CN115935414A - Block chain based data verification method and device, electronic equipment and storage medium - Google Patents

Block chain based data verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115935414A
CN115935414A CN202211545494.2A CN202211545494A CN115935414A CN 115935414 A CN115935414 A CN 115935414A CN 202211545494 A CN202211545494 A CN 202211545494A CN 115935414 A CN115935414 A CN 115935414A
Authority
CN
China
Prior art keywords
backup
block chain
file
configuration
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202211545494.2A
Other languages
Chinese (zh)
Inventor
邱桂尧
李俊宇
黄昌钰
李少森
杜浩滔
张哲�
任君
孙豪
朱志俊
段春莹
袁鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kunming Bureau of Extra High Voltage Power Transmission Co
Original Assignee
Kunming Bureau of Extra High Voltage Power Transmission Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kunming Bureau of Extra High Voltage Power Transmission Co filed Critical Kunming Bureau of Extra High Voltage Power Transmission Co
Priority to CN202211545494.2A priority Critical patent/CN115935414A/en
Publication of CN115935414A publication Critical patent/CN115935414A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to a data verification method and device based on a block chain, electronic equipment and a storage medium. The method comprises the following steps: responding to a starting request initiated by a third-party object, and generating a login interface; acquiring user information input in the login interface, and verifying the user information according to a preset user database to obtain a verification result; receiving a backup file uploaded by a terminal under the condition that the verification result is that the verification is passed; carrying out fragmentation processing on the backup files to obtain a plurality of backup file blocks; checking the configuration information on the block chain according to the backup file blocks to obtain a checking result; the configuration information is obtained by configuring on the block chain according to configuration file blocks stored on the block chain, and a plurality of configuration file blocks form a configuration file. By adopting the method, the verification of the file can be realized, and the security of the file is improved.

Description

Block chain based data verification method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of block chain technologies, and in particular, to a data checking method and apparatus based on a block chain, an electronic device, and a storage medium.
Background
With the development of science and technology, information management systems have appeared to help enterprises perform information management. However, with the continuous upgrade iteration of the information management system, situations such as incorrect upgrade and incorrect modification of the information management system are easy to occur, so that management of the enterprise on the version of the information management system is disordered, and even the wrong information management system is used. When the version of the information management system is wrong or not updated in time, and the like, the risk of information leakage can be caused, and further information safety accidents are caused. Therefore, how to verify whether the information management system is tampered becomes a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a block chain-based data verification method, an apparatus, an electronic device, and a storage medium, which can implement file verification.
In a first aspect, the present application provides a data checking method based on a block chain. The method comprises the following steps:
responding to a starting request initiated by a third-party object, and generating a login interface;
acquiring user information input in the login interface, and verifying the user information according to a preset user database to obtain a verification result;
receiving a backup file uploaded by a terminal under the condition that the verification result is that the verification is passed;
carrying out fragmentation processing on the backup files to obtain a plurality of backup file blocks;
verifying the configuration information on the block chain according to the plurality of backup file blocks to obtain a verification result; the configuration information is obtained by configuring on the block chain according to configuration file blocks stored on the block chain, and a plurality of configuration file blocks form a configuration file.
In one embodiment, the configuration information includes a plurality of configuration hash values; the verifying the configuration information on the block chain according to the plurality of backup file blocks to obtain a verification result includes:
performing hash processing on each backup file block to obtain a backup hash value corresponding to each backup file block;
and comparing the configured hash values on the block chain according to the backup hash value to obtain the verification result.
In one embodiment, the comparing the configuration hash values on the block chain according to the backup hash value to obtain the verification result includes:
judging whether the backup hash value corresponding to each backup file block is equal to the configured hash value at the same position on the block chain;
if yes, obtaining a first verification result representing that the verification is passed;
if not, a second checking result which represents that the checking fails is obtained.
In one embodiment, the method further comprises:
when the verification result is a second verification result representing that the verification is not passed, acquiring a configuration file block corresponding to the backup hash value and the configuration hash value which are not equal;
and marking the configuration file block as a tampered file, and acquiring address information corresponding to the tampered file based on the block chain.
In one embodiment, the method further comprises:
receiving an access request sent by the terminal;
extracting target information from the verification result according to the access request;
and sending the target information to the terminal.
In one embodiment, the method further comprises:
and copying each backup file block, and distributing the copied backup file blocks to each node of the block chain to update the configuration file.
In a second aspect, the present application further provides a data checking apparatus based on the block chain. The device comprises:
the login interface generation module is used for responding to a starting request initiated by the third-party object and generating a login interface;
the verification module is used for acquiring the user information input in the login interface and verifying the user information according to a preset user database to obtain a verification result;
the file receiving module is used for receiving the backup file uploaded by the terminal under the condition that the verification result is that the verification is passed;
the fragment processing module is used for carrying out fragment processing on the backup file to obtain a plurality of backup file blocks;
the checking module is used for checking the configuration information on the block chain according to the plurality of backup file blocks to obtain a checking result; the configuration information is obtained by configuring on the block chain according to configuration file blocks stored on the block chain, and a plurality of configuration file blocks form a configuration file.
In a third aspect, the present application further provides an electronic device. The electronic device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the data checking device based on the block chain when executing the computer program.
In a fourth aspect, the present application further provides a computer-readable storage medium. The computer-readable storage medium has a computer program stored thereon, and the computer program, when executed by a processor, implements the above block chain based data verification apparatus.
In a fifth aspect, the present application further provides a computer program product. The computer program product includes a computer program, and the computer program realizes the above data checking apparatus based on block chain when executed by a processor.
According to the data verification method and device based on the block chain, the electronic equipment and the storage medium, the backup file blocks are obtained by carrying out fragmentation processing on the backup files, the configuration information on the block chain is verified according to the plurality of backup file blocks, and the verification result is obtained, so that the judgment of whether the configuration files on the block chain are tampered is realized, and the safety of the configuration files on the block chain is improved.
Drawings
FIG. 1 is a diagram of an exemplary implementation of a blockchain-based data verification method;
FIG. 2 is a flowchart illustrating a method for block chain based data verification according to an embodiment;
FIG. 3 is a flowchart illustrating the step of determining the verification result in one embodiment;
FIG. 4 is a flowchart illustrating a method for checking data based on block chains in another embodiment;
FIG. 5 is a block diagram of an embodiment of a data checking apparatus based on block chains;
FIG. 6 is a diagram illustrating an internal structure of an electronic device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
The data verification method based on the block chain provided by the embodiment of the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be placed on the cloud or other network server. The server responds to a starting request initiated by a third-party object, generates a login interface, acquires user information input by a user on the login interface, and verifies the user information according to a preset user database to obtain a verification result; and under the condition that the verification result is that the verification is passed, receiving the backup file uploaded by the terminal, carrying out fragmentation processing on the backup file to obtain a plurality of backup file blocks, and verifying the configuration information on the block chain according to the plurality of backup file blocks to obtain a verification result, wherein the configuration information is obtained by configuring the configuration file blocks stored on the block chain, and the plurality of configuration file blocks form the configuration file. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, and the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart car-mounted devices, and the like. The portable wearable device can be a smart watch, a smart bracelet, a head-mounted device, and the like. The server 104 may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
In one embodiment, as shown in fig. 2, a block chain-based data verification method is provided, which is described by taking the method as an example applied to the server 104 in fig. 1, and includes the following steps:
step 202, a login interface is generated in response to a starting request initiated by the third party object.
The third-party object may refer to an object that does not belong to the terminal or the server, but may be an object obtained when the terminal or the server executes the program. Such as the third party object may be a script, an auxiliary APP, etc.
For example, a start button on a script stored in the terminal may be clicked, the script initiates a start request to the server according to the click of the user, and the server generates a login interface after receiving the start request.
Bat, in order to start the initial check of the backup file under D disk, and initiate the start request to the server, after the server receives the start request, produce the login interface, the user can input the user information related to oneself on the login interface.
And step 204, acquiring the user information input in the login interface, and verifying the user information according to a preset user database to obtain a verification result.
The user information may refer to information for characterizing the identity of the user, and the user information has uniqueness and legality. The user information may include account information and a login password, and the account information may be an identification card number, a job number, a mobile phone number, and the like of the user.
The user database may refer to a database that is stored in advance for validity verification of user information. The user database may be pre-stored in the server, or may be stored in other service clusters, and the user database may store a plurality of pre-set user information.
Illustratively, after a user fills user information in a login interface, the server acquires the user information filled by the user, and verifies the legality and authenticity of the user information according to a user database to obtain a verification result.
For example, when the user information includes account information and a login password, the account information and the login password stored in the server user database verify the account information and the login password filled by the user to obtain a verification result. If and only if the account information and the login password filled by the user are consistent with the account information and the login password stored in the user database, the verification is passed, and the main interface is skipped; and when the account information and the login password filled by the user are inconsistent with the account information and the login password stored in the user database, the user is refused to login.
And step 206, receiving the backup file uploaded by the terminal under the condition that the verification result is that the terminal passes the verification.
Among them, the backup file may refer to a file for preventing falsification, which is stored in advance in a legitimate terminal. The backup file may be a file of a certain version of the information management system, or may be a file including multiple versions of the information management system.
Illustratively, when the verification result is that the verification is passed, the user is a legal user, and at this time, the backup file uploaded by the user is received.
For example, after the user successfully logs in, the user may go to the blockchain management interface, and select the backup file to upload in the blockchain management interface. The terminal can upload the backup file selected by the user to the server through the TCP protocol and the IP protocol.
And step 208, carrying out fragmentation processing on the backup file to obtain a plurality of backup file blocks.
The backup file block may refer to a fragment file of the backup file.
For example, when the backup file is a program file of a certain version of the information management system, the program file may be divided into smaller segments, resulting in a plurality of backup file blocks.
The backup files are segmented to obtain a plurality of backup file blocks, so that all the persons except the content owner can not view or access the backup file blocks, and the safety of the files is improved.
In some embodiments, the fragmentation may be based on the data type of the program in the backed-up file and the application of the backed-up file.
Step 210, verifying the configuration information on the block chain according to the plurality of backup file blocks to obtain a verification result; the configuration information is obtained by configuring on the block chain according to the configuration file blocks stored on the block chain, and the plurality of configuration file blocks form a configuration file.
Wherein a configuration file may refer to a file stored on a blockchain. Such as the configuration file may be a file of versions of the information management system previously stored on the blockchain. The configuration file is also stored in the form of configuration file blocks on the blockchain, and the configuration file blocks are distributed on a plurality of nodes of the blockchain to prevent the configuration file blocks from being maliciously tampered.
The configuration information may refer to information obtained by configuring on the blockchain according to a configuration file.
Exemplarily, the configuration information on the blockchain is checked according to a plurality of backup files to obtain a check result, so as to check whether the configuration file is tampered, thereby improving the security of the file.
According to the data verification method based on the block chain, the backup file blocks are obtained by carrying out fragmentation processing on the backup files, the configuration information on the block chain is verified according to the plurality of backup file blocks, and the verification result is obtained, so that the judgment of whether the configuration files on the block chain are tampered is realized, and the safety of the configuration files on the block chain is improved.
Referring to fig. 3, in some embodiments, the configuration information includes a plurality of configuration hash values, and step 210 includes, but is not limited to, the following steps:
step 302, performing hash processing on each backup file block to obtain a backup hash value corresponding to each backup file block.
The configuration hash value may be a hash value obtained by hashing the configuration file. Each configuration hash value may be obtained by hashing a configuration file block, and the configuration hash value has uniqueness.
The backup hash value may refer to a hash value obtained by hashing the backup file block. The backup hash value is also unique.
Illustratively, the backup file blocks are subjected to hash processing, so as to obtain backup hash values corresponding to the backup file blocks.
And 304, comparing the configured hash values on the block chain according to the backup hash value to obtain a verification result.
For example, the backup hash value and the configuration hash value may be compared, and whether the backup hash value and the configuration hash value are the same or not may be determined to obtain the check result.
According to the technical scheme, the configuration hash value and the backup hash value are compared to judge whether the configuration hash value and the backup hash value are consistent, so that verification of the configuration file is achieved, and the safety of the file is improved.
In some embodiments, step 304 includes, but is not limited to, the following steps: judging whether the backup hash values corresponding to the backup file blocks are equal to the configured hash values at the same positions on the block chain; if yes, obtaining a first verification result representing that the verification is passed; if not, a second checking result which represents that the checking fails is obtained.
Specifically, in this embodiment, since the backup file and the configuration file are both fragmented into a plurality of file chunks, the configuration file is verified by comparing whether the hash values corresponding to each file chunk are equal to each other.
According to the technical scheme of the real-time exchange rate, the backup hash values corresponding to the backup file blocks are compared with the configuration hash values corresponding to the configuration file blocks one by one, so that whether the configuration file blocks are tampered or not is conveniently determined, the tampered configuration file blocks are conveniently positioned, and the tampered files are conveniently recovered subsequently.
In some embodiments, the blockchain-based data verification method further includes, but is not limited to, the steps of: when the verification result is a second verification result representing that the verification is not passed, acquiring a configuration file block corresponding to the backup hash value and the configuration hash value which are not equal; and marking the configuration file block as a tampering file, and acquiring address information corresponding to the tampering file based on the blockchain.
The address information may refer to IP address information, and after the user logs in successfully, the server records the IP address of each user.
Specifically, when the verification fails, it is indicated that the configuration file and the backup file are different, in this case, the configuration file may be maliciously tampered, or the backup file may be selected by mistake, and since the backup file is preliminarily checked, it can be considered that the configuration file is maliciously tampered at this time. At this time, the configuration file block corresponding to the backup hash value and the configuration hash value is not equal is obtained, and the configuration file block is marked as a tampered file. And then, acquiring address information corresponding to the tampered file through the record of the server based on the block chain, so as to trace the malicious tampered user and recover the configuration file.
Referring to fig. 4, in some embodiments, the method for checking data based on block chains further includes, but is not limited to, the following steps:
step 402, receiving an access request sent by a terminal.
The access request may refer to a request initiated by a user on a terminal for accessing a server. The access request carries information needed by the user.
Illustratively, the user triggers a preset button on the terminal, and the terminal sends an access request to the terminal in response to the triggering request.
And step 404, extracting target information from the verification result according to the access request.
The target information may refer to information that a user needs to obtain. For example, the information may be a detailed description of hash processing or a detailed description of a configuration file.
Illustratively, the server may extract the target information from the verification result according to the access request.
In some embodiments, when the configuration file is an information management system, the operation description of the information management system, such as an operated video tutorial, an operated picture tutorial, and the like, may also be obtained according to the access request, and the tutorials are issued to the terminal.
And step 406, sending the target information to the terminal.
After the target information is obtained, the server can send the target information to the terminal through communication modes such as a network and the like.
In some embodiments, the blockchain-based data verification method further includes, but is not limited to, the steps of: and copying each backup file block, and distributing the copied backup file blocks to each node of the block chain to update the configuration file.
Specifically, the backup file blocks may be copied, and the copied backup file blocks may be distributed to each node of the block chain, so as to update the configuration file and recover the tampered configuration file blocks, thereby facilitating improvement of file security.
It should be noted that, during copying, a threshold may be set to ensure that there are enough redundant copies to ensure the availability and performance of the backup file, prevent the loss of the backup file, and improve the security of the file.
In some embodiments, a reliable environment may also be established by the dispersal of the blockchain and hashing the scrambled biosystems. The blockchain actively ensures that fraud is prevented safely and any user of an organization cannot violate compliance, thereby facilitating the improvement of the security of the file and preventing the configuration file from being tampered maliciously.
It should be understood that, although the steps in the flowcharts related to the embodiments are shown in sequence as indicated by the arrows, the steps are not necessarily executed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the above embodiments may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the present application further provides a data verification apparatus based on a block chain, which is used for implementing the above mentioned data verification method based on a block chain. The implementation of the solution provided by the device is similar to the implementation described in the above method.
In one embodiment, as shown in fig. 5, there is provided a data verification apparatus based on a block chain, including: a login interface generating module 502, a verification module 504, a file receiving module 506, a fragment processing module 508 and a verification module 510, wherein:
a login interface generating module 502, configured to generate a login interface in response to a start request initiated by a third party object;
the verification module 504 is configured to obtain user information input at the login interface, and verify the user information according to a preset user database to obtain a verification result;
the file receiving module 506 is configured to receive the backup file uploaded by the terminal when the verification result is that the verification is passed;
a fragment processing module 508, configured to perform fragment processing on the backup file to obtain multiple backup file blocks;
a checking module 510, configured to check the configuration information on the block chain according to the multiple backup file blocks to obtain a checking result; the configuration information is obtained by configuring on the block chain according to the configuration file blocks stored on the block chain, and the plurality of configuration file blocks form a configuration file.
In some embodiments, the verification module comprises:
and the hash processing unit is used for carrying out hash processing on each backup file block to obtain a backup hash value corresponding to each backup file block.
And the comparison unit is used for comparing the configured hash values on the block chain according to the backup hash value to obtain a check result.
In some embodiments, the comparison unit comprises:
the judgment subunit is used for judging whether the backup hash values corresponding to the backup file blocks are equal to the configured hash values at the same positions on the block chain; if yes, obtaining a first verification result representing that the verification is passed; if not, a second checking result which represents that the checking fails is obtained.
In some embodiments, the data checking apparatus based on a block chain further includes:
and the configuration file block acquisition module is used for acquiring the configuration file blocks corresponding to the unequal backup hash values and the configuration hash values when the verification result is a second verification result representing that the verification is failed.
And the marking module is used for marking the configuration file block as a tampered file and acquiring address information corresponding to the tampered file based on the block chain.
In some embodiments, the data checking apparatus based on a block chain further includes:
and the access request receiving module is used for receiving the access request sent by the terminal.
And the extraction module is used for extracting the target information from the verification result according to the access request.
And the issuing module is used for issuing the target information to the terminal.
In some embodiments, the data checking apparatus based on a blockchain further includes:
and the copying module is used for copying each backup file block and distributing the copied backup file blocks to each node of the block chain so as to update the configuration file.
The modules in the block chain-based data verification device can be implemented in whole or in part by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the electronic device, or can be stored in a memory in the electronic device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, an electronic device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 6. The electronic device includes a processor, a memory, an Input/Output (I/O) interface, and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the electronic device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the electronic device is used for storing data such as a user database. The input/output interface of the electronic device is used for exchanging information between the processor and an external device. The communication interface of the electronic device is used for connecting and communicating with an external terminal through a network. The computer program is executed by a processor to implement a blockchain-based data verification method.
Those skilled in the art will appreciate that the configuration shown in fig. 6 is a block diagram of only a portion of the configuration associated with the present application, and does not constitute a limitation on the electronic device to which the present application is applied, and a particular electronic device may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
In one embodiment, an electronic device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program: responding to a starting request initiated by a third-party object, and generating a login interface; acquiring user information input in a login interface, and verifying the user information according to a preset user database to obtain a verification result; receiving the backup file uploaded by the terminal under the condition that the verification result is that the verification is passed; carrying out fragmentation processing on the backup files to obtain a plurality of backup file blocks; checking the configuration information on the block chain according to the plurality of backup file blocks to obtain a checking result; the configuration information is obtained by configuring on the block chain according to the configuration file blocks stored on the block chain, and the plurality of configuration file blocks form a configuration file.
In one embodiment, the processor when executing the computer program further performs the steps of: performing hash processing on each backup file block to obtain a backup hash value corresponding to each backup file block; and comparing the configured hash values on the block chain according to the backup hash value to obtain a verification result.
In one embodiment, the processor, when executing the computer program, further performs the steps of: judging whether the backup hash values corresponding to the backup file blocks are equal to the configured hash values at the same positions on the block chain; if yes, obtaining a first verification result representing that the verification is passed; if not, obtaining a second check result representing that the check fails
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the verification result is a second verification result representing that the verification is not passed, acquiring a configuration file block corresponding to the unequal backup hash value and the configuration hash value; and marking the configuration file block as a tampered file, and acquiring address information corresponding to the tampered file based on the block chain.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving an access request sent by a terminal; extracting target information from the verification result according to the access request; and transmitting the target information to the terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and copying each backup file block, and distributing the copied backup file blocks to each node of the block chain to update the configuration file.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, performs the steps of: responding to a starting request initiated by a third-party object, and generating a login interface; acquiring user information input in a login interface, and verifying the user information according to a preset user database to obtain a verification result; receiving the backup file uploaded by the terminal under the condition that the verification result is that the verification is passed; carrying out fragmentation processing on the backup files to obtain a plurality of backup file blocks; verifying the configuration information on the block chain according to the plurality of backup file blocks to obtain a verification result; the configuration information is obtained by configuring on the block chain according to the configuration file blocks stored on the block chain, and the plurality of configuration file blocks form a configuration file.
In one embodiment, the computer program when executed by the processor further performs the steps of: performing hash processing on each backup file block to obtain a backup hash value corresponding to each backup file block; and comparing the configured hash values on the block chain according to the backup hash value to obtain a verification result.
In one embodiment, the computer program when executed by the processor further performs the steps of: judging whether the backup hash values corresponding to the backup file blocks are equal to the configured hash values at the same positions on the block chain; if yes, obtaining a first verification result representing that the verification is passed; if not, a second checking result which represents that the checking fails is obtained.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the verification result is a second verification result representing that the verification is not passed, acquiring a configuration file block corresponding to the backup hash value and the configuration hash value which are not equal; and marking the configuration file block as a tampered file, and acquiring address information corresponding to the tampered file based on the block chain.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving an access request sent by a terminal; extracting target information from the verification result according to the access request; and transmitting the target information to the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of: and copying each backup file block, and distributing the copied backup file blocks to each node of the block chain to update the configuration file.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, performs the steps of: responding to a starting request initiated by a third-party object, and generating a login interface; acquiring user information input in a login interface, and verifying the user information according to a preset user database to obtain a verification result; receiving a backup file uploaded by a terminal under the condition that the verification result is that the verification is passed; carrying out fragmentation processing on the backup files to obtain a plurality of backup file blocks; checking the configuration information on the block chain according to the plurality of backup file blocks to obtain a checking result; the configuration information is obtained by configuring on the block chain according to the configuration file blocks stored on the block chain, and the plurality of configuration file blocks form a configuration file.
In one embodiment, the computer program when executed by the processor further performs the steps of: performing hash processing on each backup file block to obtain a backup hash value corresponding to each backup file block; and comparing the configured hash values on the block chain according to the backup hash value to obtain a verification result.
In one embodiment, the computer program when executed by the processor further performs the steps of: judging whether the backup hash values corresponding to the backup file blocks are equal to the configured hash values at the same positions on the block chain; if yes, obtaining a first verification result representing that the verification is passed; if not, a second check result which represents that the check is not passed is obtained.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the verification result is a second verification result representing that the verification is not passed, acquiring a configuration file block corresponding to the backup hash value and the configuration hash value which are not equal; and marking the configuration file block as a tampered file, and acquiring address information corresponding to the tampered file based on the block chain.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving an access request sent by a terminal; extracting target information from the verification result according to the access request; and transmitting the target information to the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of: and copying each backup file block, and distributing the copied backup file blocks to each node of the block chain to update the configuration file.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include a Read-Only Memory (ROM), a magnetic tape, a floppy disk, a flash Memory, an optical Memory, a high-density embedded nonvolatile Memory, a resistive Random Access Memory (ReRAM), a Magnetic Random Access Memory (MRAM), a Ferroelectric Random Access Memory (FRAM), a Phase Change Memory (PCM), a graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application should be subject to the appended claims.

Claims (10)

1. A data checking method based on a block chain is characterized by comprising the following steps:
responding to a starting request initiated by a third-party object, and generating a login interface;
acquiring user information input in the login interface, and verifying the user information according to a preset user database to obtain a verification result;
receiving a backup file uploaded by a terminal under the condition that the verification result is that the verification is passed;
carrying out fragmentation processing on the backup files to obtain a plurality of backup file blocks;
checking the configuration information on the block chain according to the backup file blocks to obtain a checking result; the configuration information is obtained by configuring on the block chain according to configuration file blocks stored on the block chain, and a plurality of configuration file blocks form a configuration file.
2. The method of claim 1, wherein the configuration information comprises a plurality of configuration hash values; the verifying the configuration information on the block chain according to the plurality of backup file blocks to obtain a verification result includes:
performing hash processing on each backup file block to obtain a backup hash value corresponding to each backup file block;
and comparing the configured hash values on the block chain according to the backup hash value to obtain the verification result.
3. The method according to claim 2, wherein the comparing the configuration hash values on the blockchain according to the backup hash value to obtain the verification result comprises:
judging whether the backup hash value corresponding to each backup file block is equal to the configured hash value at the same position on the block chain;
if yes, obtaining a first verification result representing that the verification is passed;
if not, a second checking result which represents that the checking fails is obtained.
4. The method of claim 3, further comprising:
when the verification result is a second verification result representing that the verification is not passed, acquiring a configuration file block corresponding to the backup hash value and the configuration hash value which are not equal;
and marking the configuration file block as a tampered file, and acquiring address information corresponding to the tampered file based on the block chain.
5. The method according to any one of claims 1 to 4, further comprising:
receiving an access request sent by the terminal;
extracting target information from the verification result according to the access request;
and sending the target information to the terminal.
6. The method according to any one of claims 1 to 4, further comprising:
and copying each backup file block, and distributing the copied backup file blocks to each node of the block chain to update the configuration file.
7. An apparatus for checking data based on a blockchain, the apparatus comprising:
the login interface generation module is used for responding to a starting request initiated by the third-party object and generating a login interface;
the verification module is used for acquiring the user information input in the login interface and verifying the user information according to a preset user database to obtain a verification result;
the file receiving module is used for receiving the backup file uploaded by the terminal under the condition that the verification result is that the verification is passed;
the fragment processing module is used for carrying out fragment processing on the backup file to obtain a plurality of backup file blocks;
the checking module is used for checking the configuration information on the block chain according to the backup file blocks to obtain a checking result; the configuration information is obtained by configuring on the block chain according to configuration file blocks stored on the block chain, and a plurality of configuration file blocks form a configuration file.
8. An electronic device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 6 when executed by a processor.
CN202211545494.2A 2022-12-05 2022-12-05 Block chain based data verification method and device, electronic equipment and storage medium Withdrawn CN115935414A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211545494.2A CN115935414A (en) 2022-12-05 2022-12-05 Block chain based data verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211545494.2A CN115935414A (en) 2022-12-05 2022-12-05 Block chain based data verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115935414A true CN115935414A (en) 2023-04-07

Family

ID=86551579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211545494.2A Withdrawn CN115935414A (en) 2022-12-05 2022-12-05 Block chain based data verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115935414A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116418601A (en) * 2023-06-09 2023-07-11 南京信息工程大学 Full-flow information security monitoring system based on block chain auxiliary verification

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116418601A (en) * 2023-06-09 2023-07-11 南京信息工程大学 Full-flow information security monitoring system based on block chain auxiliary verification
CN116418601B (en) * 2023-06-09 2023-08-22 南京信息工程大学 Full-flow information security monitoring system based on block chain auxiliary verification

Similar Documents

Publication Publication Date Title
CN110826111B (en) Test supervision method, device, equipment and storage medium
US10552640B2 (en) In-situ data verification for the cloud
US12041166B2 (en) Protecting data using controlled corruption in computer networks
US11563560B2 (en) Blockchain-based data evidence storage method and apparatus
CN112257086B (en) User privacy data protection method and electronic equipment
CN112565393A (en) File uploading method, file downloading method, file uploading device, file downloading device, computer equipment and storage medium
CN108289074B (en) User account login method and device
CN111597537B (en) Block chain network-based certificate issuing method, related equipment and medium
CN111339551B (en) Data verification method and related device and equipment
CN115952552A (en) Remote data destruction method, system and equipment
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN115935414A (en) Block chain based data verification method and device, electronic equipment and storage medium
CN111698227A (en) Information synchronization management method, device, computer system and readable storage medium
CN108256351B (en) File processing method and device, storage medium and terminal
CN112328558B (en) Access log storage method and system of medical system based on block chain
WO2021169469A1 (en) Voiceprint data processing method and apparatus, computer device, and storage medium
CN111291001B (en) Method and device for reading computer file, computer system and storage medium
CN115514470B (en) Storage method and system for community correction data security
CN111079155A (en) Data processing method and device, electronic equipment and computer storage medium
CN116010926A (en) Login authentication method, login authentication device, computer equipment and storage medium
WO2020000753A1 (en) Device security monitoring method and apparatus
CN115114657A (en) Data protection method, electronic device and computer storage medium
CN114745173A (en) Login verification method, login verification device, computer equipment, storage medium and program product
CN114584556B (en) File transmission method and device
CN110874225A (en) Data verification method and device, embedded equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20230407

WW01 Invention patent application withdrawn after publication