CN116738509B - Electronic disc encryption storage system and method based on block chain - Google Patents

Electronic disc encryption storage system and method based on block chain Download PDF

Info

Publication number
CN116738509B
CN116738509B CN202311015669.3A CN202311015669A CN116738509B CN 116738509 B CN116738509 B CN 116738509B CN 202311015669 A CN202311015669 A CN 202311015669A CN 116738509 B CN116738509 B CN 116738509B
Authority
CN
China
Prior art keywords
electronic
storage
value
electronic disk
disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311015669.3A
Other languages
Chinese (zh)
Other versions
CN116738509A (en
Inventor
刘峰
陈章星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Longqin Information Technology Co ltd
Original Assignee
Shenzhen Longqin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Longqin Information Technology Co ltd filed Critical Shenzhen Longqin Information Technology Co ltd
Priority to CN202311015669.3A priority Critical patent/CN116738509B/en
Publication of CN116738509A publication Critical patent/CN116738509A/en
Application granted granted Critical
Publication of CN116738509B publication Critical patent/CN116738509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Mathematical Physics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an electronic disk encryption storage system and method based on a block chain, and relates to the technical field of electronic disks, wherein the technical scheme is characterized by comprising a correlation module, an acquisition module, an analysis module and a judgment authentication module; the association module carries out association processing on the two electronic discs to form associated electronic discs, and divides each electronic disc into at least two storage areas according to storage positions; the acquisition module acquires authentication identity information of an operator when one of the electronic discs performs data transmission and storage and acquires operation behavior information of the operator when the electronic disc performs data storage; the electronic disk has the advantages that the electronic disk is in an unsafe state when in data transmission and storage, and one electronic disk sends an authentication request to a user of the other electronic disk when in data transmission and storage, so that the safety of data storage of one electronic disk is ensured.

Description

Electronic disc encryption storage system and method based on block chain
Technical Field
The invention relates to the technical field of electronic discs, in particular to an electronic disc encryption storage system and method based on a block chain.
Background
The electronic disk is a general name for non-field trading of international futures trading places, the electronic disk exists in the form of a computer expansion card and works in a mode of being inserted into a main board bus slot, when the computer is inserted into the electronic disk, the system can be started from the electronic disk, and the information of the electronic disk exists on a chip, so that the electronic disk has the advantages of high working speed, high stability, high confidentiality and the like.
However, the existing electronic disc encryption storage system based on the blockchain does not carry out association processing on two electronic discs, so that when unsafe factors occur in data storage carried out on one electronic disc, safety authentication cannot be carried out on the other electronic disc, and therefore storage and use of the electronic disc on data are affected.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention aims to provide an electronic disc encryption storage system and method based on a block chain.
In order to achieve the above purpose, the present invention provides the following technical solutions:
an electronic disk encryption storage system based on a block chain comprises an association module, an acquisition module, an analysis module and a judgment authentication module.
And the association module carries out association processing on the two electronic discs to form associated electronic discs, and divides each electronic disc into at least two storage areas according to the storage positions.
The acquisition module acquires authentication identity information of an operator when one of the electronic discs performs data transmission and storage, and acquires operation behavior information of the operator when the electronic disc performs data storage.
The analysis module performs joint processing analysis on the user authentication identity information and the operation behavior information when the electronic disk performs data transmission and storage to obtain a use security value; the use security value comprises an identity authentication value and an operation behavior value, wherein the identity authentication value is a numerical value which is obtained by processing and analyzing user authentication identity information when the electronic disk is subjected to data transmission and storage and is used for representing user authentication identity, and the operation behavior value is a numerical value which is obtained by processing and analyzing user operation behavior information when the electronic disk is subjected to data transmission and storage and is used for representing user operation behavior.
And the judging and authenticating module judges whether the electronic disk is safe or not when the electronic disk is used for data transmission and storage according to the use safety value, if the electronic disk is in an unsafe state when the electronic disk is used for data transmission and storage, one electronic disk sends an authentication request to a user of the other electronic disk when the electronic disk is used for data transmission and storage, one electronic disk is allowed to continue to carry out data storage after the user of the other electronic disk passes the authentication request, and one electronic disk is stopped to carry out data storage after the user of the other electronic disk does not pass the authentication request.
Preferably, the two electronic discs are associated to form an associated electronic disc, specifically:
and one electronic disk sends association request information to the other electronic disk, wherein the association request information comprises account information and user identity head portrait information.
And after the other electronic disk agrees with the association request of one electronic disk, performing association processing between the two electronic disks to form an associated electronic disk.
Preferably, the operation behavior information of the operator includes information of the number of times of exiting the storage area, information of time of stay of the storage area, and information of the number of times of shifting the storage area by the storage material.
Preferably, the authentication identity information of the operator is a face image of the operator.
Preferably, the system further comprises an identity authentication module, and the identity authentication value SFZ is obtained by comparing the face image of the operator with face information preset in the identity authentication module.
Preferably, the number of times information of exiting the storage area, the time information of stay of the storage area and the number of times information of shifting the storage material are taken and marked to obtain a number of times value TCZ of exiting the storage area, a time length value TSZ of stay of the storage area and a number of times value YCZ of shifting the storage material.
Preferably by a behavioural functionAn operational behavior value CZZ is calculated, wherein a1, a2 and a3 are adjustment factors and are greater than zero.
By a safety functionA safety in use value SYA is calculated, wherein b1 and b1 are adjustment factors and are greater than zero.
The use safety value SYA is compared with a preset use safety threshold SYY:
if the usage safety value SYA is less than or equal to a preset usage safety threshold value SYY, the electronic disk is in an unsafe state when data transmission and storage are carried out.
If the usage security value SYA is larger than the preset usage security threshold SYY, the electronic disk is in a security state when in data transmission and storage, and the data storage is directly carried out on one of the electronic disks, and an authentication request is not required to be sent to a user of the other electronic disk when the data transmission and storage are carried out on one of the electronic disks.
Preferably, when one of the electronic disks performs data transmission and storage, an authentication request is sent to a user of the other electronic disk, the response time of the user of the other electronic disk is obtained, and the response time of the user of the other electronic disk is valued and marked to obtain a response time value YXS.
Comparing the response time period value YXS with a preset response time period threshold value YXY:
if the response time length value YXS is more than or equal to the preset response time length threshold YXY, marking the response as overtime response, counting the times of overtime response, and taking the value and marking the times of overtime response to obtain the overtime response time value CSZ.
If the response time length value YXS is smaller than the preset response time length threshold YXY, marking the response time length value as normal response, counting the times of normal response, and taking the value and marking the times of normal response to obtain a normal response time value ZCY.
Preferably by a proportional functionThe timeout response specific gravity CSL is calculated.
Comparing the timeout response weight CSL with a preset timeout response weight threshold CSB:
and if the timeout response proportion CSL is more than or equal to the preset timeout response proportion threshold CSB, informing one of the electronic disk users to cancel the association of the other electronic disk.
If the timeout response specific gravity CSL is less than the preset timeout response specific gravity threshold CSB, one of the electronic disk users is not informed to cancel the association of the other electronic disk.
An electronic disk encryption storage method based on a block chain, comprising the following steps:
and carrying out association processing on the two electronic discs to form associated electronic discs, and dividing each electronic disc into at least two storage areas according to the storage positions.
And acquiring authentication identity information of an operator when one of the electronic discs performs data transmission storage, and acquiring operation behavior information of the operator when the electronic disc performs data storage.
The user authentication identity information and the operation behavior information are processed and analyzed in a combined mode when the electronic disk is subjected to data transmission and storage to obtain a use safety value; the use security value comprises an identity authentication value and an operation behavior value, wherein the identity authentication value is a numerical value which is obtained by processing and analyzing user authentication identity information when the electronic disk is subjected to data transmission and storage and is used for representing user authentication identity, and the operation behavior value is a numerical value which is obtained by processing and analyzing user operation behavior information when the electronic disk is subjected to data transmission and storage and is used for representing user operation behavior.
Judging whether the electronic disk is safe or not when the electronic disk is used for data transmission and storage according to the use safety value, if the electronic disk is in an unsafe state when the electronic disk is used for data transmission and storage, sending an authentication request to a user of the other electronic disk when the electronic disk is used for data transmission and storage, allowing one electronic disk to continue data storage after the user of the other electronic disk passes the authentication request, and stopping one electronic disk from carrying out data storage after the user of the other electronic disk does not pass the authentication request.
Compared with the prior art, the invention has the following beneficial effects:
1. in the invention, the user authentication identity information and the operation behavior information are processed and analyzed jointly when the electronic disk performs data transmission and storage to obtain the use safety value, if the electronic disk is in an unsafe state when the electronic disk performs data transmission and storage, one electronic disk sends an authentication request to the user of the other electronic disk when performing data transmission and storage, after the user of the other electronic disk passes the authentication request, one electronic disk is allowed to continue data storage, and after the user of the other electronic disk does not pass the authentication request, one electronic disk is stopped to perform data storage, so that the safety of data storage of one electronic disk is ensured.
2. In the invention, the timeout response proportion CSL is compared with the preset timeout response proportion threshold CSB, when one of the electronic discs sends an authentication request to the user of the other electronic disc during data transmission and storage, when the user of the other electronic disc repeatedly generates the timeout response, the user of the other electronic disc is required to be informed to cancel the association of the other electronic disc, and the operator is prevented from waiting for a long time to authenticate when using the one electronic disc for data storage.
Drawings
FIG. 1 is a block diagram of an electronic disk encryption storage system based on a blockchain;
fig. 2 is a flow chart of a block chain-based electronic disc encryption storage method according to the present invention.
Detailed Description
Referring to fig. 1 to 2.
The embodiment provides an electronic disc encryption storage system and method based on a block chain.
An electronic disk encryption storage system based on a block chain comprises an association module, an acquisition module, an analysis module and a judgment authentication module.
And the association module carries out association processing on the two electronic discs to form associated electronic discs, and divides each electronic disc into at least two storage areas according to the storage positions.
The acquisition module acquires authentication identity information of an operator when one of the electronic discs performs data transmission and storage, and acquires operation behavior information of the operator when the electronic disc performs data storage.
The analysis module performs joint processing analysis on the user authentication identity information and the operation behavior information when the electronic disk performs data transmission storage to obtain a use security value; the use security value comprises an identity authentication value and an operation behavior value, wherein the identity authentication value is a numerical value which is obtained by processing and analyzing user authentication identity information when the electronic disk is used for data transmission and storage and is used for representing user authentication identity, and the operation behavior value is a numerical value which is obtained by processing and analyzing user operation behavior information when the electronic disk is used for data transmission and storage and is used for representing user operation behavior.
And judging whether the electronic disk is safe or not when the authentication module carries out data transmission and storage according to the use safety value, if the electronic disk is in an unsafe state when carrying out data transmission and storage, sending an authentication request to a user of the other electronic disk when carrying out data transmission and storage, allowing one electronic disk to continue data storage after the user of the other electronic disk passes the authentication request, and stopping one electronic disk from carrying out data storage after the user of the other electronic disk does not pass the authentication request.
According to the method, the related electronic disk is formed by the mutual related processing between the two electronic disks, when one electronic disk performs data transmission and storage, whether one electronic disk has suspicious dangerous factors during operation or not is judged through authentication identity information of an operator and operation behavior information of the operator, when the suspicious dangerous factors occur during data storage of one electronic disk, authentication requests are required to be sent to users of the other electronic disk, and the users of the other electronic disk can allow the one electronic disk to continue data storage after passing the authentication requests, so that the safety during data storage of the one electronic disk is guaranteed, and meanwhile, when the suspicious dangerous factors occur during data storage of the one electronic disk, data storage processing can be performed on the one electronic disk through encryption processing operation, so that the safety during data storage of the one electronic disk is guaranteed.
The two electronic discs are subjected to association processing to form an associated electronic disc, which is specifically as follows:
and one electronic disk sends association request information to the other electronic disk, wherein the association request information comprises account information and user identity head portrait information.
And after the other electronic disk agrees with the association request of one electronic disk, performing association processing between the two electronic disks to form an associated electronic disk.
It should be noted that, because each electronic disk is associated with a respective usage mailbox and each electronic disk has corresponding account information, wherein the account information is an account name, when one electronic disk needs to be associated with another electronic disk, an association request signal is sent to the usage mailbox of the other electronic disk through the usage mailbox of one electronic disk, wherein the association request information includes the account information and user identity head portrait information, and the user identity head portrait information is real head portrait information of a user.
The operation behavior information of the operator includes information of the number of times of exiting the storage area, information of the time of stay of the storage area, and information of the number of times of shifting the storage area by the storage material.
It should be noted that when an operator uses one of the electronic discs for data storage, one of the electronic discs records operation behavior information of the operator, since the electronic disc divides a plurality of storage areas.
The operation behavior information of the operator comprises information of the number of times of exiting the storage area, information of stay time of the storage area and information of the number of times of shifting the storage area by the storage data, and if the number of times of exiting the storage area by the operator is more when the operator performs data storage on one of the electronic discs, the operator is unfamiliar with the position of the storage area of the electronic disc, so that suspicious phenomenon exists; if the operator uses one of the electronic discs to store data, the operator stays in the storage area for a long time and does not store the data, which indicates that the operator is unfamiliar with the use of the electronic disc, so that suspicious phenomenon exists; since the electronic disk has a plurality of storage areas, if an operator moves a file of one storage area to another storage area a plurality of times, it is explained that the operator is unfamiliar with the storage areas, and thus there is a suspicious phenomenon.
The authentication identity information of the operator is a face image of the operator.
It should be noted that, when an operator performs a data storage operation on one of the electronic discs, face image information of the operator needs to be acquired.
The personal authentication system also comprises an identity authentication module, wherein the identity authentication module is used for comparing the face image of the operator with face information preset in the identity authentication module to obtain an identity authentication value SFZ.
It should be noted that the identity authentication module is divided into a friendly area and a blacklist area, wherein the friendly area is used for storing face information which is allowed to be used by an operator, and the blacklist area is used for storing face information which is not allowed to be used by the operator.
When an operator stores on one of the electronic discs, face image information of the operator is obtained, the face image information of the operator is compared with the face image information in the identity authentication module, if the face image information of the operator belongs to the face information of the friendly area, the value of the identity authentication value SFZ is 10, if the face image information of the operator belongs to the face information of the blacklist area, the value of the identity authentication value SFZ is 0, and if the face image information of the operator does not belong to the face information of the blacklist area, or the face information of the friendly area, the value of the identity authentication value SFZ is 6.
And taking and marking the number information of exiting the storage area, the stay time information of the storage area and the number information of the storage data shifting storage area to obtain a number value TCZ of exiting the storage area, a stay time value TSZ of the storage area and a storage data shifting storage area number value YCZ.
It should be noted that if the number of times the operator exits the storage area is 3, and if the number of times the author exits the storage area is 1, the number of times the operator exits the storage area is 1; if the operator does not perform data storage operation in the storage area and only stays in the storage area, counting the stay time of the storage area, if the stay time of the operator is 10 seconds, the stay time value TSZ of the storage area is 10, if the stay time of the operator is 20 seconds, the stay time value TSZ of the storage area is 20, if the operator stores one of the electronic storage areas, then stores the data in the other storage area, then stores the data shift storage area sub-value YCZ as 1, if the operator stores the data in the one of the electronic storage areas, then stores the data in the other storage area, and then stores the data in the other storage area, then stores the data in the storage area sub-value YCZ as 2.
By action functionAn operational behavior value CZZ is calculated, wherein a1, a2 and a3 are adjustment factors and are greater than zero.
It should be noted that here, the values of a1 and a3 are 10, the value of a2 is 1, and the behavior function is used when the value of the number of times of exiting the storage area TCZ is 3, the value of the time length of stay of the storage area TSZ is 10, and the value of the number of times of shifting the storage area YCZ is 1Calculating to obtain an operation behavior value CZZ of 50; in the case that the number of times of exiting the storage area is 1, the value of the time length of stay of the storage area is 20, and the value of the storage data shift storage area is YCZ is 1, the data is obtained by a behavior functionThe calculated operational behaviour value CZZ is 40.
By a safety functionA safety in use value SYA is calculated, wherein b1 and b1 are adjustment factors and are greater than zero.
It should be noted that, here, b1 has a value of 10, b2 has a value of 1, and when the authentication value SFZ has a value of 6 and the operation behavior value CZZ has a value of 50, the operation is continuedOversafety functionThe use security value SYA is calculated to be 10, and when the value of the identity authentication value SFZ is 10 and the operation behavior value CZZ is 40, the use security value SYA is calculated by a security functionThe calculated use security value SYA is 60.
The use safety value SYA is compared with a preset use safety threshold SYY:
if the usage safety value SYA is less than or equal to a preset usage safety threshold value SYY, the electronic disk is in an unsafe state when data transmission and storage are carried out.
If the usage security value SYA is larger than the preset usage security threshold SYY, the electronic disk is in a security state when in data transmission and storage, and the data storage is directly carried out on one of the electronic disks, and an authentication request is not required to be sent to a user of the other electronic disk when the data transmission and storage are carried out on one of the electronic disks.
It should be noted that, when the preset usage security threshold value SYY is 30 and the usage security value SYA is 10, the electronic disc is in an unsafe state when performing data transmission and storage because the usage security value SYA is less than the preset usage security threshold value SYY, one of the electronic discs sends an authentication request to the user of the other electronic disc when performing data transmission and storage, and one of the electronic discs is allowed to continue data storage after the user of the other electronic disc passes the authentication request, and one of the electronic discs is stopped to perform data storage after the user of the other electronic disc does not pass the authentication request;
under the condition that the use safety value SYA is 60, the use safety value SYA is larger than the preset use safety threshold value SYY, so that the electronic discs are in a safe state when in data transmission and storage, and the data storage is directly carried out on one of the electronic discs, and an authentication request is not required to be sent to a user of the other electronic disc when the data transmission and storage are carried out on the one electronic disc.
An electronic disk encryption storage method based on a block chain, comprising the following steps:
and carrying out association processing on the two electronic discs to form associated electronic discs, and dividing each electronic disc into at least two storage areas according to the storage positions.
And acquiring authentication identity information of an operator when one of the electronic discs performs data transmission storage, and acquiring operation behavior information of the operator when the electronic disc performs data storage.
The user authentication identity information and the operation behavior information are processed and analyzed in a combined mode when the electronic disk is subjected to data transmission and storage to obtain a use safety value; the use security value comprises an identity authentication value and an operation behavior value, wherein the identity authentication value is a numerical value which is obtained by processing and analyzing user authentication identity information when the electronic disk is used for data transmission and storage and is used for representing user authentication identity, and the operation behavior value is a numerical value which is obtained by processing and analyzing user operation behavior information when the electronic disk is used for data transmission and storage and is used for representing user operation behavior.
Judging whether the electronic disk is safe or not when the electronic disk is used for data transmission and storage according to the use safety value, if the electronic disk is in an unsafe state when the electronic disk is used for data transmission and storage, sending an authentication request to a user of the other electronic disk when the electronic disk is used for data transmission and storage, allowing one electronic disk to continue data storage after the user of the other electronic disk passes the authentication request, and stopping one electronic disk from carrying out data storage after the user of the other electronic disk does not pass the authentication request.
Example two
The following technical features are added on the basis of the first embodiment:
an electronic disk encryption storage system based on a block chain sends an authentication request to a user of another electronic disk when one electronic disk performs data transmission storage, obtains the response time of the user of the other electronic disk, and takes a value and marks the response time of the user of the other electronic disk to obtain a response duration value YXS.
It should be noted that when the electronic disk is in an unsafe state during data transmission and storage, one of the electronic disks sends an authentication request to a user of the other electronic disk during data transmission and storage, and the user of the other electronic disk needs to pass the authentication request operation or does not pass the authentication request operation, where the user of the other electronic disk passes the authentication request operation or does not pass the authentication request operation, which is called as a response of the user of the other electronic disk, and obtains the response time of the user of the other electronic disk.
If one of the electronic discs sends an authentication request to a user of the other electronic disc during data transmission, and the response time for the other electronic disc is 10 minutes, the value of the response time value YXS is 10; if one of the electronic disks sends an authentication request to the user of the other electronic disk during data transmission, the response time for the other electronic disk is 20 minutes, and the value of the response time value YXS is 10.
Comparing the response time period value YXS with a preset response time period threshold value YXY:
if the response time length value YXS is more than or equal to the preset response time length threshold YXY, marking the response as overtime response, counting the times of overtime response, and taking the value and marking the times of overtime response to obtain the overtime response time value CSZ.
If the response time length value YXS is smaller than the preset response time length threshold YXY, marking the response time length value as normal response, counting the times of normal response, and taking the value and marking the times of normal response to obtain a normal response time value ZCY.
The preset response time threshold value YXY is set to 16, and in the case that the value of the response time value YXS is 10, the response time value YXS is less than the preset response time threshold value YX, the normal response is marked, the number of times of the normal response occurring before is counted, if the number of times of the normal response is 2, the value of the normal response secondary value ZCY is 2, and if the number of times of the normal response is 4, the value of the normal response secondary value ZCY is 4.
Under the condition that the value of the response time length value YXS is 10, because the response time length value YXS is larger than the preset response time length threshold value YXY, the overtime response is marked, if the number of overtime responses is 1, the value of the overtime response time value CSZ is 1, and if the number of overtime responses is 3, the value of the overtime response time value CSZ is 3.
By a proportional functionThe timeout response specific gravity CSL is calculated.
It should be noted that in the case where the value of the normal response time value ZCY is 2 and the value of the timeout response time value CSZ is 3, the value is calculated by the scaling functionCalculating to obtain the overtime response proportion CSL of 0.6, and under the condition that the value of the normal response time value ZCY is 1 and the value of the overtime response time value CSZ is 1, calculating the overtime response proportion CSL by a proportion function +.>The calculated timeout response specific gravity CSL is 0.5.
Comparing the timeout response weight CSL with a preset timeout response weight threshold CSB:
and if the timeout response proportion CSL is more than or equal to the preset timeout response proportion threshold CSB, informing one of the electronic disk users to cancel the association of the other electronic disk.
If the timeout response specific gravity CSL is less than the preset timeout response specific gravity threshold CSB, one of the electronic disk users is not informed to cancel the association of the other electronic disk.
It should be noted that, here, the preset timeout response specific gravity threshold CSB is set to 0.4, and in the case where the timeout response specific gravity CSL is 0.3, since the timeout response specific gravity CSL < the preset timeout response specific gravity threshold CSB, one of the electronic disk users is not notified to cancel the association with the other electronic disk.
In the case where the timeout response specific gravity CSL is 0.6, since the timeout response specific gravity CSL < the preset timeout response specific gravity threshold CSB, one of the electronic disk users is not notified to cancel the association with the other electronic disk.
When one of the electronic disks sends an authentication request to the user of the other electronic disk during data transmission and storage, the user of the other electronic disk needs to be informed of canceling the association with the other electronic disk when the other electronic disk user repeatedly generates a timeout response.
The above description is only a preferred embodiment of the present invention, and the protection scope of the present invention is not limited to the above examples, and all technical solutions belonging to the concept of the present invention belong to the protection scope of the present invention. It should be noted that modifications and adaptations to the present invention may occur to one skilled in the art without departing from the principles of the present invention and are intended to be within the scope of the present invention.

Claims (10)

1. The electronic disc encryption storage system based on the block chain is characterized by comprising a correlation module, an acquisition module, an analysis module and a judgment authentication module;
the association module carries out association processing on the two electronic discs to form associated electronic discs, and divides each electronic disc into at least two storage areas according to storage positions;
the acquisition module acquires authentication identity information of an operator when one of the electronic discs performs data transmission and storage and acquires operation behavior information of the operator when the electronic disc performs data storage;
the analysis module performs joint processing analysis on the user authentication identity information and the operation behavior information when the electronic disk performs data transmission and storage to obtain a use security value; the use security value comprises an identity authentication value and an operation behavior value, wherein the identity authentication value is a numerical value which is obtained by processing and analyzing user authentication identity information when the electronic disk is subjected to data transmission and storage and is used for representing user authentication identity, and the operation behavior value is a numerical value which is obtained by processing and analyzing user operation behavior information when the electronic disk is subjected to data transmission and storage and is used for representing user operation behavior;
and the judging and authenticating module judges whether the electronic disk is safe or not when the electronic disk is used for data transmission and storage according to the use safety value, if the electronic disk is in an unsafe state when the electronic disk is used for data transmission and storage, one electronic disk sends an authentication request to a user of the other electronic disk when the electronic disk is used for data transmission and storage, one electronic disk is allowed to continue to carry out data storage after the user of the other electronic disk passes the authentication request, and one electronic disk is stopped to carry out data storage after the user of the other electronic disk does not pass the authentication request.
2. The electronic disc encryption storage system based on the blockchain as in claim 1, wherein the two electronic discs are associated to form an associated electronic disc, specifically:
one electronic disk sends association request information to the other electronic disk, wherein the association request information comprises account information and user identity head portrait information;
and after the other electronic disk agrees with the association request of one electronic disk, performing association processing between the two electronic disks to form an associated electronic disk.
3. The blockchain-based electronic disk encryption storage system of claim 2, wherein the operator's operational behavior information includes information on the number of exits from the storage area, information on the time the storage area stays, and information on the number of times the storage material is shifted from the storage area.
4. A blockchain-based electronic disk encryption storage system as in claim 3 wherein the authentication identity information of the operator is a facial image of the operator.
5. The electronic disc encryption storage system based on the blockchain as in claim 4, further comprising an identity authentication module, wherein the identity authentication value SFZ is obtained by comparing a face image of an operator with face information preset in the identity authentication module.
6. The blockchain-based electronic disk encryption storage system of claim 5, wherein the number of exits from the storage area, the time of stay from the storage area, and the number of shifts from the storage material to the storage area are valued and marked to obtain the number of exits from the storage area TCZ, the length of stay from the storage area TSZ, and the number of shifts from the storage material to the storage area YCZ.
7. The blockchain-based electronic disk encryption storage system of claim 6, wherein the function is performed by a behavior functionCalculating to obtain an operation behavior value CZZ, wherein a1, a2 and a3 are regulating factors and are larger than zero;
by a safety functionCalculating to obtain a use safety value SYA, wherein b1 and b2 are regulating factors and are larger than zero;
the use safety value SYA is compared with a preset use safety threshold SYY:
if the usage safety value SYA is less than or equal to a preset usage safety threshold value SYY, the electronic disk is in an unsafe state when data transmission and storage are carried out;
if the usage security value SYA is larger than the preset usage security threshold SYY, the electronic disk is in a security state when in data transmission and storage, and the data storage is directly carried out on one of the electronic disks, and an authentication request is not required to be sent to a user of the other electronic disk when the data transmission and storage are carried out on one of the electronic disks.
8. The blockchain-based electronic disk encryption storage system of claim 7, wherein when one electronic disk is used for data transmission and storage, an authentication request is sent to a user of the other electronic disk, the response time of the user of the other electronic disk is obtained, and the response time of the user of the other electronic disk is valued and marked to obtain a response time length value YXS;
comparing the response time period value YXS with a preset response time period threshold value YXY:
if the response time length value YXS is more than or equal to the preset response time length threshold YXY, marking the response as overtime response, counting the times of overtime response, and taking the value and marking the times of overtime response to obtain an overtime response time value CSZ;
if the response time length value YXS is smaller than the preset response time length threshold YXY, marking the response time length value as normal response, counting the times of normal response, and taking the value and marking the times of normal response to obtain a normal response time value ZCY.
9. The blockchain-based electronic disk encryption storage system of claim 8, wherein the block chain-based electronic disk encryption storage system is further characterized by a scaling functionCalculating to obtain a timeout response specific gravity CSL;
comparing the timeout response weight CSL with a preset timeout response weight threshold CSB:
if the timeout response proportion CSL is more than or equal to a preset timeout response proportion threshold CSB, informing one of the electronic disk users to cancel the association of the other electronic disk;
if the timeout response specific gravity CSL is less than the preset timeout response specific gravity threshold CSB, one of the electronic disk users is not informed to cancel the association of the other electronic disk.
10. A blockchain-based electronic disk encryption storage method applied to the blockchain-based electronic disk encryption storage system of claim 1, characterized in that the method comprises the following steps:
performing association processing on the two electronic discs to form associated electronic discs, and dividing each electronic disc into at least two storage areas according to storage positions;
acquiring authentication identity information of an operator when one of the electronic discs performs data transmission storage, and acquiring operation behavior information of the operator when the electronic disc performs data storage;
the user authentication identity information and the operation behavior information are processed and analyzed in a combined mode when the electronic disk is subjected to data transmission and storage to obtain a use safety value; the use security value comprises an identity authentication value and an operation behavior value, wherein the identity authentication value is a numerical value which is obtained by processing and analyzing user authentication identity information when the electronic disk is subjected to data transmission and storage and is used for representing user authentication identity, and the operation behavior value is a numerical value which is obtained by processing and analyzing user operation behavior information when the electronic disk is subjected to data transmission and storage and is used for representing user operation behavior;
judging whether the electronic disk is safe or not when the electronic disk is used for data transmission and storage according to the use safety value, if the electronic disk is in an unsafe state when the electronic disk is used for data transmission and storage, sending an authentication request to a user of the other electronic disk when the electronic disk is used for data transmission and storage, allowing one electronic disk to continue data storage after the user of the other electronic disk passes the authentication request, and stopping one electronic disk from carrying out data storage after the user of the other electronic disk does not pass the authentication request.
CN202311015669.3A 2023-08-14 2023-08-14 Electronic disc encryption storage system and method based on block chain Active CN116738509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311015669.3A CN116738509B (en) 2023-08-14 2023-08-14 Electronic disc encryption storage system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311015669.3A CN116738509B (en) 2023-08-14 2023-08-14 Electronic disc encryption storage system and method based on block chain

Publications (2)

Publication Number Publication Date
CN116738509A CN116738509A (en) 2023-09-12
CN116738509B true CN116738509B (en) 2023-12-22

Family

ID=87910029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311015669.3A Active CN116738509B (en) 2023-08-14 2023-08-14 Electronic disc encryption storage system and method based on block chain

Country Status (1)

Country Link
CN (1) CN116738509B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241357A (en) * 2017-07-27 2017-10-10 郑州云海信息技术有限公司 User access control method and apparatus in cloud computing system
CN108076018A (en) * 2016-11-16 2018-05-25 阿里巴巴集团控股有限公司 Identity authorization system, method, apparatus and account authentication method
CN110020560A (en) * 2019-04-22 2019-07-16 山东超越数控电子股份有限公司 A kind of electronic hard disk system and method with data self-destruction protection
CN111901334A (en) * 2020-07-27 2020-11-06 费希敏 System and method for setting access authority of associated equipment
CN112182519A (en) * 2020-10-10 2021-01-05 上海威固信息技术股份有限公司 Computer storage system security access method and access system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11995174B2 (en) * 2020-06-12 2024-05-28 Strata Identity, Inc. Systems, methods, and storage media for migrating identity information across identity domains in an identity infrastructure

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108076018A (en) * 2016-11-16 2018-05-25 阿里巴巴集团控股有限公司 Identity authorization system, method, apparatus and account authentication method
CN107241357A (en) * 2017-07-27 2017-10-10 郑州云海信息技术有限公司 User access control method and apparatus in cloud computing system
CN110020560A (en) * 2019-04-22 2019-07-16 山东超越数控电子股份有限公司 A kind of electronic hard disk system and method with data self-destruction protection
CN111901334A (en) * 2020-07-27 2020-11-06 费希敏 System and method for setting access authority of associated equipment
CN112182519A (en) * 2020-10-10 2021-01-05 上海威固信息技术股份有限公司 Computer storage system security access method and access system

Also Published As

Publication number Publication date
CN116738509A (en) 2023-09-12

Similar Documents

Publication Publication Date Title
JP4531374B2 (en) Information holding device
CN108073821B (en) Data security processing method and device
CN111415163A (en) Service processing and verifying method, system and verifying node based on block chain
CN115859345B (en) Data access management method and system based on block chain
CN114004319A (en) Rail transit riding verification method, system and device
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
US20180262482A1 (en) Information processing method and server
CN109960917A (en) A kind of time slot scrambling and device of document
CN107679421A (en) A kind of movable memory apparatus monitoring means of defence and system
CN112069527A (en) Tax control invoice protection method and system based on multiple safety protection measures
CN111125772B (en) Method and device for dynamically setting security policy and mobile device
CN110839003A (en) Method and device for identifying number stealing behavior, computer equipment and storage medium
CN111046405B (en) Data processing method, device, equipment and storage medium
CN116738509B (en) Electronic disc encryption storage system and method based on block chain
CN204680024U (en) Computer security based on dynamic human face recognition technology is taken precautions against and early warning system
CN112138400B (en) Security monitoring method, system and server for game account
CN115879156A (en) Dynamic desensitization method, device, electronic equipment and storage medium
CN115994791A (en) Risk judgment method based on integral user state snapshot and quantitative analysis
CN111783153A (en) Information processing method and device, electronic equipment and storage medium
CN112328998A (en) Computer information security monitoring method
CN111600721A (en) Asset management system, method and device based on multi-user voting mechanism
CN111935096A (en) Test system, test method and storage medium for network security product
CN115130096B (en) Method for preventing malicious operation, misoperation and illegal operation through real-time examination
CN114186141B (en) Illegal client detection method, device, equipment and medium
CN117118750B (en) Data sharing method and device based on white-box password, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant