CN117914462A - Data flow mapping method and device based on block chain technology - Google Patents

Data flow mapping method and device based on block chain technology Download PDF

Info

Publication number
CN117914462A
CN117914462A CN202311684198.5A CN202311684198A CN117914462A CN 117914462 A CN117914462 A CN 117914462A CN 202311684198 A CN202311684198 A CN 202311684198A CN 117914462 A CN117914462 A CN 117914462A
Authority
CN
China
Prior art keywords
metadata
metadata collection
signature
collection item
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311684198.5A
Other languages
Chinese (zh)
Inventor
孙亚东
谭咏茂
蔚晨
吴海洋
张荣臻
向小佳
丁永建
李璠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Everbright Technology Co ltd
Original Assignee
Everbright Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Everbright Technology Co ltd filed Critical Everbright Technology Co ltd
Priority to CN202311684198.5A priority Critical patent/CN117914462A/en
Publication of CN117914462A publication Critical patent/CN117914462A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the application provides a data flow mapping method based on a block chain technology, which comprises the following steps: constructing a metadata collection item comprising metadata, a circulation node and signature information, and signing the metadata collection item; recording the metadata collection items in a plurality of blocks in a blockchain by adopting a workload certification algorithm based on the blockchain; and checking signature on the metadata collection items, and drawing a metadata flow tree diagram on the metadata collection items passing through the checking signature by using a hash tree mechanism. The application solves the problems that the data transfer recording formats are not uniform, the data transfer process is easy to be tampered and deleted, and the data transfer drawing formats are not uniform.

Description

Data flow mapping method and device based on block chain technology
Technical Field
The application relates to the field of data security, in particular to a data flow mapping method and device based on a block chain technology.
Background
Along with the gradual deepening of the digital degree of society, each industry needs to undergo digital metamorphism and digital transformation, and national and industry administration units are providing basic guarantee for digital economic development.
In recent years, the event of stealing data by personnel in enterprises, such as stealing and selling tens of thousands of pieces of user information by personnel in banks, the actions of stealing sensitive data and stealing account numbers by personnel in banks, have become the most main cause of enterprise data leakage. Because the insider has legal access rights of enterprise data assets and knows the storage position of enterprise sensitive data, the insider freely walks in the enterprise intranet under the protection of legal outerwear, and long-term and hidden data stealing behavior is carried out.
The root cause of the phenomenon is that the enterprise has complex operation and activities, more business systems and large data scale, and people cannot exhaust the use and access rules of many-to-many among personnel, terminals, applications and data, so that huge illegal activity space is reserved for internal malicious personnel. Under the condition, the security department can only focus on the known and definite security threat, so that the internal personnel can find out the data steal behaviors difficultly for a long time and conceal the data, and the data leakage event is still endless.
When a traditional method is adopted to record a data flow log, different systems often adopt respectively defined data flow record formats, so that the data flow formats are not uniform among a plurality of systems, and when later statistical analysis is carried out, the log data processing workload is huge and the data loss is great; when the traditional method is adopted to record and store the data flow log, no reasonable data security protection measures are adopted, so that the flow log is easy to tamper; when the traditional method is adopted to record and store the data flow log, no reasonable data security protection measures are adopted, so that the flow log is easy to delete; when the traditional method is adopted to compile the data flow chart, different systems are caused due to lack of a unified compiling mechanism, and the data flow chart with different shapes and different exhibiting modes is drawn; in the traditional data flow chart drawing method, after data are organized in time sequence, the flow is drawn from front to back. After the data has changed, it takes a long time to determine the changed node, and then draw a dataflow graph from the beginning.
Disclosure of Invention
The embodiment of the application provides a data flow mapping method and device based on a block chain technology, which at least solve the problems that the data flow recording format is not uniform, the data flow process is easy to tamper and delete, and the data flow diagram mapping format is not uniform.
According to an embodiment of the present application, there is provided a data flow mapping method based on a blockchain technique, including: constructing a metadata collection item comprising metadata, a circulation node and signature information, and signing the metadata collection item; recording the metadata collection items in a plurality of blocks in a blockchain by adopting a workload certification algorithm based on the blockchain; and checking signature on the metadata collection items, and drawing a metadata flow tree diagram on the metadata collection items passing through the checking signature by using a hash tree mechanism.
In one exemplary embodiment, constructing a metadata collection item including the metadata, the streaming node, and the signature information includes: the metadata collection item including the metadata, the stream node, and the signature information is constructed based on a just-in-time compilation programming language object representation JSON.
In an exemplary embodiment, the metadata collection item further includes: source address, source address type, destination address type, time of circulation, and data item identifier ID.
In one exemplary embodiment, signing the metadata collection item includes: generating a hash value of the metadata collection item by using a password hash algorithm; and generating a first signature value of the metadata collection item according to the signature private key and the hash value of the metadata collection item by using an elliptic curve public key cryptographic algorithm.
In one exemplary embodiment, each block of the blockchain includes: a block header and a block body; the block header comprises a front block hash value, a block header random positive integer, a time stamp and a block body hash value; the tile body includes metadata collection items.
In one exemplary embodiment, recording the metadata collection items in a plurality of chunks in a blockchain using a workload certification algorithm based on the blockchain includes: and determining a strong computing block in a block chain by using a workload proof consensus algorithm, and recording the metadata set item in a block body of the strong computing block, wherein a random positive integer with a median of the strong computing block larger than the block head random positive integer can be divided by the block head random positive integer.
In one exemplary embodiment, signing the metadata collection item includes: generating a hash value of the metadata collection item by using the password hash algorithm; and generating a second signature value of the metadata collection item according to the signature private key and the hash value of the metadata collection item by using the elliptic curve public key cryptographic algorithm.
In one exemplary embodiment, signing the metadata collection item includes: and comparing the first signature value with the second signature value, if the first signature value is equal to the second signature value, checking the signature to pass, and if the first signature value is not equal to the second signature value, checking the signature to not pass.
In one exemplary embodiment, the metadata stream tree is drawn using the hash tree mechanism, including: and drawing and generating the metadata circulation tree diagram by using the hash tree mechanism and taking the metadata of the metadata collection item as a first dimension, the circulation time as a second dimension and the source address and the target address as a third dimension.
According to another embodiment of the present application, there is provided a data flow mapping apparatus based on a blockchain technique, including: the construction module is used for constructing a metadata collection item comprising metadata, a circulation node and signature information and signing the metadata collection item; a recording module for recording the metadata collection items in a plurality of blocks in a blockchain using a blockchain-based workload certification algorithm; and the drawing module is used for checking the metadata collection items, and drawing a metadata flow tree diagram for the metadata collection items passing through the checking by utilizing a hash tree mechanism.
According to a further embodiment of the invention, there is also provided a computer readable storage medium having stored therein a computer program, wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
According to a further embodiment of the invention, there is also provided an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
According to the embodiment of the application, as the metadata collection items comprising metadata, the circulation nodes and the signature information are constructed, the data circulation is recorded in a unified mode, and after the metadata collection items are signed, the metadata collection items are recorded in a plurality of blocks in a blockchain by adopting a workload proof algorithm based on the blockchain, the problem that the metadata collection items are easy to tamper and delete is solved, the metadata collection items are checked before the data circulation map is drawn, and the metadata circulation tree map is drawn for the metadata collection items which pass the check by utilizing a unified drawing format, namely a hash tree mechanism, so that the normalization and the accuracy of the metadata circulation map are ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a block diagram of the hardware architecture of a computer terminal for a blockchain technology-based data flow mapping method in accordance with an embodiment of the application;
FIG. 2 is a flow chart of a data flow mapping method based on blockchain techniques in accordance with an embodiment of the application;
FIG. 3 is a block diagram of a block chain technology based data flow mapping apparatus in accordance with an embodiment of the present application;
FIG. 4 is a flow chart of a data flow mapping method based on blockchain techniques in accordance with yet another embodiment of the present application;
FIG. 5 is a metadata collection item composition diagram according to an embodiment of the present application;
FIG. 6 is a metadata definition table according to an embodiment of the present application;
FIG. 7 is a flow node definition table according to an embodiment of the application;
FIG. 8 is a diagram of a digital signature process according to an embodiment of the present application;
FIG. 9 is a block diagram according to an embodiment of the present application;
FIG. 10 is a schematic diagram of a block linked list according to an embodiment of the present application;
FIG. 11 is a schematic diagram of a metadata collection Xiang Haxi according to an embodiment of the present application;
FIG. 12 is a schematic diagram of a workload certification based consensus algorithm in accordance with an embodiment of the present application;
FIG. 13 is a flow chart of a data flow mapping method based on blockchain techniques in accordance with another embodiment of the present application;
FIG. 14 is a diagram of a label verification process according to an embodiment of the application;
FIG. 15 is a dimension association table of a metadata stream treemap in accordance with an embodiment of the present application;
Fig. 16 is a schematic diagram of metadata stream according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It is noted that the terms "comprises" and "comprising," and any variations thereof, in the description and claims of the present application and in the foregoing figures, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order.
The following is a description of the relevant terminology of embodiments of the invention:
Metadata, which is a carrier of information representation, may define a chinese character or character as metadata, or may define a chinese word or an english word as metadata.
Blockchain the blockchain technology originates from the "Ben-Can" in 2008, a founding article published in the cryptography mail group, bitcoin: a point-to-point electronic cash system, a blockchain, is a cryptographically guaranteed untriminable and non-counterfeitable decentralized shared ledger that combines blocks of data in a linked list fashion in time order into a specific data structure.
Hash algorithm, which is a one-way cryptographic mechanism that guarantees that transaction information is not tampered with in a blockchain, a secure hash algorithm-256 (Secure Hash Algorithm-256, sha-256) is typically used in the blockchain to generate digest information, i.e., 256 bits in length, and output 32 bytes of random hash data.
Hash tree, which is a tree storing hash values, whose leaf nodes store hash values of each piece of data, for quickly locating whether a piece of data is tampered with.
The method embodiments provided in the embodiments of the present application may be performed in a mobile terminal, a computer terminal or similar computing device. Taking the example of running on a computer terminal, fig. 1 is a block chain technology-based data flow mapping method according to an embodiment of the present application. As shown in fig. 1, a computer terminal may include one or more (only one is shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a microprocessor (Central Processing Unit, MCU), a programmable logic device (Field Programmable GATE ARRAY, FPGA), etc.) and a memory 104 for storing data, where the computer terminal may also include a transmission device 106 for communication functions and an input-output device 108. It will be appreciated by those skilled in the art that the configuration shown in fig. 1 is merely illustrative and is not intended to limit the configuration of the computer terminal described above. For example, the computer terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store computer programs, such as software programs and modules of application software, such as a computer program corresponding to a data flow mapping method based on a blockchain technique in an embodiment of the present invention, and the processor 102 executes the computer programs stored in the memory 104 to perform various functional applications and data processing, that is, implement the above-mentioned method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located relative to the processor 102, which may be connected to the computer terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 106 is arranged to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of a computer terminal. In one example, the transmission device 106 includes a network adapter (Network Interface Controller, simply referred to as a NIC) that can connect to other network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet wirelessly.
According to an aspect of an embodiment of the present application, a data flow mapping method based on a blockchain technique is provided. FIG. 2 is a flow chart of a data flow mapping method based on a blockchain technique according to an embodiment of the application, as shown in FIG. 2, the method includes the steps of:
Step S202, constructing a metadata collection item comprising metadata, a circulation node and signature information, and signing the metadata collection item;
By further defining the representation format of the metadata collection item, the problem of non-uniform data flow record format is solved. The metadata collection item is signed, so that the problem that the data flow record is easy to tamper is solved.
Constructing a metadata collection item including the metadata, the stream node, and the signature information in step S202 of the present embodiment includes constructing the metadata collection item including the metadata, the stream node, and the signature information based on a just-in-time compilation programming language object representation JSON.
The metadata collection item in step S202 of the present embodiment further includes: source address, source address type, destination address type, time of circulation, and data item identifier ID.
Signing the metadata collection item in step S202 of the present embodiment includes: generating a hash value of the metadata collection item by using a password hash algorithm; and generating a first signature value of the metadata collection item according to the signature private key and the hash value of the metadata collection item by using an elliptic curve public key cryptographic algorithm.
Step S204, recording the metadata collection items in a plurality of blocks in a blockchain by adopting a workload certification algorithm based on the blockchain;
Each block of the blockchain in step S204 of the present embodiment includes: a block header and a block body; the block header comprises a front block hash value, a block header random positive integer, a time stamp and a block body hash value; the tile body includes metadata collection items.
In step S204 of the present embodiment, recording the metadata collection item in a plurality of blocks in a blockchain using a workload certification algorithm based on the blockchain includes: and determining a strong computing block in a block chain by using a workload proof consensus algorithm, and recording the metadata set item in a block body of the strong computing block, wherein a random positive integer with a median of the strong computing block larger than the block head random positive integer can be divided by the block head random positive integer.
And searching the data log record nodes by using a workload proof algorithm based on the blockchain, and recording metadata collection items by using a plurality of nodes in the blockchain, thereby solving the problem that the data log record is easy to delete.
And S206, checking labels of the metadata collection items, and drawing a metadata flow tree diagram of the metadata collection items passing through the checking labels by utilizing a hash tree mechanism.
In step S206 of the present embodiment, signing the metadata collection item includes: generating a hash value of the metadata collection item by using the password hash algorithm; and generating a second signature value of the metadata collection item according to the signature private key and the hash value of the metadata collection item by using the elliptic curve public key cryptographic algorithm.
In step S206 of the present embodiment, signing the metadata collection item includes: and comparing the first signature value with the second signature value, if the first signature value is equal to the second signature value, checking the signature to pass, and if the first signature value is not equal to the second signature value, checking the signature to not pass.
In step S206 of the present embodiment, the metadata stream tree diagram is drawn by using the hash tree mechanism, including: and drawing and generating the metadata circulation tree diagram by using the hash tree mechanism and taking the metadata of the metadata collection item as a first dimension, the circulation time as a second dimension and the source address and the target address as a third dimension.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. read-only memory/Random Access Memory, ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiment also provides a data flow mapping device based on a blockchain technology, which is used for realizing the embodiment and the preferred implementation, and is not described in detail. As used below, the term "module" or "unit" may be a combination of software and/or hardware that implements the predetermined functionality. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 3 is a block diagram of a block chain technology-based data flow mapping apparatus according to an embodiment of the present application, and as shown in fig. 3, the block chain technology-based data flow mapping apparatus 300 includes: a construction module 10, a recording module 20 and a drawing module 30.
A construction module 10, configured to construct a metadata collection item including metadata, a stream node, and signature information, and sign the metadata collection item;
a recording module 20 for recording the metadata collection items in a plurality of blocks in a blockchain using a blockchain-based workload certification algorithm;
And the drawing module 30 is used for signing the metadata collection items, and drawing a metadata flow tree diagram for the metadata collection items which pass through the signing by utilizing a hash tree mechanism.
It should be noted that each of the above modules may be implemented by software or hardware, and for the latter, it may be implemented by, but not limited to: the modules are all located in the same processor; or the above modules may be located in different processors in any combination.
In order to facilitate understanding of the technical solutions provided by the application embodiments, the following description is provided in connection with embodiments of specific scenarios.
FIG. 4 is a flowchart of a data flow mapping method based on a blockchain technique according to yet another embodiment of the present application, as shown in FIG. 4, the method includes the steps of:
Step S402, collecting data streaming information by adopting a programming language object representation (Jave Script Object Notation, JSON) protocol based on just-in-time compilation;
specifically, as shown in fig. 5, the metadata collection item based on JSON protocol is composed of three parts of metadata, a stream node and signature information.
In the embodiment of the application, a word with a specific meaning or an English word is defined as metadata, and the metadata definition table is shown in fig. 6 based on data classification and data subclass in a typical data grading rule reference table of a financial institution in the financial industry standard of the people's republic of China.
In the embodiment of the application, data is circulated in a network through software and hardware of a system, a server, a router, a switch, a network cable and the like, so as to draw a data circulation condition.
Step S404, generating a signature of the metadata collection item by using a password hash algorithm (sm 3) and an elliptic curve public key cryptographic algorithm (sm 2);
Specifically, as shown in fig. 8, the process of generating the digital signature is: let the metadata collection item be d (excluding signature item), signature private key p; generating a hash value sm3 (d) =d_hash of the metadata collection item; generating a signature value sm2 (p, d_hash) =d_signature of a metadata collection item generates a digital signature for the metadata collection item, ensuring the availability and integrity of the metadata collection item.
In the embodiment of the application, the elliptic curve public key cryptographic algorithm is a national public key cryptographic algorithm standard, and the main content of the elliptic curve public key cryptographic algorithm comprises 3 parts: digital signature algorithm, key exchange protocol, public key encryption algorithm. Elliptic curve public key cryptographic algorithm is published in 2012 first public at 12 months, and 2012 becomes a Chinese commercial cryptographic standard, and 2016 becomes a Chinese national cryptographic standard.
In an embodiment of the application, the cryptographic hash algorithm is a basic tool of modern cryptography, which is capable of compressing messages of arbitrary length into digests of fixed length. Hash values are also called hash codes, message digests, digital fingerprints. Cryptographic hashing algorithms are often informally referred to as hashing algorithms. The importance of the hash algorithm is that it can give each message unique digital fingerprint, even if one letter of the message is changed, the corresponding hash value will become a distinct fingerprint, the hash algorithm has this extremely important role in modern cryptography, its most commonly used is in digital signature and data integrity protection, the hash algorithm is the core technology of digital signature, when a public key algorithm such as elliptic curve public key cryptographic algorithm is used to digitally sign, it is not usually to directly sign the message, but to sign the hash value of the message, so that the calculation amount can be reduced, the efficiency can be improved, and some algebraic structures of the digital signature algorithm can be destroyed, and the security can be ensured. The hash algorithm is a basic condition for the security of many cryptographic algorithms, and can be used for designing message authentication codes and a plurality of provable security protocols, and is widely applied to password protection protocols, electronic payment protocols, broadcast authentication protocols and other cryptographic protocols.
Step S406, recording metadata collection items in a plurality of blocks in a block chain by adopting a workload proof algorithm based on the block chain, and recording data flow information;
Specifically, as shown in fig. 9, a complete block is composed of two parts, a block header and a block body.
Wherein, the block header comprises: front block hash, consensus algorithm, random number, timestamp, data block hash value;
(1) The hash value of the front block is generated by adopting a hash algorithm such as a password hash algorithm and the like, a plurality of blocks are connected by the hash value, and a block chain table formed by connecting the plurality of blocks is shown in fig. 10;
(2) The invention adopts a workload proving method as a consensus algorithm;
(3) A random number, which is generated by a random number generator, is a 64-bit positive integer random number;
(4) The time stamp adopts machine time as the basis for generating the time stamp;
(5) The data block is hashed, a hash tree structure is adopted to obtain a hash value of the block, the root of the hash tree structure is hashed, the hash value is recorded in the block header, and the metadata set Xiang Haxi is shown in fig. 11.
Specifically, FIG. 12 is a schematic diagram of a consensus algorithm based on workload certification according to an embodiment of the present application. Determining a block body for recording metadata collection items by adopting a workload proof algorithm based on the blockchain, wherein the process for recording the metadata collection items into the block body is as follows: each node runs a random number solving algorithm to obtain a result a, a is a 128-bit positive integer, and a is required to be divided by a 64-bit positive integer random number b in the block head, namely: amod b=0; the first node which meets the above conditions is found, the current data stream information is recorded, and the metadata collection item is recorded in the block body.
In step S408, a data flow chart is drawn based on the hash tree.
Specifically, fig. 13 is a flowchart for rendering a dataflow graph based on a hash tree according to an embodiment of the present application, including the steps of:
Step 1302, signing the metadata collection item;
Specifically, fig. 14 is a diagram of a label verification process according to an embodiment of the present application. Let the metadata collection item be d (excluding signature item), signature private key p; finding a data signature d_signature of the metadata collection item from the metadata collection item; generating a hash value sm3 (d) =d_hash of the metadata collection item; generating a signature value sm2 (p, d_hash) =d_signature_2 of the metadata collection item; comparing d_signature with d_signature_2 to determine whether the data are equal, if so, indicating that the data are not tampered and the identity is proper, and checking the signature. Otherwise, the verification sign does not pass.
Step 1304, drawing a dataflow graph;
specifically, based on the hash tree, a metadata flow tree diagram is generated by taking a metadata item of a metadata set item as a first dimension, taking a flow time as a second dimension and taking a source address and a target address as a third dimension, an association representation diagram of the three dimensions is shown in fig. 15, and a metadata flow diagram is shown in fig. 16.
Step 1306, find the changed data transfer record.
Specifically, a hash tree structure is adopted to organize the circulation data of the metadata collection items, and when the data on a certain branch changes, the hash value of the upper node changes and is reflected to the root node together. When searching for the changed node, traversing downwards from the tree root, and finding the changed circulation record in the linear time, thereby realizing rapid definition of the changed data.
From the above description, it can be seen that the embodiment of the present application defines the metadata collection item format, and solves the problem of non-uniform data transfer recording format; the data flow chart is drawn in the finite field space through the hash tree and the metadata collection item, so that the problem of non-uniform drawing format of the data flow chart is solved; the problem of easy data tampering is solved by virtue of the data abstract, the data signature and the signature verification based on the block chain; through the workload proving method based on the block chain, a plurality of strong computing nodes record the data circulation log together, so that the problem of easy deletion of data is solved.
It will be appreciated by those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be concentrated on a single computing device, or distributed across a network of computing devices, they may be implemented in program code executable by computing devices, so that they may be stored in a storage device for execution by computing devices, and in some cases, the steps shown or described may be performed in a different order than that shown or described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple modules or steps of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The foregoing is merely a preferred embodiment of the present application and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present application, which are intended to be comprehended within the scope of the present application.

Claims (12)

1. A data flow mapping method based on a blockchain technique, comprising:
Constructing a metadata collection item comprising metadata, a circulation node and signature information, and signing the metadata collection item;
Recording the metadata collection items in a plurality of blocks in a blockchain by adopting a workload certification algorithm based on the blockchain;
And checking signature on the metadata collection items, and drawing a metadata flow tree diagram on the metadata collection items passing through the checking signature by using a hash tree mechanism.
2. The method of claim 1, wherein constructing a metadata collection item comprising the metadata, the streaming node, and the signature information comprises:
The metadata collection item including the metadata, the stream node, and the signature information is constructed based on a just-in-time compilation programming language object representation JSON.
3. The method of claim 1, wherein the metadata collection item further comprises:
source address, source address type, destination address type, time of circulation, and data item identifier ID.
4. The method of claim 1, wherein signing the metadata collection item comprises:
generating a hash value of the metadata collection item by using a password hash algorithm;
And generating a first signature value of the metadata collection item according to the signature private key and the hash value of the metadata collection item by using an elliptic curve public key cryptographic algorithm.
5. The method of claim 1, wherein each block of the blockchain includes: a block header and a block body;
The block header comprises a front block hash value, a block header random positive integer, a time stamp and a block body hash value;
the tile body includes metadata collection items.
6. The method of claim 5, wherein recording the metadata collection entries in a plurality of chunks in a blockchain using a workload certification algorithm based on the blockchain, comprises:
And determining a strong computing block in a block chain by using a workload proof consensus algorithm, and recording the metadata set item in a block body of the strong computing block, wherein a random positive integer with a median of the strong computing block larger than the block head random positive integer can be divided by the block head random positive integer.
7. The method of claim 4, wherein signing the metadata collection item comprises:
generating a hash value of the metadata collection item by using the password hash algorithm;
and generating a second signature value of the metadata collection item according to the signature private key and the hash value of the metadata collection item by using the elliptic curve public key cryptographic algorithm.
8. The method of claim 7, wherein signing the metadata collection item comprises:
And comparing the first signature value with the second signature value, if the first signature value is equal to the second signature value, checking the signature to pass, and if the first signature value is not equal to the second signature value, checking the signature to not pass.
9. A method according to claim 3, wherein rendering the metadata stream tree diagram using the hash tree mechanism comprises:
And drawing and generating the metadata circulation tree diagram by using the hash tree mechanism and taking the metadata of the metadata collection item as a first dimension, the circulation time as a second dimension and the source address and the target address as a third dimension.
10. A blockchain technology-based data flow mapping device, comprising:
The construction module is used for constructing a metadata collection item comprising metadata, a circulation node and signature information and signing the metadata collection item;
a recording module for recording the metadata collection items in a plurality of blocks in a blockchain using a blockchain-based workload certification algorithm;
and the drawing module is used for checking the metadata collection items, and drawing a metadata flow tree diagram for the metadata collection items passing through the checking by utilizing a hash tree mechanism.
11. A computer readable storage medium, characterized in that a computer program is stored in the computer readable storage medium, wherein the computer program, when being executed by a processor, implements the steps of the method according to any of the claims 1 to 9.
12. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method as claimed in any one of claims 1 to 9 when the computer program is executed.
CN202311684198.5A 2023-12-08 2023-12-08 Data flow mapping method and device based on block chain technology Pending CN117914462A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311684198.5A CN117914462A (en) 2023-12-08 2023-12-08 Data flow mapping method and device based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311684198.5A CN117914462A (en) 2023-12-08 2023-12-08 Data flow mapping method and device based on block chain technology

Publications (1)

Publication Number Publication Date
CN117914462A true CN117914462A (en) 2024-04-19

Family

ID=90696570

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311684198.5A Pending CN117914462A (en) 2023-12-08 2023-12-08 Data flow mapping method and device based on block chain technology

Country Status (1)

Country Link
CN (1) CN117914462A (en)

Similar Documents

Publication Publication Date Title
US10110576B2 (en) Distributed key secret for rewritable blockchain
US10747721B2 (en) File management/search system and file management/search method based on block chain
EP3693886B1 (en) Optimizations for verification of interactions system and method
Reyzin et al. Improving authenticated dynamic dictionaries, with applications to cryptocurrencies
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
US8955143B1 (en) Use of decoy data in a data store
CN109597822B (en) User data storage and query method and user data processing device
US20230316273A1 (en) Data processing method and apparatus, computer device, and storage medium
CN111881481B (en) Medical data processing method, device, equipment and storage medium based on blockchain
EP3709568A1 (en) Deleting user data from a blockchain
US20210160069A1 (en) Blockchain system, registration terminal, approval terminal, smart contract registration method, and smart contract registration program
CN111523890A (en) Data processing method and device based on block chain, storage medium and equipment
CN111984726A (en) Storage and distributed database of measurement data sets
CN111033506A (en) Edit script verification with match and difference operations
US20190342103A1 (en) Method and Apparatus for Verification of Social Media Information
Li et al. An efficient blind filter: Location privacy protection and the access control in FinTech
CN109242666A (en) Personal reference method, apparatus and computer equipment are obtained based on block chain
CN115208628B (en) Data integrity verification method based on block chain
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN115840787A (en) Supply chain data sharing method, device, equipment and medium based on block chain
CN112000979B (en) Database operation method, system and storage medium for private data
Garcia Bringas et al. BlockChain platforms in financial services: current perspective
Weintraub et al. Data integrity verification in column-oriented NoSQL databases
CN113793158A (en) Textile inspection detection information query method and system
CN112364022A (en) Information derivation management method and device, computer equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination