CN117134996B - Industrial Internet identification information analysis method and system based on block chain - Google Patents

Industrial Internet identification information analysis method and system based on block chain Download PDF

Info

Publication number
CN117134996B
CN117134996B CN202311393966.1A CN202311393966A CN117134996B CN 117134996 B CN117134996 B CN 117134996B CN 202311393966 A CN202311393966 A CN 202311393966A CN 117134996 B CN117134996 B CN 117134996B
Authority
CN
China
Prior art keywords
analysis
information
plaintext
analysis request
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311393966.1A
Other languages
Chinese (zh)
Other versions
CN117134996A (en
Inventor
张晋波
张耀军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinchuang Digital Technology Co ltd
Original Assignee
Beijing Xinchuang Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xinchuang Digital Technology Co ltd filed Critical Beijing Xinchuang Digital Technology Co ltd
Priority to CN202311393966.1A priority Critical patent/CN117134996B/en
Publication of CN117134996A publication Critical patent/CN117134996A/en
Application granted granted Critical
Publication of CN117134996B publication Critical patent/CN117134996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The invention relates to the technical field of industrial Internet, in particular to a method and a system for analyzing industrial Internet identification information based on a blockchain, which comprise the steps that a scanning end sends a first information analysis request to the blockchain network, the blockchain network selects a proper analysis proxy node, the first information analysis request is decoded into a group of correct information files and a group of wrong information files by adopting a segmentation analysis method, if a correct key is input by a client, the correct information files are obtained, if the wrong key is input by a wrong client, the wrong information files are obtained, both files can be modified and modification conditions are stored in a log, and if the modification of the wrong files occurs, a modification log is actively popped up when the correct information files are checked next time. The invention combines the characteristics of the blockchain, adopts an identity authentication and access control mechanism, ensures that an authorized user can access correct data, and ensures that an industrial Internet identification analysis system can reliably operate in an industrial environment.

Description

Industrial Internet identification information analysis method and system based on block chain
Technical Field
The invention relates to the technical field of industrial Internet, in particular to a block chain-based industrial Internet identification information analysis method and system.
Background
The background of the industrial Internet identification information analysis technology is derived from the rapid development of the Internet of things and the industrial Internet of things, and relates to the fusion of key technologies such as sensors, RFID, bar codes, cloud computing, artificial intelligence and the like. The technology is used for converting the identification information of industrial equipment and products into useful data, and supporting key applications such as intelligent manufacturing, equipment monitoring, data analysis and the like, so that the production efficiency is improved, the cost is reduced, and the digital transformation in the industrial field is promoted.
Chinese patent publication No.: CN113301185B discloses an industrial internet identification analysis system and method based on alliance blockchain, which aims to solve the problem that information of each handle service system cannot be shared in the prior art. The industrial Internet identification analysis system comprises a client, a server and a server, wherein the client is used for scanning and sending an analysis request of a handle identification code; the accounting node is used for receiving an analysis request sent by the client, accessing a channel with authority access according to the analysis request, and acquiring an analysis result from a distributed account book maintained by the channel; and feeding back the analysis result to the client; the system comprises a plurality of channels of a alliance blockchain, wherein each channel maintains a distributed account book, each channel is provided with a group of accounting nodes, and all the accounting nodes of each channel have authority to access the distributed account book maintained by the channel; the attribute of each channel is one of two types, public and private. Product information of different service links can be obtained by scanning the handle identification codes, and data sharing of the product information in each service link is realized. Therefore, the industrial Internet identification analysis system and method based on the alliance blockchain have the following problems: the process of maintaining the account book correspondingly by the alliance blockchain through a plurality of preset channels has the problem that the maintenance path is single, and the hijacking of the channels can cause the information security of each accounting node to be threatened to influence the data security.
Disclosure of Invention
Therefore, the invention provides a method and a system for analyzing industrial Internet identification information based on a blockchain, which are used for solving the problem of poor safety in the process of analyzing the identification information caused by underutilization of the distributed characteristics of the blockchain for ledger maintenance and analysis in the prior art.
In order to achieve the above object, in one aspect, the present invention provides a method for resolving industrial internet identification information based on blockchain, including:
acquiring scanning information received by a scanning end, and generating a first information analysis request based on the scanned mark information and the identity information of the scanning end;
responding to the first information analysis request, and selecting one of a plurality of proxy nodes deployed in a blockchain as an analysis proxy node;
the analysis agent node performs segmentation recombination on the codes of the mark information in the first information analysis request according to a pre-stored segmentation dispatching rule to generate a second information analysis request, and converts the extracted data in a first characteristic section in the first information analysis request and a second characteristic section in the second information analysis request into first characteristic data and second characteristic data respectively, wherein the number of characters contained in the first characteristic section is equal to the number of characters contained in the second characteristic section, and the positions of the characters in the corresponding information analysis request are the same;
the analysis proxy node sends the first characteristic data to a first encryption node, and sends a first analysis request and a second analysis request to a second encryption node, wherein the first analysis request comprises the first information analysis request and the first characteristic data, and the second analysis request comprises the second information analysis request and the second characteristic data;
the second encryption node analyzes the first analysis request and the second analysis request into a first analysis plaintext and a second analysis plaintext respectively, and sends the first analysis plaintext and the second analysis plaintext to the first encryption node;
the first encryption node determines the attribute of the first analytic plaintext and the second analytic plaintext according to the first characteristic data and the first analytic plaintext and the second analytic plaintext;
and responding to the information analysis key input by the client, and determining whether the first analysis plaintext or the second analysis plaintext is to be sent to the client by the first encryption node according to the information analysis key and the attribute.
Further, the method for selecting the analytic proxy node from the plurality of proxy nodes deployed in the blockchain comprises the following steps:
and calculating a corresponding analysis grade according to the mark information and the identity information of the scanning end, and determining a corresponding proxy node type according to the analysis grade so as to select an analysis proxy node.
Further, the pre-stored segment dispatch rules include:
dividing a first information analysis request into at least two split sections according to the mark information, and determining a generation method of the second information analysis request according to whether character strings with the same length exist between the split sections;
if at least two split segments have the same length character string, the positions of the split segments with the same length character string are exchanged to form the second information analysis request;
if character strings with the same length do not exist between any two split sections, selecting one split section of the first information analysis request to replace the content of the first information analysis request with a random character string with the corresponding same length;
wherein, the random character string is different from the content of the split segment corresponding to the exchange, and the content of the character strings corresponding to the two split segments with the same length of character string is different.
Further, when the first characteristic data and the second characteristic data are converted, converting the data in the first characteristic section in the extracted first information analysis request into the first characteristic data according to a pre-stored data conversion rule, and converting the data in the second characteristic section in the second information analysis request into the second characteristic data;
the data conversion rule comprises a first conversion rule and a second conversion rule, and the conversion method of the conversion rule comprises the following steps:
converting the characteristic segment into characteristic data by using the first conversion rule, and judging whether to use the second conversion rule according to the characteristic data conversion result converted by the first conversion rule;
if the converted first characteristic data and the second characteristic data are the same, judging that the characteristic segment is converted into the characteristic data by using the second conversion rule;
if the converted first characteristic data and the second characteristic data are different, judging that the second conversion rule is not used;
the conversion results of the first conversion rule and the second conversion rule on the same characteristic section are different.
Further, the method for the second encryption node to parse the first parsing request and the second parsing request into a first parsed plaintext and a second parsed plaintext, respectively, includes:
the second encryption node segments the information analysis request based on the mark information, distributes the first analysis request and the second analysis request to a plurality of corresponding analysis nodes according to the number of segments, and distributes a segmented analysis key to each analysis node correspondingly;
and each analysis node analyzes the first analysis plaintext and the second analysis plaintext based on the segmentation analysis key, the first analysis request and the second analysis request respectively to form a corresponding first analysis plaintext and a corresponding second analysis plaintext, and sends the corresponding first analysis plaintext and the corresponding second analysis plaintext to the first encryption node.
Further, the industrial Internet identification information analysis method based on the blockchain further comprises the following steps:
the first encryption node scans the contents of the first analysis plaintext and the second analysis plaintext respectively, and determines the attributes of the first analysis plaintext and the second analysis plaintext according to whether the first characteristic data are present at the corresponding positions of the analysis plaintext.
Further, the contents of the first characteristic section and the second characteristic section are different, and if the contents of the selected first characteristic section and the second characteristic section are the same, the selection is repeated.
Further, the first conversion rule is to sequentially sort the characters in the feature segment according to the English initial, and the second conversion rule is to convert the character strings in the feature segment into a binary writing method.
Further, the first encryption node selects to send an analysis plaintext of the corresponding attribute to the client according to the attribute of the information analysis key;
and the client determines the modification authority of the resolving plaintext according to the authority of the information resolving key and records the modification authority in an information log.
On the other hand, the invention also provides a system of the industrial Internet identification information analysis method based on the blockchain, which comprises the following steps:
the scanning end is used for generating a first information analysis request according to the scanned mark information and the scanning end identity information;
the analysis request sending end is connected with the scanning end and used for sending an analysis request to the blockchain network;
the block chain network is connected with the analysis request sending end and used for decoding the analysis request and sending a decoding file to the client according to the client identification information, and the block chain network comprises a plurality of preset proxy nodes;
and the client is connected with the blockchain network and used for inputting an information analysis key and receiving an analysis plaintext.
Compared with the prior art, the invention has the beneficial effects that in order to ensure the safety, the identity verification and access control mechanism is adopted by combining the characteristics of the blockchain, so that only authorized users can access and modify correct data, and unauthorized users can obtain error data. By comprehensively considering the safety problem, the robustness and the credibility of the industrial Internet identification analysis system and method can be ensured, so that the industrial Internet identification analysis system and method can reliably operate in an industrial environment.
Furthermore, the invention enhances the traceability and the safety of the data and is beneficial to preventing malicious tampering of the data; secondly, the information is recorded in a log, an audit function is provided, the modification history of the data can be tracked, and the identification of potential safety problems or operation errors is facilitated; such combination measures help to protect data integrity, reduce risk, improve transparency and reliability of the data processing process, and support satisfaction of compliance requirements.
Furthermore, the invention combines the distributed property of a plurality of nodes in the blockchain technology, and the nodes participate in information verification and storage together, so that the information security is improved; by storing the industrial identification information in the blockchain distributed ledger, the data becomes highly decentralised and is not easy to attack or tamper by a single point; each node has complete data copy, ensures redundant backup of data, and reduces the risk of data loss.
Drawings
FIG. 1 is a flow chart of a blockchain-based industrial Internet identification information resolution method of the present invention;
FIG. 2 is a block chain based industrial Internet identification information parsing method of the present invention in which a client obtains identification information parsing plaintext;
FIG. 3 is a schematic block chain network architecture diagram in the block chain-based industrial Internet identification information resolution system of the present invention;
fig. 4 is a schematic structural diagram of an industrial internet identification information analysis system based on a blockchain in an embodiment of the invention.
Detailed Description
In order that the objects and advantages of the invention will become more apparent, the invention will be further described with reference to the following examples; it should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are merely for explaining the technical principles of the present invention, and are not intended to limit the scope of the present invention.
It should be noted that, in the description of the present invention, terms such as "upper," "lower," "left," "right," "inner," "outer," and the like indicate directions or positional relationships based on the directions or positional relationships shown in the drawings, which are merely for convenience of description, and do not indicate or imply that the apparatus or elements must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, it should be noted that, in the description of the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," and "connected" are to be construed broadly, and may be either fixedly connected, detachably connected, or integrally connected, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention can be understood by those skilled in the art according to the specific circumstances.
For ease of understanding, the relevant terms of the present invention are briefly explained herein as follows:
blockchains are a distributed database technology that records data transactions in a secure, transparent, non-tamperable manner. A blockchain is a chain structure made up of a plurality of data blocks, each of which contains a certain amount of transaction information.
A proxy node is a concept used in blockchain networks. These networks typically employ a delegated rights-proving consensus mechanism that can be delegated to specific nodes that are responsible for validating transactions and generating new blocks.
Fig. 1 to fig. 3 are respectively a flowchart of a blockchain-based industrial internet identification information analysis method according to an embodiment of the present invention, a process of obtaining identification information analysis plaintext by a client in the blockchain-based industrial internet identification information analysis method according to the present invention, and a structural schematic diagram of a blockchain network in the blockchain-based industrial internet identification information analysis system according to the present invention.
The embodiment of the invention provides an industrial Internet identification information analysis method based on a blockchain, which comprises the following steps:
acquiring scanning information received by a scanning end, and generating a first information analysis request based on the scanned mark information and the identity information of the scanning end;
responding to the first information analysis request, and selecting one of a plurality of proxy nodes deployed in a blockchain as an analysis proxy node;
the analysis agent node performs segmentation recombination on the codes of the mark information in the first information analysis request according to a pre-stored segmentation dispatching rule to generate a second information analysis request, and converts the extracted data in a first characteristic section in the first information analysis request and a second characteristic section in the second information analysis request into first characteristic data and second characteristic data respectively, wherein the number of characters contained in the first characteristic section is equal to the number of characters contained in the second characteristic section, and the positions of the characters in the corresponding information analysis request are the same;
the analysis proxy node sends the first characteristic data to a first encryption node, and sends a first analysis request and a second analysis request to a second encryption node, wherein the first analysis request comprises the first information analysis request and the first characteristic data, and the second analysis request comprises the second information analysis request and the second characteristic data;
the second encryption node analyzes the first analysis request and the second analysis request into a first analysis plaintext and a second analysis plaintext respectively, and sends the first analysis plaintext and the second analysis plaintext to the first encryption node;
the first encryption node determines the attribute of the first analytic plaintext and the second analytic plaintext according to the first characteristic data and the first analytic plaintext and the second analytic plaintext;
and responding to the information analysis key input by the client, and determining whether the first analysis plaintext or the second analysis plaintext is to be sent to the client by the first encryption node according to the information analysis key and the attribute.
Referring to fig. 3, the parsing proxy node, the first encryption node, and the second encryption node are all selected from a plurality of proxy nodes deployed in a blockchain, and all belong to the same class of proxy nodes. The second encryption node comprises a plurality of analysis nodes, each analysis node has different analysis keys, and only the analysis request of the corresponding segment can be analyzed, but analysis results of other analysis nodes are recorded in the analysis node.
With continued reference to fig. 1 and 2, a method for selecting a resolution proxy node from a plurality of proxy nodes deployed in a blockchain includes:
and calculating a corresponding analysis grade according to the mark information and the identity information of the scanning end, and determining a corresponding proxy node type according to the analysis grade so as to select an analysis proxy node.
It can be understood that the detail degree of the analysis content obtained according to the identity information of the scanning end is different, for example, the analysis plaintext obtained by scanning the commodity identification on the scanning machine inside the manufacturer contains all commodity information, such as the production date, the production place, which production line, the raw material proportion, etc.; the resolved plaintext information obtained by the code scanning of the consumer only comprises the production date and the production place;
therefore, the resolution level of the scanning end in the manufacturer is higher than that of the scanning end used by the supplier/retailer, the proxy nodes with different levels are respectively selected as the resolution proxy nodes and correspondingly obtained resolution plain texts with different levels, for example, the scanning end in the manufacturer adopts the high-level proxy node as the resolution proxy node, the scanning end used by the supplier/retailer adopts the medium-level proxy node as the resolution proxy node, and the scanning end of the consumer adopts the low-level proxy node as the resolution proxy node.
Specifically, the pre-stored segment dispatch rules include:
dividing a first information analysis request into at least two split sections according to the mark information, and determining a generation method of the second information analysis request according to whether character strings with the same length exist between the split sections;
if at least two split segments have the same length character string, the positions of the split segments with the same length character string are exchanged to form the second information analysis request;
if character strings with the same length do not exist between any two split sections, selecting one split section of the first information analysis request to replace the content of the first information analysis request with a random character string with the corresponding same length;
wherein, the random character string is different from the content of the split segment corresponding to the exchange, and the content of the character strings corresponding to the two split segments with the same length of character string is different.
It can be appreciated that, for example, the first information resolution request is 105687023697102:
if the information is split into 105687023697102 according to the corresponding flag information, wherein the character lengths in the two split segments 10 and 70 and the two split segments 568 and 236 are the same, at least one group of the two split segments can be selected to be exchanged to obtain a second information analysis request, and the second information analysis request can be one of 70 568 10 23697102, 10 236 70 568 97102 or 70236 10568 9710 2;
if the character string is split into 105687023697102 according to the corresponding mark information, and there is no split segment with equal character strings, at least one split segment of the five split segments is randomly selected to be replaced by a random character string with the same length, such as 1 23 687023697102, 105687 0246 97102, etc.
With continued reference to fig. 1, when the first feature data and the second feature data are converted, converting the data in the first feature segment in the extracted first information analysis request into the first feature data according to a pre-stored data conversion rule, and converting the data in the second feature segment in the second information analysis request into the second feature data;
the data conversion rule comprises a first conversion rule and a second conversion rule, and the conversion method of the conversion rule comprises the following steps:
converting the characteristic segment into characteristic data by using the first conversion rule, and judging whether to use the second conversion rule according to the characteristic data conversion result converted by the first conversion rule;
if the converted first characteristic data and the second characteristic data are the same, judging that the characteristic segment is converted into the characteristic data by using the second conversion rule;
if the converted first characteristic data and the second characteristic data are different, judging that the second conversion rule is not used;
the conversion results of the first conversion rule and the second conversion rule on the same characteristic section are different.
Specifically, the first conversion rule is to sequentially sort the characters in the characteristic section according to the English initial letters of the characters, and the second conversion rule is to convert the character strings in the characteristic section into a binary writing method.
It will be understood that, if the first information analysis request is 012, the second information analysis request is 013, the selected first feature segment is 012, the second feature segment is 013, and the 012 and 013 are converted into zot and zot according to the first conversion rule by capitalizing English letters corresponding to each number, and then the first feature data zot and the second feature data zot are identical, the data conversion needs to be performed again by using the second conversion rule, that is, 012 and 013 are converted into 1100 and 1101 according to the binary method, and 1100 is set as the first feature data, and 1101 is set as the second feature data.
Specifically, the method for the second encryption node to parse the first parsing request and the second parsing request into the first parsing plaintext and the second parsing plaintext respectively includes:
the second encryption node segments the information analysis request based on the mark information, distributes the first analysis request and the second analysis request to a plurality of corresponding analysis nodes according to the number of segments, and distributes a segmented analysis key to each analysis node correspondingly;
and each analysis node analyzes the first analysis plaintext and the second analysis plaintext based on the segmentation analysis key, the first analysis request and the second analysis request respectively to form a corresponding first analysis plaintext and a corresponding second analysis plaintext, and sends the corresponding first analysis plaintext and the corresponding second analysis plaintext to the first encryption node.
It may be appreciated that, for example, the first information resolution request is segmented into 105687023697102, the second information resolution request is segmented into 10 236 70 568 97102, and the segments are divided into five segments, and then the segments are sent to the corresponding five resolution nodes respectively:
the first analysis node analyzes a first section of a first information analysis request and a first section of a second information analysis request, wherein the first section analysis result of the first information analysis request is recorded in a first analysis plaintext file of the other four analysis nodes, and the first section analysis result of the second information analysis request is recorded in a second analysis plaintext file of the other four analysis nodes;
the second analysis node analyzes a second section of the first information analysis request and a second section of the second information analysis request, wherein the second section analysis result of the first information analysis request is recorded in a first analysis plaintext file of the other four analysis nodes, and the second section analysis result of the second information analysis request is recorded in a second analysis plaintext file of the other four analysis nodes;
the processing mode of other analysis nodes is the same as the first analysis node and the second analysis node.
Specifically, the industrial Internet identification information analysis method based on the blockchain further comprises the following steps:
the first encryption node scans the contents of the first analytic plaintext and the second analytic plaintext respectively, and determines the attributes of the first analytic plaintext and the second analytic plaintext according to whether the first characteristic data are present at the corresponding positions of the analytic plaintext.
It can be appreciated that the previously obtained feature data may be a suffix, a header, or other place that corresponds to the parsed plaintext that may not affect the integrity of the parsed plaintext; if the first feature data 1100 is used as the suffix of the first feature plaintext, i.e. added behind the parsed information, 1100, or the first feature data 1100 is used as the title of the first feature plaintext, i.e. added with a title with the content of 1100 in the parsed information file; the second feature data is located at the same position as the first feature data.
Specifically, the contents of the first characteristic section and the second characteristic section are different, and if the contents of the selected first characteristic section and the selected second characteristic section are the same, the selection is performed again.
It will be appreciated that, for example, the first information resolution request segment is 105687023697102, the second information resolution request segment is 10 236 70 568 97102, and the first feature segment and the second feature segment are 9710, and the first feature segment and the second feature segment need to be re-selected to be different in content.
Specifically, the first encryption node selects to send an analysis plaintext of the corresponding attribute to the client according to the attribute of the information analysis key;
and the client determines the modification authority of the resolving plaintext according to the authority of the information resolving key and records the modification authority in an information log.
It can be understood that the second encryption node sends the first parsed plaintext and the second parsed plaintext to the first encryption node, the first encryption node selects the parsed plaintext having the same feature data to determine the parsed plaintext as the correct attribute, determines the other parsed plaintext as the error attribute, sends the parsed plaintext of the correct attribute to the client if the client inputs the correct parsed key during scanning, and sends the parsed plaintext of the error attribute to the client if the wrong parsed key is input.
In the implementation, the resolving plaintext of the correct attribute and the resolving plaintext of the error attribute can be correspondingly modified and the content in the authority range of the scanning end is saved, the modification record and the checking record are respectively recorded in the log, and if checking and modifying the resolving plaintext of the error attribute exist, the previous modification log is automatically popped up when the resolving plaintext of the correct attribute is checked next time.
Fig. 4 is a schematic structural diagram of an industrial internet identification information analysis system based on blockchain according to an embodiment of the invention.
The embodiment of the invention also provides a system of the industrial Internet identification information analysis method based on the blockchain, which comprises the following steps:
the scanning end is used for generating a first information analysis request according to the scanned mark information and the scanning end identity information;
the analysis request sending end is connected with the scanning end and used for sending an analysis request to the blockchain network;
the block chain network is connected with the analysis request sending end and used for decoding the analysis request and sending a decoding file to the client according to the client identification information, and the block chain network comprises a plurality of preset proxy nodes;
and the client is connected with the blockchain network and used for inputting an information analysis key and receiving an analysis plaintext.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will be within the scope of the present invention.
The foregoing description is only of the preferred embodiments of the invention and is not intended to limit the invention; various modifications and variations of the present invention will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The industrial Internet identification information analysis method based on the blockchain is characterized by comprising the following steps of:
acquiring scanning information received by a scanning end, and generating a first information analysis request based on the scanned mark information and the identity information of the scanning end;
responding to the first information analysis request, and selecting one of a plurality of proxy nodes deployed in a blockchain as an analysis proxy node;
the analysis agent node performs segmentation recombination on the codes of the mark information in the first information analysis request according to a pre-stored segmentation dispatching rule to generate a second information analysis request, and converts the extracted data in a first characteristic section in the first information analysis request and a second characteristic section in the second information analysis request into first characteristic data and second characteristic data respectively, wherein the number of characters contained in the first characteristic section is equal to the number of characters contained in the second characteristic section, and the positions of the characters in the corresponding information analysis request are the same;
the analysis proxy node sends the first characteristic data to a first encryption node, and sends a first analysis request and a second analysis request to a second encryption node, wherein the first analysis request comprises the first information analysis request and the first characteristic data, and the second analysis request comprises the second information analysis request and the second characteristic data;
the second encryption node analyzes the first analysis request and the second analysis request into a first analysis plaintext and a second analysis plaintext respectively, and sends the first analysis plaintext and the second analysis plaintext to the first encryption node;
the first encryption node determines the attribute of the first analytic plaintext and the second analytic plaintext according to the first characteristic data and the first analytic plaintext and the second analytic plaintext;
and responding to the information analysis key input by the client, and determining whether the first analysis plaintext or the second analysis plaintext is to be sent to the client by the first encryption node according to the information analysis key and the attribute.
2. The blockchain-based industrial internet identification information resolution method of claim 1, wherein the method of selecting a resolution proxy node among a plurality of proxy nodes deployed in a blockchain comprises:
and calculating a corresponding analysis grade according to the mark information and the identity information of the scanning end, and determining a corresponding proxy node type according to the analysis grade so as to select an analysis proxy node.
3. The blockchain-based industrial internet identification information parsing method of claim 2, wherein the pre-stored segment serving rules include:
dividing a first information analysis request into at least two split sections according to the mark information, and determining a generation method of the second information analysis request according to whether character strings with the same length exist between the split sections;
if at least two split segments have the same length character string, the positions of the split segments with the same length character string are exchanged to form the second information analysis request;
if character strings with the same length do not exist between any two split sections, selecting one split section of the first information analysis request to replace the content of the first information analysis request with a random character string with the corresponding same length;
wherein, the random character string is different from the content of the split segment corresponding to the exchange, and the content of the character strings corresponding to the two split segments with the same length of character string is different.
4. The blockchain-based industrial internet identification information parsing method according to claim 3, wherein when converting the first feature data and the second feature data, converting the data in the first feature segment in the extracted first information parsing request into the first feature data and converting the data in the second feature segment in the second information parsing request into the second feature data according to a pre-stored data conversion rule;
the data conversion rule comprises a first conversion rule and a second conversion rule, and the conversion method of the conversion rule comprises the following steps:
converting the characteristic segment into characteristic data by using the first conversion rule, and judging whether to use the second conversion rule according to the characteristic data conversion result converted by the first conversion rule;
if the converted first characteristic data and the second characteristic data are the same, judging that the characteristic segment is converted into the characteristic data by using the second conversion rule;
if the converted first characteristic data and the second characteristic data are different, judging that the second conversion rule is not used;
the conversion results of the first conversion rule and the second conversion rule on the same characteristic section are different.
5. The blockchain-based industrial internet identification information parsing method of claim 4, wherein the method for the second encryption node to parse the first and second parse requests into first and second parse plaintext, respectively, comprises:
the second encryption node segments the information analysis request based on the mark information, distributes the first analysis request and the second analysis request to a plurality of corresponding analysis nodes according to the number of segments, and distributes a segmented analysis key to each analysis node correspondingly;
and each analysis node analyzes the first analysis plaintext and the second analysis plaintext based on the segmentation analysis key, the first analysis request and the second analysis request respectively to form a corresponding first analysis plaintext and a corresponding second analysis plaintext, and sends the corresponding first analysis plaintext and the corresponding second analysis plaintext to the first encryption node.
6. The blockchain-based industrial internet identification information resolution method of claim 5, further comprising:
the first encryption node scans the contents of the first analysis plaintext and the second analysis plaintext respectively, and determines the attributes of the first analysis plaintext and the second analysis plaintext according to whether the first characteristic data are present at the corresponding positions of the analysis plaintext.
7. The method for resolving blockchain-based industrial internet identification information according to claim 6, wherein the contents of the first and second characteristic segments are different, and the first and second characteristic segments are re-selected if the contents of the first and second characteristic segments are the same.
8. The method for resolving blockchain-based industrial internet identification information according to claim 7, wherein the first transformation rule is to sequentially order characters in the feature segment according to their english initials, and the second transformation rule is to transform character strings in the feature segment into a binary writing method.
9. The blockchain-based industrial internet identification information parsing method of claim 7, wherein the first encryption node selects to send parsing plaintext of a corresponding attribute to a client according to the attribute of the information parsing key;
and the client determines the modification authority of the resolving plaintext according to the authority of the information resolving key and records the modification authority in an information log.
10. A system for applying the blockchain-based industrial internet identification information resolution method of any of claims 1-9, comprising:
the scanning end is used for generating a first information analysis request according to the scanned mark information and the scanning end identity information;
the analysis request sending end is connected with the scanning end and used for sending an analysis request to the blockchain network;
the block chain network is connected with the analysis request sending end and used for decoding the analysis request and sending a decoding file to the client according to the client identification information, and the block chain network comprises a plurality of preset proxy nodes;
and the client is connected with the blockchain network and used for inputting an information analysis key and receiving an analysis plaintext.
CN202311393966.1A 2023-10-26 2023-10-26 Industrial Internet identification information analysis method and system based on block chain Active CN117134996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311393966.1A CN117134996B (en) 2023-10-26 2023-10-26 Industrial Internet identification information analysis method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311393966.1A CN117134996B (en) 2023-10-26 2023-10-26 Industrial Internet identification information analysis method and system based on block chain

Publications (2)

Publication Number Publication Date
CN117134996A CN117134996A (en) 2023-11-28
CN117134996B true CN117134996B (en) 2023-12-26

Family

ID=88854898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311393966.1A Active CN117134996B (en) 2023-10-26 2023-10-26 Industrial Internet identification information analysis method and system based on block chain

Country Status (1)

Country Link
CN (1) CN117134996B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020098839A2 (en) * 2020-02-14 2020-05-22 Alipay (Hangzhou) Information Technology Co., Ltd. Data authorization based on decentralized identifiers
CN111222155A (en) * 2020-01-08 2020-06-02 湖南智慧政务区块链科技有限公司 Method and system for combining re-encryption and block link
CN116248289A (en) * 2022-12-21 2023-06-09 重庆邮电大学 Industrial Internet identification analysis access control method based on ciphertext attribute encryption

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111222155A (en) * 2020-01-08 2020-06-02 湖南智慧政务区块链科技有限公司 Method and system for combining re-encryption and block link
WO2020098839A2 (en) * 2020-02-14 2020-05-22 Alipay (Hangzhou) Information Technology Co., Ltd. Data authorization based on decentralized identifiers
CN116248289A (en) * 2022-12-21 2023-06-09 重庆邮电大学 Industrial Internet identification analysis access control method based on ciphertext attribute encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的工业互联网标识解析系统实践初探;赵杰;《自动化应用》;全文 *

Also Published As

Publication number Publication date
CN117134996A (en) 2023-11-28

Similar Documents

Publication Publication Date Title
CN109598540B (en) Advertisement accurate pushing method and advertisement accurate pushing system
CN201716765U (en) Wine counterfeiting tracing system based on two-dimensional bar codes
CN1716855B (en) Call signs
US20080011841A1 (en) System and Method of Detecting Product Code Duplication and Product Diversion
US20090031135A1 (en) Tamper Proof Seal For An Electronic Document
EP3227853A1 (en) Cryptographic verification of provenance in a supply chain
CN103001770B (en) A kind of user rs authentication method, server and system
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
CN111475866A (en) Block chain electronic evidence preservation method and system
US20100088551A1 (en) Method and Apparatus for Risk Analysis of Published Logs
CN104836817A (en) Architecture and method for ensuring network information safety
US10931790B2 (en) Systems and methods for securely transferring selective datasets between terminals with multi-applications support
CN117134996B (en) Industrial Internet identification information analysis method and system based on block chain
CN115589298B (en) Method, device, system, equipment and medium for verifying information of block chain
CN115002141B (en) File storage method and device based on block chain
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN116614251A (en) Data security monitoring system
CN110545262A (en) block chain data transmission platform convenient for region accuracy
US20090028338A1 (en) Software product authentication
Uddin et al. Blockchain and IFPS based Secure System for Managing e-FIR
CN114493451A (en) Logistics management method and device based on industrial internet identification analysis
CN113435223A (en) Two-dimensional code release method based on block chain, block chain platform and release side platform
CN114080783A (en) System and method for securely communicating selective data sets between terminals supporting multiple applications
JP2009294896A (en) Data storage device, disclosure program for data stored in storage device, and disclosure method of data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant