CN117527191B - Data verification method and system based on blockchain digital identity cellular module - Google Patents
Data verification method and system based on blockchain digital identity cellular module Download PDFInfo
- Publication number
- CN117527191B CN117527191B CN202410018331.1A CN202410018331A CN117527191B CN 117527191 B CN117527191 B CN 117527191B CN 202410018331 A CN202410018331 A CN 202410018331A CN 117527191 B CN117527191 B CN 117527191B
- Authority
- CN
- China
- Prior art keywords
- data
- blockchain
- verification
- cellular module
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000001413 cellular effect Effects 0.000 title claims abstract description 56
- 238000013524 data verification Methods 0.000 title claims abstract description 43
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000012795 verification Methods 0.000 claims description 48
- 238000004422 calculation algorithm Methods 0.000 claims description 38
- 238000012545 processing Methods 0.000 claims description 8
- 238000012550 audit Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000013461 design Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 9
- 238000004891 communication Methods 0.000 abstract description 6
- 238000013500 data storage Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- INFDPOAKFNIJBF-UHFFFAOYSA-N paraquat Chemical compound C1=C[N+](C)=CC=C1C1=CC=[N+](C)C=C1 INFDPOAKFNIJBF-UHFFFAOYSA-N 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 238000010978 in-process monitoring Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of blockchain, and provides a data verification method and system based on a blockchain digital identity cellular module, wherein in a data acquisition stage, the blockchain module based on a distributed digital identity is adopted, acquired data is encrypted and signed through the distributed digital identity, a trust anchor point is arranged at an Internet of things terminal, and the credibility of a data source is ensured; in the data transmission stage, the encryption module is embedded into the communication module to ensure the credibility of a data transmission link, and the security and credibility of data storage are ensured through data hash uplink memory card; in the data verification stage, the blockchain module can verify the data of the Internet of things platform in an invisible data verification mode by combining the data, and the original data does not need to be discharged out of the Internet of things platform, so that the original data is ensured not to leak, the safe and reliable use of the data is ensured, and the confidence and accuracy of the blockchain data verification can be integrally improved.
Description
Technical Field
The invention relates to the technical field of blockchain, in particular to a data verification method and system based on a blockchain digital identity cellular module.
Background
In order to ensure the authenticity of the data collected by the Internet of things equipment, the Internet of things platform can upload the data collected by the equipment to a certificate. When the business side needs to use the data, the data can be checked to verify the authenticity of the data.
The scheme adopted at present is that data is uploaded through a cloud platform and then an auditor checks source data through the cloud platform, but the scheme is that the data is uploaded to the chain by a centralized cloud platform, the data checking extracts original data from the cloud platform, the credibility of the data source is doubtful, and the data is easy to leak; in another scheme, original data are clouded, data fingerprints are linked, an auditor extracts and verifies the source data and the data fingerprints, but the data audit is complex, the auditor needs to get the original data from a cloud platform, and calculation power needs to be provided for verifying the data; and the auditor needs the original data, which is easy to cause the data leakage of the Internet of things equipment.
In general, the existing internet of things platform and terminal communication and data verification have the defects of unreliable platform data, unreliable data verification and easy data leakage in the verification stage, and the confidence of the whole data verification is affected.
Disclosure of Invention
The present invention is directed to solving at least one of the technical problems existing in the related art. Therefore, the invention provides a data verification method and system based on a blockchain digital identity cellular module.
The invention provides a data verification method based on a blockchain digital identity cellular module, which comprises the following steps:
s1: registering the BID identification of both the user and the equipment to obtain a mutual recognition module;
s2: carrying out hash calculation on the original data to obtain hash data, adding a private key digital signature to the original data to obtain signature data, and carrying out block chain uplink on the hash data and the signature data;
s3: encrypting the original data to obtain encrypted data, uploading the encrypted data to an Internet of things platform, and decrypting the obtained encrypted data by the Internet of things platform to obtain decrypted data;
s4: the internet of things platform acquires data to be checked of a checking party and transmits the data to be checked to a digital account;
s5: the digital account invokes signature data corresponding to the data to be checked by the blockchain according to the BID identification of the data to be checked to obtain check data;
s6: and in the digital account, a public key on the blockchain is called through a preset verification algorithm to verify the private key digital signature of the verification data, and the hash value of the data to be verified is compared with the hash value of the verification data to obtain a verification result.
According to the data verification method based on the blockchain digital identity cellular module, in step S3, the original data is encrypted through an AES encryption algorithm.
According to the data verification method based on the blockchain digital identity cellular module, the step S4 further comprises the following steps:
s41: pre-writing a verification algorithm according to the data to be verified, and encrypting and storing the verification algorithm in a distributed system;
s42: and when the data to be checked is transmitted to the digital account, the encrypted checking algorithm is synchronously transmitted to the digital account.
According to the data verification method based on the blockchain digital identity cellular module, the digital account is established based on the front-end processor of the Internet of things platform.
According to the data verification method based on the blockchain digital identity cellular module, the step S6 further comprises the following steps:
s61: the digital account returns the verification result to the verification party;
s62: and the verification party encrypts the verification result and uploads the encrypted verification result to a blockchain for subsequent audit.
The invention also provides a data verification system based on the blockchain digital identity cellular module, which is used for executing the data verification method based on the blockchain digital identity, and comprises the following steps:
a data processing module: the method comprises the steps of registering BID identifications of a user and equipment to obtain a mutual recognition module, and collecting original data in the mutual recognition module;
a blockchain cellular module established based on a cellular module attached blockchain SDK;
the block chain cellular module is used for carrying out hash calculation on the original data to obtain hash data, adding a private key digital signature to the original data to obtain signature data, and carrying out block chain uplink on the hash data and the signature data;
the block chain cellular module is also used for encrypting the original data acquired by the data processing module to obtain encrypted data, and uploading the encrypted data to an Internet of things platform;
block chain network: the signature data generated by the block chain cellular module is received and shared;
internet of things platform: the encryption data are used for decrypting the encrypted data of the block chain cellular module to obtain decryption data; the method is also used for acquiring data to be checked of the checking party and transmitting the data to be checked to the digital account;
digital account: and the system is used for acquiring signature data corresponding to the data to be checked by the blockchain network according to the BID identification of the data to be checked sent by the Internet of things platform, acquiring the check data, acquiring a public key on the blockchain network through a preset check algorithm to check the digital signature of the private key of the check data, and comparing the hash value of the data to be checked with the hash value of the check data to obtain a check result.
According to the data verification system based on the blockchain digital identity cellular module, the blockchain cellular module is further used for conducting blockchain transaction and intelligent contract calling to a blockchain network through the added blockchain SDK.
According to the data verification system based on the blockchain digital identity cellular module, the blockchain SDK is designed in a layering manner.
According to the data verification method and system based on the blockchain digital identity cellular module, in the data acquisition stage, the blockchain module based on the distributed digital identity is adopted, acquired data are encrypted and signed through the distributed digital identity, and a trust anchor point is arranged at an Internet of things terminal, so that the credibility of a data source is ensured; in the data transmission stage, the encryption module is embedded into the communication module to ensure the credibility of a data transmission link, and the security and credibility of data storage are ensured through the uplink certificate of the data hash; in the data verification stage, the blockchain module can verify the data of the Internet of things platform in an invisible data verification mode by combining the data, and the original data does not need to be discharged out of the Internet of things platform, so that the original data is ensured not to leak, the safe and reliable use of the data is ensured, and the confidence and accuracy of the blockchain data verification can be integrally improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described, and it is obvious that the drawings in the description below are some embodiments of the invention, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a data verification method based on a blockchain digital identity cellular module.
FIG. 2 is a schematic diagram of a data verification system based on a blockchain digital identity cellular module according to the present invention.
Reference numerals:
100. a data processing module; 200. a blockchain cellular module; 300. a blockchain network; 400. an Internet of things platform; 500. a digital account.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention. The following examples are illustrative of the invention but are not intended to limit the scope of the invention.
In the description of the embodiments of the present invention, it should be noted that the terms "center", "longitudinal", "lateral", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are merely for convenience in describing the embodiments of the present invention and simplifying the description, and do not indicate or imply that the apparatus or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the embodiments of the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In describing embodiments of the present invention, it should be noted that, unless explicitly stated and limited otherwise, the terms "coupled," "coupled," and "connected" should be construed broadly, and may be either a fixed connection, a removable connection, or an integral connection, for example; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium. The specific meaning of the above terms in embodiments of the present invention will be understood in detail by those of ordinary skill in the art.
In embodiments of the invention, unless expressly specified and limited otherwise, a first feature "up" or "down" on a second feature may be that the first and second features are in direct contact, or that the first and second features are in indirect contact via an intervening medium. Moreover, a first feature being "above," "over" and "on" a second feature may be a first feature being directly above or obliquely above the second feature, or simply indicating that the first feature is level higher than the second feature. The first feature being "under", "below" and "beneath" the second feature may be the first feature being directly under or obliquely below the second feature, or simply indicating that the first feature is less level than the second feature.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the embodiments of the present invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Embodiments of the present invention are described below in conjunction with fig. 1-2.
The invention provides a data verification method based on a blockchain digital identity cellular module, which comprises the following steps:
s1: registering the BID identification of both the user and the equipment to obtain a mutual recognition module;
further, in order to solve the problem of equipment intercommunication among different cellular modules, a traditional internet of things platform and a blockchain platform, the invention adopts the BID identification based on the blockchain, firstly, a user and module equipment register the BID identification, mutual recognition among different equipment is realized through BID, and the mutual recognition module in the step S1 indicates that the obtained module has relation mapping with BID identities on the blockchain.
Star-fire identification BID (BID for short), which is a data carrier of star-fire-chain network, is also a primary address supported by the bottom layer of star-fire chain, and is also a method of distributing identity Identifier DID.
The BID technology is used for realizing digital identity assignment, the identity validity of an entity communicating with the terminal can be verified, the identity verification is realized, and the BID digital identity system established based on the blockchain has the characteristics of ensuring the authenticity and credibility of data, protecting the privacy safety of a user, being strong in portability and the like.
S2: carrying out hash calculation on the original data to obtain hash data, adding a private key digital signature to the original data to obtain signature data, and carrying out block chain uplink on the hash data and the signature data;
further, in order to prevent the identity of the device from being impersonated, the digital signature of the private key of the device is added to the uplink data hash, because the private key is managed by the device autonomously, other people cannot acquire the private key, so that the authenticity of the data source is ensured, and the BID identifier is added to the uplink data to uniquely mark the data.
S3: encrypting the original data to obtain encrypted data, uploading the encrypted data to an Internet of things platform, and decrypting the obtained encrypted data by the Internet of things platform to obtain decrypted data;
in step S3, the original data is encrypted by using an AES encryption algorithm.
Further, in the invention, AES or RSA is used for encrypting data, and the specific flow is as follows: firstly initializing, connecting a server, then carrying out data transmission, secondly judging whether a serial port exits data transmission, encrypting data by an AES mode if the serial port exits data transmission, uploading the encrypted data to the server, if the serial port does not exist, entering an AT mode to accept an instruction and carrying out configuration, then receiving the data by the server, decrypting the data by the AES mode, and storing the decrypted data correctly.
The AT command is a command applied to connection and communication between the terminal equipment and the PC application, and the AT is Attention, and each AT command line only contains one AT command; for the transmission of AT instructions, a length of 1056 characters (including the last null character) can be received AT most, in addition to the AT two characters.
Furthermore, the AES and similar common algorithms DES and 3DES adopted by the invention are mainly characterized in that the same secret key is adopted for encryption and decryption, and one secret key is shared, and the invention has the advantages of small calculated amount, high encryption speed and high encryption efficiency in the encryption and decryption process.
S4: the internet of things platform acquires data to be checked of a checking party and transmits the data to be checked to a digital account;
wherein, step S4 further comprises:
s41: pre-writing a verification algorithm according to the data to be verified, and encrypting and storing the verification algorithm in a distributed system;
s42: and when the data to be checked is transmitted to the digital account, the encrypted checking algorithm is synchronously transmitted to the digital account.
Further, encrypting the verification algorithm in step S42 is a preferred embodiment.
The digital account is established based on a front-end processor of the Internet of things platform.
Further, when the verifier needs to verify data, writing a verification algorithm according to the data content to be verified, encrypting the algorithm, and then, storing the algorithm in a distributed file system, wherein the verifier can send a data use request and an algorithm deployment request to an internet of things platform, and after the internet of things platform receives the request, the algorithm can be audited, and after the audit is passed, the algorithm is deployed in a front-end processor.
S5: the digital account invokes signature data corresponding to the data to be checked by the blockchain according to the BID identification of the data to be checked to obtain check data;
further, during the verification process, the verifier invokes the blockchain interface to obtain the hash value of the data stored on the chain according to the BID query of the data.
S6: and in the digital account, a public key on the blockchain is called through a preset verification algorithm to verify the private key digital signature of the verification data, and the hash value of the data to be verified is compared with the hash value of the verification data to obtain a verification result.
Further, before checking, the checking algorithm checks the authenticity of the data, and on one hand, the BID public key is obtained on the basis of chain removal to verify the data signature; on the other hand, the verification algorithm compares the hash calculated by the original data with the data hash stored on the chain to verify whether the data is tampered.
Wherein, step S6 further comprises:
s61: the digital account returns the verification result to the verification party;
s62: and the verification party encrypts the verification result and uploads the encrypted verification result to a blockchain for subsequent audit.
Further, after verification, the verification party encrypts and signs the verification result, and stores the verification result on the blockchain for subsequent audit.
The invention also provides a data verification system based on the blockchain digital identity cellular module, which is used for executing the data verification method based on the blockchain digital identity, and comprises the following steps:
data processing module 100: the method comprises the steps of registering BID identifications of a user and equipment to obtain a mutual recognition module, and collecting original data in the mutual recognition module;
a blockchain cellular module 200, the blockchain cellular module 200 being built based on a cellular module additional blockchain SDK;
the blockchain SDK is essentially based on a protocol stack hierarchy of a traditional cellular module, and a layer of blockchain client protocol is superimposed, so that an application can request blockchain services such as blockchain transaction, intelligent contract call and the like to the layer of blockchain client protocol, and the blockchain client protocol is further combined with key life cycle management, equipment attach and the like to form a blockchain software framework based on the module.
The blockchain cellular module 200 is configured to perform hash computation on the original data acquired by the data processing module 100 to obtain hash data, add a private key digital signature to the original data to obtain signature data, and perform blockchain uplink on the hash data and the signature data;
furthermore, the blockchain cellular module is a preset blockchain SDK in the traditional cellular module, so that the traditional cellular module is endowed with data credible uplink capability.
The blockchain cellular module 200 is further configured to encrypt the original data acquired by the data processing module 100, obtain encrypted data, and upload the encrypted data to the internet of things platform 400;
blockchain network 300: for receiving and sharing the signature data generated by the blockchain cellular module 200;
furthermore, the blockchain is a point-to-point network system which establishes and stores huge transaction data series by means of cryptography and a consensus mechanism, and the like, so that users can transparently share information in the network.
Internet of things platform 400: the decryption module is used for decrypting the encrypted data encrypted by the blockchain cellular module 200 to obtain decrypted data; the method is also used for acquiring data to be checked of the checking party and transmitting the data to be checked to the digital account;
further, the internet of things platform integrates device management, data security communication, message subscription and data service capability, supports connection devices, and collects device data to cloud.
Digital account 500: the method comprises the steps of acquiring signature data corresponding to data to be checked by the blockchain network 300 according to BID identification of the data to be checked sent by the Internet of things platform 400, acquiring the check data, acquiring a public key on the blockchain network 300 through a preset check algorithm to check a private key digital signature of the check data, and comparing a hash value of the data to be checked with a hash value of the check data to obtain a check result.
Further, the front end processor on which the digital account is based is a computer running a data calculation algorithm.
The digital account is a digital account system which is based on a blockchain technology, is built by taking DID as a core and faces to data element circulation, and the digital account system provides the capabilities of distributed digital identity, authorization and agreement, data trusted sharing exchange and the like.
The digital account provides a standardized, interoperable, secure data exchange layer with DID as an entry, which is a decentralised storage model, with data only stored where created.
The internet of things platform provided by the invention transmits the verification data required by the verification party to the digital account through the interface of the digital account, so that the internet of things platform not only can be trusted to share: the complete cryptography technology supports a plurality of software and hardware security modes to achieve the aims that the data is invisible and the original data does not go out of the domain; the implementation is easy: the algorithm development supports various general programming languages, and different information systems can be connected into an imaging account to complete interconnection and interworking, so that data circulation and interoperability are realized; and transparent traceability: the full interactive flow chain of data use of prior authorization, in-process monitoring and post-process audit is checked up, and the technical feasibility of complete right and supervision is provided for the system, the network and the data.
The blockchain cellular module 200 is further configured to perform blockchain transaction and intelligent contract invocation to the blockchain network 300 through the added blockchain SDK.
In addition, the data verification system based on the blockchain digital identity cellular module provided by the invention further comprises a core node: for message forwarding and routing; edge node: the edge node is accessed to the switching network through the core node, and is deployed on a front-end processor which is in butt joint with the data provider to calculate in the data provider domain; data switching core network: the core network consists of a set of core nodes, which are used only for message forwarding and routing.
Wherein the blockchain SDK is a hierarchical design.
Further, the blockchain SDK is composed of an interface layer, a protocol layer, an RPC layer, a vendor dependent layer, a generic tool and a utility implementation. The specific functions of each layer are as follows: interface layer: providing an interface for calling a corresponding blockchain by the application of the Internet of things; protocol layer: mainly realizing each block chain protocol part; RPC layer: providing data exchange services to a protocol layer; vendor dependent layer: providing services such as cryptography algorithm, signature, storage and the like for the wallet of the interface layer; universal tool: c language interface generation for smart contracts; the utility program: services such as data format conversion and message encoding and decoding are provided to each layer.
In addition, it should be noted that the verification algorithm and the system for executing the algorithm can be replaced by other algorithms for equipment analysis and other scenes, for example, a demand party carries out verification analysis on the running state of the terminal equipment through a data exchange network delivery analysis algorithm: for example, the device reports different index data such as set time, device location, sending frequency and the like, the data of the device is analyzed through a throwing algorithm, the original data cannot be leaked to a data user, and the running state of the current device is analyzed through an algorithm throwing mode.
In addition, the data verification system based on the blockchain digital identity cellular module provided by the invention can be replaced by equipment, a terminal, hardware, a chip and the like, and the modification or replacement does not cause the essence of the corresponding technical scheme to deviate from the spirit and the scope of the technical scheme of each embodiment of the invention.
The invention provides a data verification method and a system based on a blockchain digital identity cellular module, which aim to solve the problem that a centralized cloud platform influences the overall confidence, and whether the data of the platform are acquired by an Internet of things acquisition device at the end side through the Internet of things technology is uncertain; the collection and the use of the internet of things platform data have a plurality of independent stakeholders, and all the stakeholders have no commonly trusted third party; a time interval exists between the acquisition and the use of the data, the data can be used only after being stored for a period of time, and the timeliness of the data stored for a long time can not be verified; the data is valuable to multiple parties, the data among the multiple parties can be timely shared, and the consistency of the data is ensured; the data sharing multiparty is a peer-to-peer relationship, rather than a superior-to-inferior relationship; the data collection party and the data use party are not problems of the same party. The data whole flow credibility guarantee from the end side to the platform and from the platform to the use verification can be realized, specifically, the credibility of the trust anchor point in the data source is guaranteed by the terminal of the Internet of things; the encryption module is embedded into the communication module to ensure the credibility of the data transmission link; the data hash uplink certificate ensures the safety and credibility of data storage; the data can be checked in an invisible mode, the original data does not go out of the domain, and the use safety and the credibility of the data are ensured; the verifier performs data verification in a self-defined algorithm mode, and the credibility of the data verification result is ensured.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.
Claims (8)
1. The data verification method based on the blockchain digital identity cellular module is characterized by comprising the following steps of:
s1: registering the BID identification of both the user and the equipment to obtain a mutual recognition module;
s2: collecting original data in the mutual recognition module, carrying out hash calculation on the original data to obtain hash data, adding a private key digital signature to the original data to obtain signature data, and carrying out block chain uplink on the hash data and the signature data;
s3: encrypting the original data to obtain encrypted data, uploading the encrypted data to an Internet of things platform, and decrypting the obtained encrypted data by the Internet of things platform to obtain decrypted data;
s4: the internet of things platform acquires data to be checked of a checking party and transmits the data to be checked to a digital account;
s5: the digital account invokes signature data corresponding to the data to be checked by the blockchain according to the BID identification of the data to be checked to obtain check data;
s6: and in the digital account, a public key on the blockchain is called through a preset verification algorithm to verify the private key digital signature of the verification data, and the hash value of the data to be verified is compared with the hash value of the verification data to obtain a verification result.
2. The data verification method based on a blockchain digital identity cellular module according to claim 1, wherein in step S3, the original data is encrypted by an AES encryption algorithm.
3. The data verification method based on a blockchain digital identity cellular module of claim 1, wherein step S4 further comprises:
s41: pre-writing a verification algorithm according to the data to be verified, and encrypting and storing the verification algorithm in a distributed system;
s42: and when the data to be checked is transmitted to the digital account, the encrypted checking algorithm is synchronously transmitted to the digital account.
4. The blockchain digital identity cellular module-based data verification method of claim 1, wherein the digital account is established based on a front-end processor of the internet of things platform.
5. The data verification method based on a blockchain digital identity cellular module of claim 1, wherein step S6 further comprises:
s61: the digital account returns the verification result to the verification party;
s62: and the verification party encrypts the verification result and uploads the encrypted verification result to a blockchain for subsequent audit.
6. A blockchain digital identity module-based data verification system for performing the blockchain digital identity module-based data verification method of any of claims 1 to 5, comprising:
a data processing module: the method comprises the steps of registering BID identifications of a user and equipment to obtain a mutual recognition module, and collecting original data in the mutual recognition module;
a blockchain cellular module established based on a cellular module attached blockchain SDK;
the block chain cellular module is used for carrying out hash calculation on the original data to obtain hash data, adding a private key digital signature to the original data to obtain signature data, and carrying out block chain uplink on the hash data and the signature data;
the block chain cellular module is also used for encrypting the original data acquired by the data processing module to obtain encrypted data, and uploading the encrypted data to an Internet of things platform;
block chain network: the signature data generated by the block chain cellular module is received and shared;
internet of things platform: the encryption data are used for decrypting the encrypted data of the block chain cellular module to obtain decryption data; the method is also used for acquiring data to be checked of the checking party and transmitting the data to be checked to the digital account;
digital account: and the system is used for acquiring signature data corresponding to the data to be checked by the blockchain network according to the BID identification of the data to be checked sent by the Internet of things platform, acquiring the check data, acquiring a public key on the blockchain network through a preset check algorithm to check the digital signature of the private key of the check data, and comparing the hash value of the data to be checked with the hash value of the check data to obtain a check result.
7. The blockchain digital identity cellular module-based data verification system of claim 6, wherein the blockchain cellular module is further configured to conduct blockchain transactions and intelligent contract invocations to a blockchain network through the additional blockchain SDKs.
8. The blockchain digital identity cellular module-based data verification system of claim 6, wherein the blockchain SDK is a hierarchical design.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410018331.1A CN117527191B (en) | 2024-01-05 | 2024-01-05 | Data verification method and system based on blockchain digital identity cellular module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410018331.1A CN117527191B (en) | 2024-01-05 | 2024-01-05 | Data verification method and system based on blockchain digital identity cellular module |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117527191A CN117527191A (en) | 2024-02-06 |
CN117527191B true CN117527191B (en) | 2024-03-22 |
Family
ID=89753497
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410018331.1A Active CN117527191B (en) | 2024-01-05 | 2024-01-05 | Data verification method and system based on blockchain digital identity cellular module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117527191B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110162984A (en) * | 2019-05-05 | 2019-08-23 | 政采云有限公司 | The method of calibration and system of electronic bidding data based on block chain |
CN113011906A (en) * | 2020-12-10 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Multimedia information processing method and device, electronic equipment and storage medium |
CN113726522A (en) * | 2021-09-01 | 2021-11-30 | 北京泰尔英福网络科技有限责任公司 | Internet of things equipment processing method and device based on block chain |
WO2022065579A1 (en) * | 2020-09-22 | 2022-03-31 | 이호준 | Blockchain-based genetic information transaction system and method |
CN116150234A (en) * | 2023-04-20 | 2023-05-23 | 中国信息通信研究院 | Block chain-based data certification method, device, equipment and medium |
-
2024
- 2024-01-05 CN CN202410018331.1A patent/CN117527191B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110162984A (en) * | 2019-05-05 | 2019-08-23 | 政采云有限公司 | The method of calibration and system of electronic bidding data based on block chain |
WO2022065579A1 (en) * | 2020-09-22 | 2022-03-31 | 이호준 | Blockchain-based genetic information transaction system and method |
CN113011906A (en) * | 2020-12-10 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Multimedia information processing method and device, electronic equipment and storage medium |
CN113726522A (en) * | 2021-09-01 | 2021-11-30 | 北京泰尔英福网络科技有限责任公司 | Internet of things equipment processing method and device based on block chain |
CN116150234A (en) * | 2023-04-20 | 2023-05-23 | 中国信息通信研究院 | Block chain-based data certification method, device, equipment and medium |
Non-Patent Citations (1)
Title |
---|
基于区块链的军事数据云存储共享方案;张先洪;劳宪银;谭仁杨;梁海;;网络安全技术与应用;20200611(第06期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN117527191A (en) | 2024-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112073379B (en) | Lightweight Internet of things security key negotiation method based on edge calculation | |
CN113783836B (en) | Internet of things data access control method and system based on block chain and IBE algorithm | |
CN111314056B (en) | Heaven and earth integrated network anonymous access authentication method based on identity encryption system | |
WO2019237570A1 (en) | Electronic contract signing method, device and server | |
CN112953727A (en) | Internet of things-oriented equipment anonymous identity authentication method and system | |
BRPI0710114A2 (en) | Method and system for telephone number discovery and telephone number authentication for mobile communication devices | |
US20230089134A1 (en) | Data communication method and apparatus, computer device, and storage medium | |
US20080150753A1 (en) | Secure Data Transfer In A Communication System Including Portable Meters | |
CN113515756B (en) | High-credibility digital identity management method and system based on block chain | |
CN112422587B (en) | Identity verification method and device, computer equipment and storage medium | |
WO2023071751A1 (en) | Authentication method and communication apparatus | |
CN108964892A (en) | Generation method, application method, management system and the application system of trusted application mark | |
CN114531680B (en) | Light-weight IBC bidirectional identity authentication system and method based on quantum key | |
CN112436936B (en) | Cloud storage method and system with quantum encryption function | |
CN114866245B (en) | Power data acquisition method and system based on block chain | |
CN101547097B (en) | Digital media management system and management method based on digital certificate | |
US7941668B2 (en) | Method and system for securely managing application transactions using cryptographic techniques | |
CN114938311A (en) | Data processing method and system based on artificial intelligence | |
CN114745180A (en) | Access authentication method and device and computer equipment | |
CN114519197A (en) | Data storage architecture and method based on block chain and cloud service | |
CN103781026A (en) | Authentication method of general authentication mechanism | |
CN212649500U (en) | Identity card reading system based on card body information | |
CN117527191B (en) | Data verification method and system based on blockchain digital identity cellular module | |
CN109005029B (en) | Trusted application mark generation method and system, application method and apply end equipment | |
CN114844695B (en) | Business data circulation method, system and related equipment based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Zhang Fazhen Inventor after: Zhang Zhichun Inventor after: Liu Muxin Inventor after: Liu Jinghui Inventor after: Li Hang Inventor before: Zhang Fazhen Inventor before: Zhang Zhichun Inventor before: Liu Muxin Inventor before: Liu Jinghui Inventor before: Li Hang |
|
GR01 | Patent grant | ||
GR01 | Patent grant |