A CN115776396A CN202211449036.9A CN202211449036A CN115776396A CN 115776396 A CN115776396 A CN 115776396A CN 202211449036 A CN202211449036 A CN 202211449036A CN 115776396 A CN115776396 A CN 115776396A
- Authority
- CN
- China
- Prior art keywords
- data
- service
- block chain
- party
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
According to the data processing method, the data processing device, the electronic equipment and the storage medium, the service data are identified, the classification grading information of the service data is determined, the service data are subjected to encryption desensitization processing based on the classification grading information, the data subjected to encryption desensitization processing are uploaded to the block chain, the data can be managed through the block chain under the condition that the privacy of a user is protected, and the data can be disclosed, transparent and shared to a greater extent.
Description
Technical Field
The present application relates to the field of car networking technologies, and in particular, to a data processing method and apparatus, an electronic device, and a storage medium.
Background
The data of the internet of vehicles relates to a large amount of user privacy data, such as vehicle models, VINs, personal names and identity information, the data of the internet of vehicles sometimes needs to be disclosed and shared, such as vehicle insurance pricing of financial institutions, road condition statistics and data evidence obtaining of traffic management departments, and the like, the disclosure and the sharing are always in conflict with data privacy protection, the disclosure and the sharing can be selected from two, in addition, the retention and the auditing of the data of a service party cannot be falsified, the credibility of the data disclosure is difficult to guarantee, and the data are more difficult to share and deeply mine and utilize.
Disclosure of Invention
The present application provides a data processing method, an apparatus, an electronic device, and a storage medium for solving the above-mentioned problems in the related art.
The application provides a data processing method, which comprises the following steps:
acquiring service data of the Internet of vehicles equipment;
identifying the service data and determining classification grading information of the service data;
carrying out encryption desensitization processing on the service data based on the classification grading information;
and uploading the data subjected to encryption desensitization processing to a block chain so as to manage the service data based on the block chain.
In some embodiments, the encrypted desensitized data carries identity information; the method further comprises the following steps:
acquiring the setting information of the owner of the service data, wherein the setting information comprises: aging, decrypting authorization and authorizing data;
authenticating the owning party based on the identity information;
and after the authentication is passed, recording the aging, the decryption authorization and the authorization data on a block chain.
In some embodiments, the method further comprises:
under the condition of acquiring a data request of a data user, performing identity authentication on the data user;
under the condition that the identity authentication of the data user is passed, extracting the authorization data based on the block data of the block chain;
and decrypting the authorized data based on the decryption authorization, and sending the decrypted data to the data user.
In some embodiments, the method further comprises:
acquiring registration information of a participant;
and under the condition that the registration information is legal, generating a public key and a private key of the data user, generating a block chain certificate, carrying out hash operation on the block chain certificate to generate a hash value, and recording the hash value on a block chain.
In some embodiments, the authenticating the data consumer in the case of acquiring the data request of the data consumer comprises:
under the condition of acquiring a data request of a data user, sending a first random number to the data requester;
acquiring response information of the data requester, wherein the response information comprises: the data request party uses a random signature generated by a private key of the service party, a hash value of the block chain certificate and a first random number;
verifying whether the first random number is valid, and verifying whether the hash value exists and is in a valid state;
generating a session key under the condition that the first random number is valid and the hash value exists and is valid, encrypting a second random number by using the session key, and encrypting the session key and a public key of a service party by using a public key of the data user;
and sending the encrypted session key, a second random number and a public key of a service party to the data using party so that the data using party decrypts the encrypted session key, the second random number and the public key of the service party based on a private key of the data applicable party and verifies the validity of the second random number, wherein the identity authentication of the data using party is determined to be passed under the condition that the data using party determines that the second random number is valid.
In some embodiments, the method further comprises:
generating a session key under the condition that the identity authentication of the data user is determined to pass;
and performing communication between the data user and the service party based on the session key.
In some embodiments, the method further comprises:
obtaining the effective duration of a session key;
and updating the session key when the effective duration is reached.
An embodiment of the present application provides a data processing apparatus, including:
the acquisition module is used for acquiring service data of the Internet of vehicles equipment;
the determining module is used for identifying the service data and determining classification grading information of the service data;
the encryption module is used for carrying out encryption desensitization processing on the service data based on the classification grading information;
and the uploading module is used for uploading the data subjected to encryption desensitization processing to the block chain so as to manage the service data based on the block chain.
An embodiment of the present application provides an electronic device, which includes a memory and a processor, where the memory stores a computer program, and when the computer program is executed by the processor, the electronic device executes any one of the data processing methods described above.
The embodiment of the application provides a storage medium, which stores a computer program capable of being executed by one or more processors and capable of being used for realizing any one of the data processing methods.
According to the data processing method, the data processing device, the electronic equipment and the storage medium, the service data are identified, the classification grading information of the service data is determined, the service data are subjected to encryption desensitization processing based on the classification grading information, the data subjected to encryption desensitization processing are uploaded to the block chain, the data can be managed through the block chain under the condition that the privacy of a user is protected, and the data can be disclosed, transparent and shared to a greater extent.
Drawings
The present application will be described in more detail hereinafter on the basis of embodiments and with reference to the accompanying drawings.
Fig. 1 is a schematic flow chart illustrating an implementation of a data processing method according to an embodiment of the present application;
FIG. 2 is a block diagram of a data processing system according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
In the drawings, like parts are designated with like reference numerals, and the drawings are not drawn to scale.
Detailed Description
In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the accompanying drawings, the described embodiments should not be considered as limiting the present application, and all other embodiments obtained by a person of ordinary skill in the art without making creative efforts fall within the protection scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
The following description will be added if a similar description of "first \ second \ third" appears in the application file, and in the following description, the terms "first \ second \ third" merely distinguish similar objects and do not represent a specific ordering for the objects, and it should be understood that "first \ second \ third" may be interchanged under certain circumstances in a specific order or sequence, so that the embodiments of the application described herein can be implemented in an order other than that shown or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
The first embodiment is as follows:
based on the problems in the related art, embodiments of the present application provide a data processing method, which is applied to an electronic device, and the electronic device may be a mobile terminal, a computer, or the like. In some embodiments, the electronic device may be a server of a block chain, and the functions implemented by the data processing method provided in the embodiments of the present application may be implemented by a processor of the electronic device calling a program code, where the program code may be stored in a computer storage medium.
An embodiment of the present application provides a data processing method, and fig. 1 is a schematic flow chart illustrating an implementation of the data processing method provided in the embodiment of the present application, and as shown in fig. 1, the data processing method includes:
and S1, acquiring service data of the Internet of vehicles.
In this application embodiment, electronic equipment can with car networking device communication connection, can follow car networking device and acquire service data, car networking device can be vehicle event data recorder, way car unit, on-vehicle special central processing unit etc.. Fig. 2 is a schematic structural diagram of the data processing system in the embodiment of the present application, and as shown in fig. 2, the data entity is obtained from the car networking device, and then the data entity is encrypted, and the encrypted data is uploaded to the block chain product station.
The service data may include: travel records, property certificates, rating certificates, car face certificates, driving behaviors, and the like.
And S2, identifying the service data and determining classification grading information of the service data.
In the embodiment of the application, the business data can be identified through the neural network model, and the classification grading information of the business data is determined.
The classification rating information may be used to indicate a data sensitivity level, data importance information, and the like. In the embodiment of the application, the higher the sensitivity level is, the privacy data of the user can be considered.
And S3, carrying out encryption desensitization processing on the service data based on the classification grading information.
In the embodiment of the application, different classification information can correspond to different encryption desensitization processing modes, and the encryption processing mode can adopt a classification secret key management machine to encrypt, encrypt through a trusted execution environment and the like.
For example, encryption is performed using a hierarchical key manager. The encryption processing mode can be symmetric/asymmetric encryption, homotai encryption, searchable encryption, image video encryption and the like.
And S4, uploading the data subjected to encryption desensitization processing to a block chain so as to manage the service data based on the block chain.
In the embodiment of the present application, the blockchain has a special effect of decentralization and anonymization, and continuing to join fig. 2, the blockchain platform may construct an identity chain for identity authentication, a data compliance protection main chain, and a main chain and a multi-side chain structure of a data security sharing side chain to protect the security of data. The block chain is utilized to prevent the tampering of the uplink data effectively. The flow of the uplink data can be audited and backtracked by utilizing an audit backtracking mechanism of the block chain.
In the embodiment of the application, different classification grading information is uploaded to the corresponding block chain. For example, user identity management information is uploaded to an identity authentication backbone.
In this embodiment of the application, managing the service data based on the block chain may include: and sharing, storing and the like are carried out on the business data.
According to the data processing method, the service data are identified, the classification grading information of the service data is determined, the service data are encrypted and desensitized based on the classification grading information, the data after encryption and desensitization are uploaded to the block chain, the data can be managed through the block chain under the condition that the privacy of a user is protected, and the data can be disclosed, transparent and shared to a greater extent.
In some embodiments, the encryption-desensitized data carries identity information.
The method further comprises the following steps:
step S104, obtaining the setting information of the owner of the service data, wherein the setting information comprises: age, decryption authorization and authorization data.
The user can select the data which can be accessed, namely the authorization data, and can also set the time efficiency. If the age is exceeded, then access is not possible.
And S105, authenticating the owner based on the identity information.
In the embodiment of the application, the owner can be authenticated based on the identity information. In the embodiment of the application, if the authentication is not passed, the service data cannot be set.
And step S106, after the authentication is passed, recording the time efficiency, the decryption authorization and the authorization data on the block chain.
After step S106, the method further comprises:
step S107, under the condition that the data request of the data user is acquired, the identity authentication is carried out on the data user.
In the embodiment of the present application, when a data request of a data user is obtained, sending a first random number to the data requester may be implemented by the following steps: acquiring response information of the data requester, wherein the response information comprises: the data request party uses a random signature generated by a private key of the service party, a hash value of a block chain certificate and a first random number; verifying whether the first random number is valid and verifying whether the hash value exists and is in a valid state; generating a session key under the condition that the first random number is valid and the hash value exists and is valid, encrypting a second random number by using the session key, and encrypting the session key and a public key of a service party by using a public key of the data user; and sending the encrypted session key, a second random number and a public key of the service party to the data using party so that the data using party decrypts the encrypted session key, the second random number and the public key of the service party based on the private key of the data applicable party and verifies the validity of the second random number, wherein if the data using party determines that the second random number is valid, the identity authentication of the data using party is determined to be passed.
Illustratively, the requestor sends a request to the server to access the information. The server transmits the random number R1 to the vehicle in response to the requester information. And after receiving the response information, the requesting party generates a random signature Sign by using a private key of the service party. And sending the Hash value Hash of the block chain certificate, the signature Sign and the random number R1 to the server. After receiving the message, the server checks whether R1 is valid. And the server checks and inquires whether the Hash exists and is in a valid state through the identity authentication block chain. If valid, the server generates a session key K, encrypts the random number R2 with K, encrypts K and the public key PK of the server with the public key of the requester, and sends them to the requester. The requester uses the private key to decrypt to obtain R2 and obtain the requester K and the server public key PK, checks the validity of R2 and completes the authentication of the requester to the server. After the authentication is completed, the two parties obtain the session key K for communication, and then the identity authentication of the data user is completed.
In the embodiment of the present application, the service side may be considered as a server of the blockchain.
And step S108, under the condition that the identity authentication of the data user is passed, extracting the authorization data based on the block data of the block chain.
In the embodiment of the application, the data user can only obtain the authorization data.
Step S109, decrypting the authorized data based on the decryption authorization, and sending the decrypted data to the data consumer.
According to the method provided by the embodiment of the application, identity authentication and access control are performed on data access of the block chain, a data owner can set access control and an authorization strategy on the access of the block chain, only authorized data of the data owner and data available to an authorized party are available, and uplink privacy data need to carry identity information and are matched with an identity authentication alliance chain. The block data owner performs aging and decryption authorization as needed. The data user needs to perform identity authentication before using the data, verify the authorized access authority of the service chain after passing the identity authentication, extract the authorized data according to the block data authorization if the authorized access authority is provided, and decrypt the data according to the decryption authorization. Thereby enabling further protection of the user's private data.
In some embodiments, after step S109, the method further comprises:
step S110, generating a session key under the condition that the identity authentication of the data user is confirmed to pass;
step S111, performing communication between the data user and the service party based on the session key.
In some embodiments, after step S111, the method further comprises:
step S112, obtaining the effective duration of the session key;
in step S113, the session key is updated when the valid duration is reached.
In the embodiment of the application, the security of the data can be further ensured by updating the session key in real time.
In some embodiments, before step S104, the method further comprises:
and step S114, acquiring the registration information of the participant.
In the embodiment of the present application, the participant may be a data using party or a data owning party. The registration information may be an identity or the like.
In the embodiment of the application, a chain can be endowed with a distributed identity DID, the full life cycle information of the equipment is stored in a distributed account book, key information records of processes such as certificate application, certificate issuance, signature verification, certificate reimbursement and the like are completed on the chain, and controllable traceability of links such as vehicle production, vehicle registration, property right management, vehicle owner identity authentication, vehicle networking equipment authentication and the like is realized.
In an embodiment of the application, when the vehicle is produced, the vehicle-mounted wallet generates a master key and registers a vehicle identification number of the master key as a DID identifier, the OEM can issue vehicle-specific information to the vehicle DID in the form of a verifiable certificate, the verifiable certificate comprises a set of attribute information of the vehicle, and the vehicle can provide a certificate for other subjects to prove the information of the vehicle. Meanwhile, other subjects can also provide corresponding authorization credentials to obtain certain specific attribute information of the vehicle for authorized access.
In the embodiment of the application, after the registration information is obtained, the legality and novelty of the registration information can be verified.
And under the condition that the registration information is legal, generating a public key and a private key of the data user, generating a block chain certificate, carrying out hash operation on the block chain certificate to generate a hash value, and recording the hash value on a block chain.
In the embodiment of the application, the certificate is automatically generated by the authentication node of the identity chain of the identity authentication and is recorded in the blockchain. Due to the anti-tampering characteristic of the block chain, compared with the X.509 certificate, the certificate does not need a signature and signature algorithm module, only the hash value of the certificate needs to be stored in the block chain as a trust certificate, and the signature process of the alliance chain CA on the certificate can be replaced. And the road side unit queries the hash value of the certificate through the identity authentication identity chain instead of the certificate signature verification process.
Example two:
based on the foregoing embodiments, an embodiment of the present application provides a data processing apparatus, where each module included in the apparatus and each unit included in each module may be implemented by a processor in a computer device; of course, the implementation can also be realized through a specific logic circuit; in the implementation process, the processor may be a Central Processing Unit (CPU), a Microprocessor Unit (MPU), a Digital Signal Processing (DSP), a Field Programmable Gate Array (FPGA), or the like.
Fig. 3 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application, and as shown in fig. 3, a data processing apparatus 300 includes:
the acquiring module 301 is used for acquiring service data of the internet of vehicles;
a determining module 302, configured to identify the service data and determine classification information of the service data;
the encryption module 303 is configured to perform encryption desensitization processing on the service data based on the classification information;
an uploading module 304, configured to upload the data after the encryption desensitization processing to the blockchain, so as to manage the service data based on the blockchain.
In some embodiments, the encrypted desensitized data carries identity information; the data processing apparatus 200 is further configured to:
acquiring the setting information of the owner of the service data, wherein the setting information comprises: aging, decrypting authorization and authorizing data;
authenticating the owner based on the identity information;
and after the authentication is passed, recording the time efficiency, the decryption authorization and the authorization data on a blockchain.
In some embodiments, the data processing apparatus 300 is further configured to:
under the condition of acquiring a data request of a data user, performing identity authentication on the data user;
extracting the authorization data based on block data of a block chain under the condition that the identity authentication of the data user is passed;
and decrypting the authorized data based on the decryption authorization, and sending the decrypted data to the data user.
In some embodiments, the data processing apparatus 300 is further configured to:
acquiring registration information of a participant;
and under the condition that the registration information is legal, generating a public key and a private key of the data user, generating a block chain certificate, carrying out hash operation on the block chain certificate to generate a hash value, and recording the hash value on a block chain.
In some embodiments, the authenticating the data consumer in the case of acquiring the data request of the data consumer comprises:
under the condition of acquiring a data request of a data user, sending a first random number to the data requester;
acquiring response information of the data requester, wherein the response information comprises: the data request party uses a random signature generated by a private key of the service party, a hash value of the block chain certificate and a first random number;
verifying whether the first random number is valid and verifying whether the hash value exists and is in a valid state;
generating a session key under the condition that the first random number is valid and the hash value exists and is valid, encrypting a second random number by using the session key, and encrypting the session key and a public key of a service party by using a public key of the data user;
and sending the encrypted session key, a second random number and a public key of a service party to the data using party so that the data using party decrypts the encrypted session key, the second random number and the public key of the service party based on a private key of the data applicable party and verifies the validity of the second random number, wherein the identity authentication of the data using party is determined to be passed under the condition that the data using party determines that the second random number is valid.
In some embodiments, the data processing apparatus 300 is further configured to:
under the condition that the identity authentication of the data user is determined to pass, generating a session key;
and performing communication between the data user and the service party based on the session key.
In some embodiments, the data processing apparatus 300 is further configured to:
obtaining the effective duration of a session key;
and updating the session key when the effective duration is reached.
It should be noted that, in the embodiment of the present application, if the data processing method is implemented in the form of a software functional module and sold or used as a standalone product, the data processing method may also be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or portions thereof contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, or an optical disk. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
Accordingly, an embodiment of the present application provides a storage medium, on which a computer program is stored, wherein the computer program is implemented to implement the steps in the data processing method provided in the foregoing embodiment when executed by a processor.
Example three:
the embodiment of the application provides an electronic device; fig. 4 is a schematic structural diagram of a component of an electronic device according to an embodiment of the present application, and as shown in fig. 4, the electronic device 400 includes: a processor 401, at least one communication bus 402, a user interface 403, at least one external communication interface 404, a memory 405. Wherein the communication bus 402 is configured to enable connective communication between these components. The user interface 403 may comprise a display screen, and the external communication interface 404 may comprise a standard wired interface and a wireless interface, among others. The processor 401 is configured to execute a program of the data processing method stored in the memory to realize the steps in the data processing method provided in the above-described embodiment.
Here, it should be noted that: the above description of the storage medium and the electronic device embodiments is similar to the description of the method embodiments described above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the embodiments of the storage medium and the apparatus of the present application, reference is made to the description of the embodiments of the method of the present application for understanding.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not imply any order of execution, and the order of execution of the processes should be determined by their functions and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application. The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of another identical element in a process, method, object, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit may be implemented in the form of hardware, or in the form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application, which are essentially or partly contributing to the prior art, can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a controller to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a magnetic or optical disk, or other various media that can store program code.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of the changes or substitutions within the technical scope of the present application, and shall cover the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (10)
1. A data processing method, comprising:
acquiring service data of the Internet of vehicles equipment;
identifying the service data and determining classification grading information of the service data;
carrying out encryption desensitization processing on the service data based on the classification grading information;
and uploading the data subjected to encryption desensitization processing to a block chain so as to manage the service data based on the block chain.
2. The method of claim 1, wherein the encryption-desensitized data carries identity information; the method further comprises the following steps:
acquiring the setting information of the owner of the service data, wherein the setting information comprises: aging, decrypting authorization and authorizing data;
authenticating the owner based on the identity information;
and after the authentication is passed, recording the aging, the decryption authorization and the authorization data on a block chain.
3. The method of claim 2, further comprising:
under the condition of acquiring a data request of a data user, performing identity authentication on the data user;
extracting the authorization data based on block data of a block chain under the condition that the identity authentication of the data user is passed;
and decrypting the authorized data based on the decryption authorization, and sending the decrypted data to the data user.
4. The method of claim 3, further comprising:
acquiring registration information of a participant;
and under the condition that the registration information is legal, generating a public key and a private key of the data user, generating a block chain certificate, performing hash operation on the block chain certificate to generate a hash value, and recording the hash value on a block chain.
5. The method of claim 4, wherein the authenticating the data consumer in the case of obtaining the data request of the data consumer comprises:
under the condition of acquiring a data request of a data user, sending a first random number to the data requester;
acquiring response information of the data requester, wherein the response information comprises: the data request party uses a random signature generated by a private key of the service party, a hash value of the block chain certificate and a first random number;
verifying whether the first random number is valid, and verifying whether the hash value exists and is in a valid state;
generating a session key under the condition that the first random number is valid and the hash value exists and is valid, encrypting a second random number by using the session key, and encrypting the session key and a public key of a service party by using a public key of the data user;
and sending the encrypted session key, a second random number and a public key of a service party to the data using party so that the data using party decrypts the encrypted session key, the second random number and the public key of the service party based on a private key of the data applicable party and verifies the validity of the second random number, wherein the identity authentication of the data using party is determined to be passed under the condition that the data using party determines that the second random number is valid.
6. The method of claim 5, further comprising:
generating a session key under the condition that the identity authentication of the data user is determined to pass;
and performing communication between the data user and the service party based on the session key.
7. The method of claim 6, further comprising:
obtaining the effective duration of a session key;
and updating the session key when the effective duration is reached.
8. A data processing apparatus, characterized by comprising:
the acquisition module is used for acquiring service data of the Internet of vehicles equipment;
the determining module is used for identifying the service data and determining classification grading information of the service data;
the encryption module is used for carrying out encryption desensitization processing on the service data based on the classification grading information;
and the uploading module is used for uploading the data subjected to encryption desensitization processing to the block chain so as to manage the service data based on the block chain.
9. An electronic device, comprising:
a memory and a processor, the memory having stored thereon a computer program which, when executed by the processor, performs the data processing method of any one of claims 1 to 7.
10. A storage medium storing a computer program executable by one or more processors and operable to implement a data processing method as claimed in any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211449036.9A CN115776396A (en) | 2022-11-18 | 2022-11-18 | Data processing method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211449036.9A CN115776396A (en) | 2022-11-18 | 2022-11-18 | Data processing method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115776396A true CN115776396A (en) | 2023-03-10 |
Family
ID=85389478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211449036.9A Pending CN115776396A (en) | 2022-11-18 | 2022-11-18 | Data processing method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115776396A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117041982A (en) * | 2023-06-26 | 2023-11-10 | 中国软件评测中心(工业和信息化部软件与集成电路促进中心) | System and method for detecting correctness of air interface transmission data |
-
2022
- 2022-11-18 CN CN202211449036.9A patent/CN115776396A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117041982A (en) * | 2023-06-26 | 2023-11-10 | 中国软件评测中心(工业和信息化部软件与集成电路促进中心) | System and method for detecting correctness of air interface transmission data |
CN117041982B (en) * | 2023-06-26 | 2024-01-23 | 中国软件评测中心(工业和信息化部软件与集成电路促进中心) | System and method for detecting correctness of air interface transmission data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107566116B (en) | Method and apparatus for digital asset weight registration | |
US11223487B2 (en) | Method and system for secure blockchain-based vehicular digital forensics | |
CN109936833B (en) | Vehicle virtual key generation and use method and system and user terminal | |
CN111464980B (en) | Electronic evidence obtaining device and method based on block chain in Internet of vehicles environment | |
CN108650220B (en) | Method and equipment for issuing and acquiring mobile terminal certificate and automobile end chip certificate | |
US7000115B2 (en) | Method and apparatus for uniquely and authoritatively identifying tangible objects | |
CN107770159B (en) | Vehicle accident data recording method and related device and readable storage medium | |
CN107146120B (en) | Electronic invoice generation method and generation device | |
CN111914293B (en) | Data access right verification method and device, computer equipment and storage medium | |
CN1938698A (en) | Method and apparatus for acquiring and removing information regarding digital rights objects | |
CN106664294A (en) | Method and system for authentication by means of tokens | |
Ammar et al. | Securing the on-board diagnostics port (obd-ii) in vehicles | |
CN111932261A (en) | Asset data management method and device based on verifiable statement | |
CN111656729B (en) | System and method for computing escrow and private session keys for encoding digital communications between two devices | |
CN115776396A (en) | Data processing method and device, electronic equipment and storage medium | |
CN101359986B (en) | Apparatus and method for direct anonymous attestation from bilinear maps | |
US9276738B2 (en) | Digital tachograph | |
CN107196965B (en) | Secure network real name registration method | |
KR102551592B1 (en) | Method for preventing mileage tampering of car and mileage recording device using the same | |
CN116484969A (en) | Training method and device of federal learning model and automobile | |
CN106027256A (en) | Identity card reading response system | |
CN116011042A (en) | Data storage method, device, system, computer equipment and storage medium | |
CN101661573B (en) | Method for producing electronic seal and method for using electronic seal | |
CN116366289A (en) | Safety supervision method and device for remote sensing data of unmanned aerial vehicle | |
CN103248490B (en) | A kind of back up the method and system of information in electronic signature token |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |