WO2023231782A1 - Data integrity verification system - Google Patents

Data integrity verification system Download PDF

Info

Publication number
WO2023231782A1
WO2023231782A1 PCT/CN2023/094845 CN2023094845W WO2023231782A1 WO 2023231782 A1 WO2023231782 A1 WO 2023231782A1 CN 2023094845 W CN2023094845 W CN 2023094845W WO 2023231782 A1 WO2023231782 A1 WO 2023231782A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
information
divs
integrity verification
sending end
Prior art date
Application number
PCT/CN2023/094845
Other languages
French (fr)
Chinese (zh)
Inventor
薛淼
王光全
任梦璇
任杰
马少武
Original Assignee
中国联合网络通信集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国联合网络通信集团有限公司 filed Critical 中国联合网络通信集团有限公司
Publication of WO2023231782A1 publication Critical patent/WO2023231782A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity

Definitions

  • the present application relates to the field of communication technology, and in particular, to a data integrity verification system.
  • the data sending end collects data
  • it often needs to send the data to a specific terminal and the specific terminal forwards or flows the data to the data receiving end.
  • the data receiving end cannot verify the data integrity of the received data after receiving the data.
  • the data receiving end cannot determine whether the received data is the original data sent by the data sending end, and whether the specific terminal has tampered with the data during the forwarding process. Therefore, how the data receiving end verifies the data integrity of the received data has become an urgent problem to be solved.
  • This application provides a data integrity verification system that verifies the data integrity after the data receiving end receives the data.
  • the present disclosure provides a data integrity verification system, which includes: a data sending end, a data integrity verification server DIVS AS, and a data receiving end.
  • the data sending end is configured to: send target data to the data receiving end; the target data includes: data to be verified, a first digital signature and a first identification; wherein the first digital signature is data to be verified based on the first private key
  • the digital signature for signature confirmation; the first identifier is the storage identifier of the data integrity verification information of the data sender in the DIVS AS; the first private key is the private key in the first key pair generated by the data sender.
  • the data receiving end is configured to receive the target data and send the first identifier to the DIVS AS.
  • DIVS AS is configured to: receive the first identification and query the data integrity verification information associated with the first identification; the data integrity verification information includes the first public key; the first public key is the first key generated by the data sending end The public key of the pair.
  • the data receiving end is configured to: receive data integrity verification information, verify the first digital signature according to the first public key in the data integrity verification information, and determine the data integrity of the data to be verified based on the verification result of the first digital signature. sex.
  • the data sending end uses the first private key to digitally sign the data, and then sends the digital signature and the data to be verified to the data receiving end.
  • the data receiving end obtains the data integrity verification information of the data sending end from the DIVS AS, and uses the first public key in the data integrity verification information to verify the first digital signature. If the verification is successful, it means that according to the A digital signature is a signature based on a first private key, and the first private key is an internal key of the data sending end and cannot be stolen by the outside.
  • the verification of the first digital signature is successful, it means that the first digital signature is the digital signature obtained by the data sending end after signing the data to be verified, and therefore the data to be verified is the original data sent by the data sending end. Based on this, the data receiving end can determine whether the received data is the original data sent by the data sending end according to this method, thereby effectively verifying the data integrity of the data to be verified.
  • the data sending end is also configured to: send the first data to the DIVS AS;
  • the first data includes: a first public key, a set of signature algorithms supported by the data sending end and the first terminal information of the data sending end;
  • the DIVS AS is also configured to: obtain the contract information of the data sending end according to the first terminal information;
  • the contract information includes: the contract validity information of the data sending end; according to the first data and the contract information, determine Data integrity verification information; store data integrity verification information in the blockchain.
  • the data sending end can store the data integrity verification information in the blockchain by interacting with DIVS AS.
  • the data receiving end can obtain the data integrity verification information from the blockchain to prevent the data integrity verification information from being tampered with.
  • the system also includes: capability opening platform NEF and user data management network element UDM; DIVS AS, specifically configured to: send a contract information acquisition request to capability opening platform NEF;
  • the contract information acquisition request includes the first terminal information;
  • NEF is configured to: request the UDM to obtain the contract information of the data sender, and after obtaining the contract information of the data sender, return the contract information of the data sender to DIVS AS;
  • DIVS AS also Configured to: receive subscription information from NEF; the subscription information is the subscription information of the data sending end obtained from the user data management network element UDM based on the first terminal information returned by NEF.
  • DIVS AS obtains the contract information of the data sender from the operator network, and compares the terminal information of the data sender with the terminal information in the contract information to see if they are consistent.
  • the data integrity verification information is stored in the blockchain. It is guaranteed that the data stored in the blockchain by DIVS AS is the data integrity verification information of the data sender.
  • the data sending end is specifically configured to: generate a first key pair; the first key pair includes a first public key and a first private key; use a first Private key and first signature The algorithm signs the first public key and the first terminal information to determine the second digital signature; generates the first data according to the first public key, the first terminal information, the signature algorithm set supported by the data sending end, and the second digital signature.
  • the data sending end Based on this, the data sending end generates the first public key and the first private key, the data sending end saves the first private key, and sends the first public key to DIVS AS. In this way, the data to be verified can be encrypted using the first private key and decrypted using the first public key.
  • the data sending end uses the first private key and the first signature algorithm to sign the metadata and generate a second digital signature, which allows DIVS AS to verify the second digital signature based on the first public key and the first signature algorithm to ensure receipt to the accuracy of the first data.
  • DIVS AS is specifically configured to: verify the second digital signature based on the first public key and the first signature algorithm; when the second digital signature verification passes , obtain the first terminal information in the first data; and generate a contract information acquisition request according to the first terminal information.
  • DIVS AS can verify the second digital signature to determine whether the first data is the original data sent by the data sender to DIVS AS, ensuring the accuracy of the received first data.
  • the DIVS AS is specifically configured to: generate a first data set to be signed based on the first data and contract data; and generate a first data set to be signed based on the second private key and the second signature algorithm. Sign the first data set to be signed to determine the third digital signature; the second private key belongs to the second key pair generated by DIVS AS; according to the first data set to be signed, the certificate corresponding to the second private key, and the third digital signature , determine the data integrity verification information.
  • DIVS AS signs the data integrity verification information again, so that after the data receiving end receives the data integrity verification information, it can verify the signature based on the signature information of the blockchain to ensure that the data integrity verification information comes from DIVS AS Information.
  • the DIVS AS is further configured to: send the first transaction identifier to the data sending end; wherein the first transaction identifier is used to characterize the Data integrity verification information is stored in the blockchain.
  • DIVS AS can enable the data sending end to generate a first identification based on the transaction identification by sending a transaction identification to the data sending end, so that the data receiving end can obtain data integrity verification information from DIVS AS based on the first identification.
  • the DIVS AS is further configured to: send the first address information to the data sending end; wherein the first address information is to store the first address information.
  • the DIVS AS can send the DIVS AS entry address to the data sending end.
  • the data sending end adds the DIVS AS entry address to the target data, so that the data receiving end determines the DIVS that can store the data integrity verification information based on the DIVS AS entry address. AS.
  • UDM is also configured to: when the subscription information of the data sending end is updated, send a signing information update message to NEF; the signing information update message includes: The second terminal information, as well as the updated contract information of the data sending end; NEF is also configured to: forward the contract information update message to DIVS AS; DIVS AS is also configured to: query the blockchain including the second terminal information The latest target data integrity verification information; update the latest target data integrity verification information based on the updated contract information; store the updated latest target data integrity verification information in the blockchain.
  • UDM can promptly notify DIVS AS to update the contract information.
  • DIVS AS can update the data integrity verification information based on the updated contract information to ensure the real-time nature of the data integrity verification information.
  • the DIVS AS is specifically configured to: perform a first operation on each target data integrity verification information, and determine the updated each target data integrity verification information. ;
  • the first operation includes: generating a second data set to be verified based on the first data and the updated contract information; signing the second data set to be signed based on the second private key and the second signature algorithm to determine a fourth digital signature; Based on the second data set to be signed, the certificate corresponding to the second private key, and the fourth digital signature, the updated target data integrity verification information is determined.
  • DIVS AS stores the contract information updated by the data sender in the blockchain, which allows the data receiver to verify the data integrity of the data to be verified based on the updated contract information.
  • DIVS AS is also configured as:
  • DIVS AS can enable the data sending end to generate a first identification based on the updated transaction identification by sending the updated transaction identification to the data sending end, thereby enabling the data receiving end to obtain the updated data integrity verification information based on the first identification.
  • the DIVS AS is further configured to: send the second address information to the data sending end; wherein the second address information is to store the update Based on the address information of the DIVS AS of the target data integrity verification information, the DIVS AS sends the updated DIVS AS entry address to the data sending end.
  • the data sending end can add the updated DIVS AS entry in the target data. address; thus allowing the data receiving end to obtain updated data integrity verification information from DIVS AS based on the updated DIVS AS entry address.
  • the data sending end is further configured to: receive the latest transaction identifier among the first transaction identifier and the second transaction identifier from the DIVS AS; the first transaction identifier
  • the second transaction identification is a transaction identification generated based on the storage information of the data integrity verification information in the blockchain; the second transaction identification is a transaction identification generated based on the storage information of the updated data integrity verification information in the blockchain; At least one of a transaction identifier and a second transaction identifier is used to generate a first identifier.
  • the data sending end can generate the first identification based on the first transaction identification and the second transaction identification.
  • the target data also includes a verification access address; the verification access address is used to represent the address of the DIVS AS that stores the data integrity verification information of the data sending end; the data sending end is also Configured to: receive at least one of the first address information and the second address information from the DIVS AS; the first address information is the address information of the DIVS AS that stores the data integrity verification information corresponding to the first transaction identifier; the second address The information is the address information of the DIVS AS that stores the updated data integrity verification information corresponding to the second transaction identifier; the verification access address is generated based on at least one of the first address information and the second address information.
  • the data sending end can generate a verification access address based on the first address information and the second address information.
  • the target data also includes the timestamp of the first digital signature;
  • the data integrity verification information also includes: the contract validity period of the data sending end;
  • the data receiving end is also configured to: Determine whether the timestamp of the first digital signature is within the contract validity period of the data sending end; if so, determine whether the data integrity verification of the data to be verified is successful.
  • the data receiving end can specifically determine whether the terminal collects data during the contracting validity period based on whether the timestamp of the first digital signature is within the contracting validity period, and determine that the integrity verification of the data collected by the data sending end during the contracting validity period is successful. The integrity verification of data collected outside the contract validity period failed.
  • the data receiving end is further configured to: verify the third digital signature according to the certificate corresponding to the second private key and the second signature algorithm; when the third digital signature verification is successful, In this case, obtain the first public key in the first data set to be signed.
  • the data sending end can determine whether the obtained data is the data sent by DIVS AS to the data sending end by verifying the third digital signature.
  • the device information includes: at least one of the embedded universal integrated circuit card identification eUICC ID and the international mobile equipment identification code IMEI; the account opening platform is specifically configured to: obtain The eSIM profile and applet of the data sender determine the integrated circuit card identification code ICCID of the eSIM; bind at least one of the eUICC ID, IMEI and ICCID; determine the contract validity information of the data sender according to the contract validity period of the data sender; according to the second Terminal information and contract validity information determine the contract information of the data sending end.
  • the account opening platform is specifically configured to: obtain The eSIM profile and applet of the data sender determine the integrated circuit card identification code ICCID of the eSIM; bind at least one of the eUICC ID, IMEI and ICCID; determine the contract validity information of the data sender according to the contract validity period of the data sender; according to the second Terminal information and contract validity information determine the contract information of the data sending end.
  • the account opening platform can determine the data transmission based on the device information and contract information of the data sending end. Second terminal information and contract information of the terminal.
  • the first terminal information includes at least one of eUICC ID/ICCID, IMEI and MSISDN of the data sending end;
  • the second terminal information includes at least one of eUICC ID/ICCID, IMEI and MSISDNICCID. At least one.
  • the account opening platform binds eUICC ID, IMEI and ICCID as the terminal information of the data sender, ensuring the uniqueness and consistency of the terminal information of the data sender.
  • Figure 1 is a system architecture diagram of a 5G capability open architecture provided by this application.
  • Figure 2 is a schematic structural diagram of a blockchain provided by this application.
  • Figure 3 is a system architecture diagram of a data integrity verification system provided by this application.
  • FIG. 4 is a system architecture diagram of another data integrity verification system provided by this application.
  • Figure 5 is a system architecture diagram of a data integrity verification system provided by this application in a vertical industry scenario
  • Figure 6 is a schematic flow chart of a data sending end signing a contract in an operator network provided by the present disclosure
  • Figure 7 is a schematic flow chart of data integrity verification information uploading provided by the present disclosure.
  • Figure 8 is a schematic flow chart of updating data integrity verification information provided by the present disclosure.
  • Figure 9 is a schematic flow chart of data integrity verification provided by the present disclosure.
  • Figure 10 is a schematic structural diagram of an electronic device provided by the present disclosure.
  • a and/or B can mean: A exists alone, A and B exist simultaneously, and they exist alone. B these three situations.
  • first and second in the description of this application and the drawings are used to distinguish different objects, or to distinguish different processes on the same object, rather than to describe a specific order of objects.
  • references to the terms “including” and “having” and any variations thereof in the description of this application are intended to cover non-exclusive inclusion.
  • a process, method, system, product or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes other unlisted steps or units, or optionally also Includes other steps or units that are inherent to such processes, methods, products, or devices.
  • Machine type terminals are usually used to collect generated data and are widely used in vertical industries.
  • the application of machine-type terminals has effectively promoted the digital transformation of vertical industries such as agriculture, logistics, transportation, medical care, environment, supply chain finance, and smart cities.
  • Data consumer terminals can obtain valuable data in the industry by analyzing data. For example, in the agricultural industry, data consumption terminals can determine environmental data (such as temperature and wind speed) for agricultural insurance based on data collected by machine-type terminals. In the second-hand car industry, data consumption terminals can determine driving behavior data for second-hand transaction vehicles based on data collected by machine-type terminals. In the transportation industry, data consumption terminals can determine traffic data for AI algorithm training based on data collected by machine-type terminals.
  • the current machine type terminal After the current machine type terminal collects data, it directly reports the collected data to the service provider terminal without directly providing the data to the data consumption terminal.
  • Data consumption terminals can only obtain collected data from service provider terminals, but cannot directly obtain data from machine-type terminals. However, after the data consumption terminal receives the collected data, it cannot determine whether the data provided by the service provider terminal has been tampered with, and it is difficult to verify whether the received collected data is the original data collected by the machine type terminal.
  • the machine type terminal may be a data sending end and is used to perform functions related to the data sending end.
  • the data consumption terminal is the data receiving end and is used to perform functions related to the data receiving end.
  • data integrity is mainly used by the data receiving end (such as the data consumption terminal described above) to verify whether the received data is sent by the data sending end (such as the machine type terminal described above).
  • the original data sent Prevent data from being tampered with during intermediate forwarding. Based on the above description in the machine type terminal, it can be known that the current data consumption terminal has a need to verify the data integrity of the data provided by the service provider terminal.
  • the data integrity verification method using symmetric key + one-way Hash function can only verify the data integrity during the point-to-point transmission process, but cannot verify whether the data is the original data provided by the source. This may cause the service provider terminal to tamper with the data before sending it to the data consuming terminal, and the data consuming terminal cannot verify whether the data has been tampered with.
  • data integrity is verified by using private key signature + public key signature verification (for example, ITU-T X.509, IETF RFC 4880).
  • private key signature + public key signature verification for example, ITU-T X.509, IETF RFC 4880.
  • the service provider terminal forwards the collected data to the data consumption terminal.
  • the data consumption terminal can only use the received data as original data for subsequent processing, or it can constrain the service provider to provide original data through declarations and contracts.
  • these methods cannot avoid the fact that the service provider terminal provides original data, making it difficult to ensure data integrity.
  • Embedded subscriber identity module eSIM
  • TEE trusted execution environment
  • eSIM and TEE can store confidential data and perform trusted operations in machine-type terminals. For example, generate a public-private key pair in the eSIM of the machine-type terminal, or send public key endorsement information to eSIM through OTA.
  • the machine type terminal when the machine type terminal needs to send data, the machine type terminal can call a predetermined interface through the OS to sign the collected data using the private key stored in the TEE or eSIM, and then send the signed data to the business Provider terminal.
  • FIG. 1 it is a system architecture diagram of the 5G capability opening architecture provided by the embodiment of this application.
  • the 5G capability open architecture shown in Figure 1 includes: application server (AS), network element function (NEF), unified data management function (UDM), policy control function ( Policy Control Function (PCF), access and mobility management function (AMF), session management function (SMF), network repository function (NRF), Network Entity.
  • AS application server
  • NEF network element function
  • UDM unified data management function
  • PCF Policy Control Function
  • AMF access and mobility management function
  • SMSF session management function
  • NRF network repository function
  • Network Entity Network Entity
  • AS is the operator's application server or a third-party application server, which is used to provide the operator's Network service capabilities or service capabilities of third-party applications.
  • AS accesses the NEF API interface of the operator's 5G network through Nnef, and communicates with NEF through the API interface.
  • NEF is the operator's ability opening network element, which is used to open the operator's network capabilities to third-party services, open the data in the core network (such as location information) to AS, or open the AS's business requirements (such as QoS policy) Transmitted to network elements in the 5G core network.
  • NEF is connected to UDM through the Nudm interface, to PCF through the Npcf interface, to AMF through Namf, to SMF through Nsmf, to NRF through Nnrf, and to Network Entity through the 3GPP interface.
  • the operator's AS function can be used to provide long-term data integrity verification services for the data collected by the machine type terminal.
  • Blockchain is a data storage technology that is jointly maintained by multiple parties, stores data in a block chain structure, and uses cryptography to ensure transmission and access security. Through blockchain technology, data can be stored consistently, cannot be tampered with, and cannot be repudiated.
  • the blockchain usually includes multiple blockchain nodes, which store the ledgers in the blockchain respectively, and use P2P technology to synchronize the ledgers to ensure the consistency of the ledgers stored in each node.
  • multiple nodes use a consensus mechanism to confirm the records written to the ledger. In this way, it can be guaranteed that the data written to the ledger is written with the joint confirmation of multiple nodes. Data that has not been jointly confirmed by multiple nodes will not be written, ensuring that the data written in the blockchain ledger cannot be written. Tampered and data is traceable.
  • Blockchain is divided into three types of blockchain based on the types of users allowed to access: public chain, alliance chain and private chain.
  • public chain allows any terminal to access and use the ledger for accounting.
  • consortium chain only allows specific individual terminals or specific enterprise terminals to access and use the ledger for accounting.
  • Private chains only allow internal nodes within the enterprise to maintain and use the blockchain.
  • the blockchain includes multiple blockchain nodes Peer, and each blockchain node is connected to each other. Smart contracts are set up in the blockchain nodes (only blockchain node 3 is shown in the figure as an example, other nodes are similar to blockchain node 3).
  • Each blockchain node includes a blockchain ledger (Ledger), which is used to store data, for example, in the form of hash.
  • Ledger blockchain ledger
  • data integrity verification information can be stored through blockchain technology.
  • public key information MSISDN, ICCID, device sequence information, hash algorithm, timestamp and other information and provide a data integrity verification server for terminals through the open capabilities of the 5G network. This ensures that vertical industries Verification of data integrity during the entire data life cycle when collecting data through machine-type terminals reduces the trust cost generated during data transfer and re-application, and promotes digital transformation and data application in vertical industries.
  • machine-type terminals send collected data to service provider terminals, which forward the data to data consumption terminals.
  • the data consumption terminal it is difficult for the data consumption terminal to verify whether the service provider terminal has tampered with the data collected by the machine type terminal. As a result, the data consuming terminal cannot determine the data integrity of the received data.
  • the data integrity verification server DIVS AS stores the data integrity verification information of the data sending end, and receives the data to be verified at the data receiving end. After the first digital signature of the data to be verified, obtain the data integrity verification information of the data sending end from the DIVS AS, verify the first digital signature based on the data integrity verification information, and if the first digital signature is valid, it means that the data It is the original data collected by the data collection terminal, which indicates that the data integrity verification of the data is successful.
  • Figure 3 is a system architecture diagram of the data integrity verification system provided by the embodiment of this application; as shown in Figure 3, the data integrity verification system includes: data sending end 301, data integrity verification service application server , DIVS AS) 302, and the data receiving end 303.
  • the data sending end 301 is configured to: send target data to the data receiving end 303; the target data includes: data to be verified, a first digital signature and a first identification; where the first digital signature is treated according to the first private key
  • the digital signature used to verify the signature of the data includes: data to be verified, a first digital signature and a first identification; where the first digital signature is treated according to the first private key
  • the digital signature used to verify the signature of the data is the storage identifier of the data integrity verification information of the data sending end 301 in the DIVS AS 302; the first private key is the private key in the first key pair generated by the data sending end 301. key.
  • the data receiving end 303 is configured to receive the target data and send the first identifier to the DIVS AS 302.
  • DIVS AS302 is configured to: receive the first identification and query the data integrity verification information associated with the first identification; the data integrity verification information includes the first public key; the first public key is the first password generated by the data sending end 301 The public key in the key pair.
  • the data receiving end 303 is configured to: receive data integrity verification information, verify the first digital signature according to the first public key in the data integrity verification information, and determine the data of the data to be verified based on the verification result of the first digital signature. Integrity.
  • the above-mentioned data sending terminal 301 may be the machine type terminal described above.
  • Data receiving end 303 It can be the data consumption terminal described above.
  • the data sending end 301 uses the first private key to digitally sign the data, and then uniformly sends the digital signature and the data to be verified to the data receiving end. 303.
  • the data receiving end 303 obtains the data integrity verification information of the data sending end 301 from the DIVS AS 302, and uses the first public key in the data integrity verification information to verify the first digital signature. If the verification is successful, then It means that the first digital signature is a signature based on the first private key, and the first private key is an internal key of the data sending end 301 and will not be stolen by the outside.
  • the first digital signature is verified successfully, it means that the first digital signature is the digital signature obtained by signing the data to be verified by the data sending end 301, and therefore the data to be verified is the original data sent by the data sending end 301.
  • the data receiving end 303 can determine whether the received data is the original data sent by the data sending end 301 according to this method, thereby effectively verifying the data integrity of the data to be verified.
  • the data integrity verification system provided by the embodiment of the present application also includes: a capability opening platform NEF304 and a user data management network element UDM305.
  • the data sending end 301 is also configured to: send the first data to DIVS AS302; the first data includes: the first public key, the signature algorithm set supported by the data sending end and the first terminal information of the data sending end 301; DIVS AS302 is also configured to: obtain the contract information of the data sending end 301 according to the first terminal information; the contract information includes: the contract validity information of the data sending end 301; and determine the data integrity verification information according to the first data and the contract information; Store data integrity verification information in the blockchain.
  • the data sending end 301 can store the data integrity verification information in the blockchain by interacting with DIVS AS302. In this way, when the data receiving end 303 requests data integrity verification information, the data receiving end 303 can obtain the data integrity verification information from the blockchain to prevent the data integrity verification information from being tampered with.
  • the system also includes: capability open platform NEF and user data management network element UDM; DIVS AS302, specifically configured to: send a contract information acquisition request to the capability open platform NEF; the contract information acquisition request includes The first terminal information; NEF, is configured to: request the UDM to obtain the contract information of the data sending terminal 301, and return the contract information of the data sending terminal 301 to DIVS AS302 after obtaining the contract information of the data sending terminal 301; DIVS AS302, also Configured to: receive subscription information from NEF; the subscription information is the subscription information of the data sending end 301 obtained from the user data management network element UDM based on the first terminal information returned by NEF.
  • DIVS AS302 obtains the contract information of the data sender 301 from the operator network, and compares the terminal information of the data sender 301 with the terminal information in the contract information. Consistent, store data integrity verification information in the blockchain under consistent conditions middle. It is guaranteed that the data stored in the blockchain by DIVS AS302 is the data integrity verification information of the data sending end 301.
  • the data sending end 301 is specifically configured to: generate a first key pair; the first key pair includes a first public key and a first private key; use the first private key and the first private key.
  • the signature algorithm signs the first public key and the first terminal information to determine the second digital signature; generates the first data according to the first public key, the first terminal information, the signature algorithm set supported by the data sending end, and the second digital signature.
  • the data sending end 301 Based on this, the data sending end 301 generates the first public key and the first private key, the data sending end 301 saves the first private key, and sends the first public key to DIVS AS302. In this way, the data to be verified can be encrypted using the first private key and decrypted using the first public key.
  • the data sending end 301 uses the first private key and the first signature algorithm to sign the metadata and generate a second digital signature, which allows the DIVS AS302 to verify the second digital signature based on the first public key and the first signature algorithm to ensure Accuracy of the first data received.
  • DIVS AS302 is specifically configured to: verify the second digital signature based on the first public key and the first signature algorithm; when the second digital signature passes verification, obtain the first data the first terminal information; generating a subscription information acquisition request according to the first terminal information.
  • DIVS AS302 can determine whether the first data is the original data sent by the data sending end 301 to DIVS AS302 by verifying the second digital signature, ensuring the accuracy of the received first data.
  • DIVS AS302 is specifically configured to: generate a first data set to be signed based on the first data and contract data; sign the first data set to be signed based on the second private key and the second signature algorithm , determine the third digital signature; the second private key belongs to the second key pair generated by DIVS AS302; determine the data integrity verification based on the first data set to be signed, the certificate corresponding to the second private key, and the third digital signature information.
  • DIVS AS302 signs the data integrity verification information again, so that after the data receiving end 303 receives the data integrity verification information, it can verify the signature based on the signature information of the blockchain to ensure that the data integrity verification information comes from DIVS AS302 information.
  • DIVS AS302 is also configured to: send the first transaction identifier to the data sending end 301; wherein the first transaction identifier is used to characterize the data integrity verification information Store information in the blockchain.
  • DIVS AS302 can enable the data sending end 301 to generate a first identification based on the transaction identification by sending a transaction identification to the data sending end 301, so that the data receiving end 303 can obtain data integrity verification information from DIVS AS302 based on the first identification. .
  • DIVS AS302 is also configured to:
  • the first address information is a storage
  • the address information of the DIVS AS302 that stores the data integrity verification information corresponding to the first transaction identifier.
  • DIVS AS302 can send the DIVS AS302 entry address to the data sending end 301.
  • the data sending end 301 adds the DIVS AS302 entry address to the target data, so that the data receiving end 303 determines that it can store the data integrity verification based on the DIVS AS302 entry address.
  • UDM is also configured to: when the subscription information of the data sending end 301 is updated, send a subscription information update message to NEF; the subscription information update message includes: the second data of the data sending end 301 Terminal information, as well as the updated contract information of the data sending end 301; NEF is also configured to: forward the contract information update message to DIVS AS302; DIVS AS302 is also configured to: query the latest update of the second terminal information in the blockchain target data integrity verification information; update the latest target data integrity verification information based on the updated contract information; store the updated latest target data integrity verification information in the blockchain.
  • UDM can promptly notify DIVS AS302 to update the contract information.
  • DIVS AS302 can update the data integrity verification information based on the updated contract information to ensure the real-time nature of the data integrity verification information.
  • DIVS AS302 is specifically configured to: perform a first operation on each target data integrity verification information, and determine the updated each target data integrity verification information; the first operation includes: Generate a second data set to be verified based on the first data and the updated contract information; sign the second data set to be signed based on the second private key and the second signature algorithm to determine a fourth digital signature; based on the second data to be signed set, the certificate corresponding to the second private key, and the fourth digital signature to determine the updated target data integrity verification information.
  • DIVS AS302 stores the contract information updated by the data sending end 301 in the blockchain, which allows the data receiving end 303 to verify the data integrity of the data to be verified based on the updated contract information.
  • DIVS AS302 is also configured to: send the second transaction identifier to the data sending end 301; wherein the second transaction identifier is used to characterize the updated target data Based on the storage information of the integrity verification information in the blockchain, DIVS AS302 can enable the data sending end 301 to generate a first identification based on the updated transaction identification by sending the updated transaction identification to the data sending end 301, thereby enabling The data receiving end 303 obtains the updated data integrity verification information according to the first identification.
  • the DIVS AS 302 is further configured to: send the second address information to the data sending end 301; wherein the second address information is to store the updated target data integrity verification Information DIVS AS302 address information.
  • DIVS AS can send the transaction ID and URL to the data sending end respectively after generating the transaction ID and URL.
  • DIVS AS can also be merged based on the transaction ID and URL, and the transaction ID and URL are sent to the data sending end through the same message. There are no restrictions on this. In the case where the transaction ID and URL are sent to the data sender in the same message, if DIVS AS updates the transaction ID (for example, DIVS AS will update the transaction ID accordingly after updating the on-chain data corresponding to the transaction ID) but it is not updated. URL, DIVS can update only the transaction identifier in the information, or update the transaction identifier and URL at the same time. This disclosure does not limit this either.
  • DIVS AS302 sends the updated DIVS AS302 entry address to the data sending end 301.
  • the data sending end 301 can add the updated DIVS AS302 entry address in the target data; thus the data receiving end 303 can according to the updated DIVS
  • the AS302 entry address obtains updated data integrity verification information from DIVS AS302.
  • the data sending end 301 is also configured to: receive at least one of the first transaction identification and the second transaction identification from the DIVS AS 302; the first transaction identification is based on data integrity verification information.
  • a transaction identifier generated from the information stored in the blockchain; the second transaction identifier is a transaction identifier generated based on the updated data integrity verification information stored in the blockchain; based on the first transaction identifier and the second transaction identifier The latest transaction identifier in , generates the first identifier.
  • the data sending end 301 can generate the first identification based on the first transaction identification and the second transaction identification.
  • the target data also includes a verification access address; the verification access address is used to represent the address of the DIVS AS302 that stores the data integrity verification information of the data sending end 301; the data sending end 301 is also configured as: Receive at least one of the first address information and the second address information from DIVS AS302; the first address information is the address information of DIVS AS302 that stores the data integrity verification information corresponding to the first transaction identifier; the second address information is the storage The address information of DIVS AS302 of the updated data integrity verification information corresponding to the second transaction identifier; generate a verification access address based on at least one of the first address information and the second address information.
  • the data sending end 301 can generate a verification access address based on the first address information and the second address information.
  • the target data also includes the timestamp of the first digital signature;
  • the data integrity verification information also includes: the contract validity period of the data sending end 301;
  • the data receiving end 303 is also configured to: determine the first Whether the timestamp of the digital signature is within the contract validity period of the data sending end 301; if so, it is determined that the data integrity verification of the data to be verified is successful.
  • the data receiving end 303 can specifically determine whether the terminal collects data during the contracting validity period based on whether the timestamp of the first digital signature is within the contracting validity period, and determine the integrity verification of the data collected by the data sending end 301 within the contracting validity period. Success, the integrity verification of data collected outside the contract validity period failed.
  • the data receiving end 303 is also configured to: correspond to The certificate and the second signature algorithm are used to verify the third digital signature; when the verification of the third digital signature is successful, the first public key in the first data set to be signed is obtained.
  • the data sending end 301 can determine whether the acquired data is the data sent by the DIVS AS302 to the data sending end 301 by verifying the third digital signature.
  • the first terminal information includes the embedded universal integrated circuit card identity (eUICC ID)/integrated circuit card identification code (Integrate circuit card identity, ICCID) of the data sending end 301 ), at least one of International Mobile Equipment Identity (International Mobile Equipment Identity, IMEI) and mobile subscriber number (Mobile Station international ISDN number, MSISDN); the second terminal information includes at least one of eUICC ID/ICCID, IMEI and MSISDN .
  • eUICC ID embedded universal integrated circuit card identity
  • ICCID integrated circuit card identity
  • ICCID integrated circuit card identity
  • MSISDN Mobile Station international ISDN number
  • the account opening platform binds eUICC ID/ICCID, IMEI and MSISDN as the terminal information of the data sending end 301, ensuring the uniqueness and consistency of the terminal information of the data sending end 301.
  • the data integrity verification system includes a machine type terminal 501, a data integrity verification server 502, a data consumption terminal 503, a capability opening function network element 504, a user data storage network element 505, and other data integrity verification services.
  • APP is installed in the machine type terminal 501 for realizing different application functions.
  • Machine type terminals have built-in operating systems OS.
  • the eSIM is installed in the machine type terminal, which allows the machine type terminal to transmit data through the operator network (such as 5G network).
  • An applet can also be installed in the machine type terminal eSIM, and the applet is used to generate a key pair (such as the above-mentioned first public key and first private key).
  • the first private key is always stored in the applet to avoid leakage of the first private key.
  • the first public key can be sent to other terminals, so that other terminals can decrypt data encrypted by the first private key based on the first public key.
  • a 5G communication module can also be integrated into the machine type terminal, so that the machine type terminal has 5G communication capabilities.
  • the data integrity verification server 502 is used to store data integrity verification information of the data sending end and provide data integrity verification information to the data receiving end.
  • the data integrity verification server may be a third-party entity deployed in the operator's network.
  • the data integrity verification server 502 may specifically include a signaling processing module 5021, an access control module 5022, a data management module 5023, and a blockchain ledger 5024.
  • the data consumption terminal 503 is a third-party terminal used to collect, use, and transfer data collected by machine-type terminals.
  • it can be a personal terminal or a terminal in an enterprise.
  • the capability opening function network element 504 may be, for example, a capability opening function network element in the 5G core network, such as NEF, which is used to implement communication between third-party applications (such as data integrity verification servers) and the operator's core network.
  • NEF a capability opening function network element in the 5G core network
  • the user data storage network element 505 is used to store data of user terminals.
  • the user data storage network element 505 is used to store subscription information of machine type terminals.
  • Other data integrity verification service network elements 506 are data integrity verification servers deployed in different core networks of the same operator, or data integrity verification servers of other operators; the blockchain ledger function of the data integrity verification server constitutes a block chain network.
  • the data integrity verification process may specifically include the following processes:
  • Process 1 the process of the data sending end signing a contract in the operator's network; Process 2, the process of uploading the data integrity verification information to the chain; Process 3, the process of updating the data integrity verification information; Process 4, the process of data integrity verification.
  • Process 1 The data sending end signs a contract in the operator's network.
  • the process for the data sending end to sign a contract in the operator network includes the following S601-S604.
  • the data sending end user sends equipment contract information to the account opening platform.
  • the device contract information includes at least one of the following: Common Name, location (country, region), affiliation organization name, and email address.
  • the account opening platform opens an account for the data sending end.
  • the data sender opens an account in the account opening platform, and registers the data sender's eUICC ID, IMEI, device serial number SN, device ownership entity name, deployment location, contact email and other information.
  • the account opening platform triggers the eSIM management platform to generate eSIM profile and security applet.
  • the ICCID is assigned to the data sender.
  • the account opening platform binds ICCID to IMEI and eUICC ID.
  • the information required in the above process includes at least one of the following: Common Name, location (country, region), affiliation organization name, and email address.
  • the data sending end accesses the operator's network, obtains and installs the eSIM profile and security applet.
  • the data sending end after the data sending end is connected to the operator's network, it requests the eSIM management platform to download the eSIM profile and security applet. After the download is completed, the data sender installs the eSIM in the eUICC profile and security applets.
  • the data sending end can use network services through eSIM, generate a key pair through an applet, and encrypt the data that needs to be encrypted.
  • the account opening platform sends contract information to UDM.
  • UDM receives and stores the contract information of the data sender.
  • the contract information in the machine type can be sent to DIVS AS, so that DIVS AS verifies the data sender based on the contract information.
  • the process of the data sending end signing a contract in the operator network is described. Based on this process, by binding ICCID with IMEI and eUICC ID, the data sending end can be uniquely identified through the above information. After this, DIVS AS and the data receiving end can verify the data sending end based on the above information.
  • Process 2 The process of uploading data integrity verification information to the chain.
  • the process of uploading data integrity verification information to the blockchain can be implemented through the following S701-S711.
  • the data sending end generates a first key pair.
  • the data sending end calls the security applet in eUICC to generate a first key pair (based on ECC or RSA).
  • the first key pair includes a first public key and a first private key.
  • the first private key will always be stored in the secure applet and cannot be obtained by the data sending end or other devices. This can prevent other devices from stealing the first private key and then sending data to the data receiving end based on the first private key. and signature.
  • the data sending end obtains metadata and generates data to be uploaded based on the metadata.
  • Metadata includes at least one of the following: first public key, IEMI, ICCID, eUICC ID, device serial number SN, MSISDN.
  • the data sending end application obtains the first public key generated by the security applet through the ADPU instruction.
  • the data sending end obtains the first terminal information of the data sending end from the operating system interface and the communication module interface, including at least one of the following: IEMI, ICCID, eUICC ID, device serial number SN, MSISDN.
  • the data to be uploaded includes: metadata, the first signature algorithm for signing the metadata, and the first digital signature obtained after signing the metadata.
  • the data sending end application sends metadata to the security applet.
  • the security applet digitally signs the metadata based on the first private key in the public-private key pair and the first signature algorithm to obtain the first digital signature.
  • the data sending end generates data to be uploaded based on the metadata, the first signature algorithm and the first digital signature.
  • the data sending end sends the data to be uploaded to the DIVS AS.
  • DIVS AS verifies the data to be uploaded based on the first public key and the first digital signature.
  • DIVS AS decrypts the first digital signature according to the first public key to obtain decrypted data. DIVS AS determines whether the decrypted data is consistent with the metadata or the hash of the metadata. If they are consistent, the verification is successful.
  • DIVS AS sends contract request information to NEF.
  • the contract request information is used to request to obtain the contract information of the data sending end.
  • DIVS AS accesses NEF through the query interface (RP-EDI).
  • the access message carries MSISDN, ICCID and IMEI, and requests to obtain the contract information of the data sender corresponding to the MSISDN, ICCID and IMEI.
  • NEF obtains the contract information of the sending end from UDM.
  • NEF forwards the MSISDN, ICCID, and IMEI to the UDM, and requests to obtain the contract information of the data sending end corresponding to the MSISDN, ICCID, and IMEI.
  • UDM queries the contract information with the MSISDN, ICCID and IMEI information through MSISDN, ICCID and IMEI, and returns the queried contract information to NEF.
  • NEF sends the contract information of the data sending end to DIVS AS.
  • NEF forwards the contract information sent by UDM to DIVS AS.
  • DIVS AS generates the first data set to be signed.
  • DIVS AS uses metadata, signing information, public key, and first signature algorithm information as the first data set to be signed.
  • DIVS AS can directly use the metadata, contracting information, public key, and first signature algorithm information as the first data set to be signed, or it can also use the metadata, contracting information, public key, and first signature algorithm information as the first data set to be signed.
  • the hash value is used as the first data set to be signed. This application does not limit this.
  • DIVS AS generates data integrity verification information based on the first data set to be signed, and uploads the data integrity verification information to the blockchain ledger.
  • DIVS AS signs the first data set to be signed based on the second private key of the blockchain ledger and the second digital signature algorithm to generate a second digital signature.
  • DIVS AS uploads the first to-be-signed data set, the second digital signature, and the CA certificate of the second private key to the blockchain ledger as data integrity verification information.
  • the blockchain ledger includes the transaction ID (Transation ID) of data integrity verification information.
  • DIVS AS sets the value of the previous transaction identifier of the data integrity verification information to empty and sets the record status to available.
  • DIVS AS generates transaction identification of complete data row verification information.
  • DIVS AS sends the transaction identifier to the data sending end.
  • DIVS AS also generates the URL of the DIVS AS entrance, and synchronously sends the URL and transaction identifier to the data sending end. It is understandable that DIVS AS can send the transaction ID and URL to the data sending end respectively after generating the transaction ID and URL. DIVS AS can also be merged based on the transaction ID and URL, and the transaction ID and URL are sent to the data sending end through the same message. This disclosure does not limit this. In the case where the transaction ID and URL are sent to the data sender in the same message, if DIVS AS updates the transaction ID but does not update the URL, DIVS can only update the transaction ID in the information, or it can update the transaction ID and URL at the same time. This disclosure does not limit this either.
  • the data sender can store the transaction ID and URL in the secure applet in the eUICC.
  • the certificate corresponding to the second private key provided by DIVS AS can be a CA certificate generated based on the public and private key pairs managed by the members of the blockchain system, or it can be a CA generated by an authoritative CA structure.
  • the certificate can also be a self-signed CA certificate, which is not limited in this application.
  • the second digital signature algorithm and the first digital signature algorithm may be the same digital signature algorithm.
  • the blockchain ledger includes a blockchain client, which is used to read and write blockchain ledger data and execute smart contracts.
  • the process of updating the data integrity verification information is the contract cancellation process as an example to explain the process of updating the data integrity verification information.
  • the contract cancellation process can be implemented through the following S801-S808.
  • the data sending end user's contract data stored in UDM. Once the user's service is logged out, the contract cancellation process will be triggered, and a UDM event notification will be triggered to NEF.
  • UDM sends an eSIM subscription cancellation message to NEF.
  • the eSIM subscription cancellation message includes at least one of the following: ICCID, MSISDN, bound IMEI, and eSIM subscription cancellation time.
  • NEF sends an eSIM subscription cancellation message to DIVS AS.
  • NEF triggers a subscription notification event and sends an eSIM subscription cancellation message to DIVS AS.
  • DIVS AS determines the corresponding transaction identifier based on the eSIM contract cancellation message.
  • DIVS AS After receiving the eSIM subscription and cancellation message, DIVS AS obtains the ICCID, MSISDN and IMEI in the eSIM subscription and cancellation message. DIVS AS determines all transaction identifiers associated with ICCID, MSISDN and IMEI.
  • DIVS AS updates the first data set to be signed corresponding to the transaction identifier and obtains the second data set to be signed.
  • DIVS AS updates the eSIM signing and cancellation time in the first data set to be signed corresponding to each transaction identification, and uses the updated first data set to be signed as the second data set to be signed.
  • DIVS AS signs the second data set to be signed based on the second private key and the second signature algorithm to obtain the fourth digital signature.
  • DIVS AS uploads the second data set to be signed, the fourth digital signature, and the CA certificate of the second private key to the blockchain ledger as updated data integrity verification information.
  • DIVS AS generates the transaction identifier of the updated data integrity verification information.
  • DIVS AS sends the transaction identifier of the updated data integrity verification information to the data sending end.
  • S807 and S808 can refer to the above-mentioned S710 and S711, and will not be described again here.
  • the data integrity verification process can be implemented through the following S901-S907.
  • the data sending end obtains the data to be verified.
  • the collected data will be used as data to be verified.
  • the data sending end generates target data based on the data to be verified.
  • the data sending end uses the first private key and the first signature algorithm to obtain the digital signature to be verified, and obtains the first digital signature.
  • the data sending end calls the ADPU instruction to send the data to the secure applet, uses the first private key and the first signature algorithm to sign the data to be verified, and obtains the first digital signature and the timestamp of the first digital signature.
  • the data sending end sends the target data to the data receiving end.
  • the data sending end generates target data based on the data to be verified, the first digital signature, the timestamp of the first digital signature, and the first identification.
  • the data sending end sends target data to the data receiving end.
  • the data sending end can directly send the target data to the data receiving end, or can also send the target data to the data receiving end after being forwarded by other devices. This application does not limit this.
  • the data receiving end sends a data integrity verification information request message to the DIVS AS.
  • the request data includes a first identification.
  • DIVS AS queries the data integrity verification information associated with the first identifier.
  • the DIVS AS determines the first identifier. DIVS AS queries the data integrity verification information associated with the first identifier in the blockchain ledger.
  • DIVS AS first queries the data integrity verification information related to the first identification in the blockchain ledger, and determines the metadata in the data integrity verification information. Then DIVS AS determines the updated data integrity verification information based on the IEMI, MSISDN, and ICCID in the metadata.
  • DIVS AS sends the data integrity verification information and the updated data integrity verification information to the data receiving end.
  • DIVS AS sends data integrity verification information to the data receiving end.
  • the data receiving end verifies the data integrity of the data to be verified based on the data integrity verification information.
  • DIVS AS verifies the third digital signature or the fourth digital signature based on the CA integer of the second public key and the first private key in the data integrity verification information.
  • the first public key in the data integrity verification information is obtained, and the first digital signature is verified based on the first public key and the first signature algorithm.
  • the first digital signature passes the verification, it is determined whether the timestamp of the first digital signature is within the contract validity period of the data sending end. If yes, it is determined that the data integrity verification of the data to be verified is successful.
  • An embodiment of the present application provides an electronic device for performing the method required by any device in the above data integrity determination system.
  • the electronic device can be a data sending end, a data receiving end, a DIVS AS, NEF or UDM, etc. This application does not limit this.
  • the electronic device may be the electronic device involved in this application, or a module in the electronic device; or it may be a chip in the electronic device, or other device for performing the network quality determination method, which is not limited by this application.
  • FIG. 10 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • the electronic device 100 includes at least one processor 101 , a communication line 102 , and at least one communication interface 104 , and may also include a memory 103 .
  • the processor 101, the memory 103 and the communication interface 104 can be connected through a communication line 102.
  • the processor 101 may be a central processing unit (CPU), an application specific integrated circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the present application.
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • DSP digital signal processors
  • FPGA field programmable gate arrays
  • Communication line 102 may include a path for communicating information between the components described above.
  • the communication interface 104 is used to communicate with other devices or communication networks, and can use any transceiver-like device, such as Ethernet, wireless access network (radio access network, RAN), wireless local area networks (WLAN) wait.
  • transceiver-like device such as Ethernet, wireless access network (radio access network, RAN), wireless local area networks (WLAN) wait.
  • the memory 103 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory (RAM)) or other type that can store information and instructions.
  • a dynamic storage device can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or can be used to include or store desired program code in the form of instructions or data structures and can be used by a computer Any other medium for access, but not limited to this.
  • EEPROM electrically erasable programmable read-only memory
  • CD-ROM compact disc read-only memory
  • CD-ROM compact disc read-only memory
  • optical disc storage including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.
  • the memory 103 can exist independently of the processor 101, that is, the memory 103 can be a memory external to the processor 101. In this case, the memory 103 can be connected to the processor 101 through the communication line 102 for storing execution data. Instructions or application program codes are controlled and executed by the processor 101 to implement the network quality determination method provided by the following embodiments of the present application.
  • the memory 103 can also be integrated with the processor 101, that is, the memory 103 can be an internal memory of the processor 101.
  • the memory 103 can be a cache, which can be used to temporarily store some data and instructions. Information etc.
  • the processor 101 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 10 .
  • the electronic device 100 may include multiple processors, such as the processor 101 and the processor 107 in FIG. 10 .
  • the electronic device 100 may also include an output device 105 and an input device 106.
  • Embodiments of the present application provide a computer program product containing instructions.
  • the computer program product When the computer program product is run on a computer, it causes the computer to execute the method executed by each device in the above system embodiment.
  • Embodiments of the present application also provide a computer-readable storage medium. Instructions are stored in the computer-readable storage medium. When the instructions are run on a computer, they cause the computer to execute the method performed by each device in the above system embodiment.
  • the computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination thereof. More specific examples (non-exhaustive list) of computer-readable storage media include: electrical connections having one or more conductors, portable computer disks, hard drives, random access memory (RAM), read-only memory (Read-Only Memory, ROM), Erasable Programmable Read Only Memory (EPROM), register, hard disk, optical fiber, portable compact disk read-only memory (Compact Disc Read-Only Memory, CD-ROM ), an optical storage device, a magnetic storage device, or any suitable combination of the above, or any other form of computer-readable storage medium well known in the art.
  • An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and transfer information to the storage medium. Write information.
  • the storage medium can also be an integral part of the processor.
  • the processor and storage medium may be located in an Application Specific Integrated Circuit (ASIC).
  • ASIC Application Specific Integrated Circuit
  • the computer-readable storage medium may be any tangible medium containing or storing a program, which may be used by or in combination with an instruction execution system, apparatus or device.
  • the disclosed systems, devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.

Abstract

The present application relates to the technical field of communications. Provided is a data integrity verification system, which can verify the data integrity in a data circulation process. The system comprises a data sending end, a data receiving end and a DIVS AS. The data sending end is configured to send target data to the data receiving end, wherein the target data comprises data to be verified, a first digital signature and a first identifier; the data receiving end is configured to receive the target data and send the first identifier to the DIVS AS; the DIVS AS is configured to receive the first identifier and query data integrity verification information associated with the first identifier; and the data receiving end is configured to receive the data integrity verification information, verify the first digital signature according to a first public key in the data integrity verification information, and determine, according to a verification result of the first digital signature, the data integrity of the data to be verified. The embodiments of the present application are used in a data integrity verification process.

Description

数据完整性验证系统Data integrity verification system
本申请要求于2022年05月30日提交国家知识产权局、申请号为202210603461.2、申请名称为“数据完整性验证系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the State Intellectual Property Office on May 30, 2022, with application number 202210603461.2 and the application name "Data Integrity Verification System", the entire content of which is incorporated into this application by reference.
技术领域Technical field
本申请涉及通信技术领域,尤其涉及一种数据完整性验证系统。The present application relates to the field of communication technology, and in particular, to a data integrity verification system.
背景技术Background technique
相关技术中,数据发送端采集数据之后,往往需要将数据发送到特定终端中,由特定终端将数据转发或者流转给数据接收端。但是数据接收端接收到数据之后无法验证接收到的数据的数据完整性。进而导致数据接收端无法确定接收到的数据是否为数据发送端发送的原始数据,特定终端在转发过程中是否对数据进行了篡改。因此,数据接收端如何验证接收到的数据的数据完整性成为当前亟待解决的问题。In related technologies, after the data sending end collects data, it often needs to send the data to a specific terminal, and the specific terminal forwards or flows the data to the data receiving end. However, the data receiving end cannot verify the data integrity of the received data after receiving the data. As a result, the data receiving end cannot determine whether the received data is the original data sent by the data sending end, and whether the specific terminal has tampered with the data during the forwarding process. Therefore, how the data receiving end verifies the data integrity of the received data has become an urgent problem to be solved.
发明内容Contents of the invention
本申请提供一种数据完整性验证系统,在数据接收端接收到数据之后,验证数据的数据完整性。This application provides a data integrity verification system that verifies the data integrity after the data receiving end receives the data.
为达到上述目的,本申请采用如下技术方案:In order to achieve the above purpose, this application adopts the following technical solutions:
第一方面,本公开提供一种数据完整性验证系统,该系统包括:数据发送端、数据完整性验证服务器DIVS AS、以及数据接收端。In a first aspect, the present disclosure provides a data integrity verification system, which includes: a data sending end, a data integrity verification server DIVS AS, and a data receiving end.
其中,数据发送端,被配置为:向数据接收端发送目标数据;目标数据包括:待验证数据、第一数字签名和第一标识;其中,第一数字签名为根据第一私钥对待验证数据进行签名确定的数字签名;第一标识为数据发送端的数据完整性验证信息在DIVS AS中的存储标识;第一私钥为数据发送端生成的第一密钥对中的私钥。Wherein, the data sending end is configured to: send target data to the data receiving end; the target data includes: data to be verified, a first digital signature and a first identification; wherein the first digital signature is data to be verified based on the first private key The digital signature for signature confirmation; the first identifier is the storage identifier of the data integrity verification information of the data sender in the DIVS AS; the first private key is the private key in the first key pair generated by the data sender.
数据接收端,被配置为:接收目标数据,并向DIVS AS发送第一标识。The data receiving end is configured to receive the target data and send the first identifier to the DIVS AS.
DIVS AS,被配置为:接收第一标识,查询与第一标识关联的数据完整性验证信息;数据完整性验证信息包括第一公钥;第一公钥为数据发送端生成的第一密钥对中的公钥。DIVS AS is configured to: receive the first identification and query the data integrity verification information associated with the first identification; the data integrity verification information includes the first public key; the first public key is the first key generated by the data sending end The public key of the pair.
数据接收端,被配置为:接收数据完整性验证信息,根据所数据完整性验证信息中的第一公钥验证第一数字签名,并根据第一数字签名的验证结果确定待验证数据的数据完整性。 The data receiving end is configured to: receive data integrity verification information, verify the first digital signature according to the first public key in the data integrity verification information, and determine the data integrity of the data to be verified based on the verification result of the first digital signature. sex.
上述方案至少带来以下有益效果:在本公开实施例中数据发送端在采集到数据之后,采用第一私钥对数据进行数字签名,然后将数字签名和待验证数据统一发送给数据接收端。数据接收端接收到数据之后,从DIVS AS中获取数据发送端的数据完整性验证信息,利用数据完整性验证信息中的第一公钥对第一数字签名进行验证,若验证成功,则表示根据第一数字签名为根据第一私钥进行的签名,而第一私钥为数据发送端内部的密钥,不会被外部窃取。因此在第一数字签名验证成功的情况下,说明该第一数字签名为数据发送端对待验证数据进行签名后得到的数字签名,因此待验证数据为数据发送端发送的原始数据。基于此,数据接收端能够根据该方法确定接收到的数据是否为数据发送端发送的原始数据,从而有效验证了待验证数据的数据完整性。The above solution at least brings the following beneficial effects: In the embodiment of the present disclosure, after collecting the data, the data sending end uses the first private key to digitally sign the data, and then sends the digital signature and the data to be verified to the data receiving end. After receiving the data, the data receiving end obtains the data integrity verification information of the data sending end from the DIVS AS, and uses the first public key in the data integrity verification information to verify the first digital signature. If the verification is successful, it means that according to the A digital signature is a signature based on a first private key, and the first private key is an internal key of the data sending end and cannot be stolen by the outside. Therefore, if the verification of the first digital signature is successful, it means that the first digital signature is the digital signature obtained by the data sending end after signing the data to be verified, and therefore the data to be verified is the original data sent by the data sending end. Based on this, the data receiving end can determine whether the received data is the original data sent by the data sending end according to this method, thereby effectively verifying the data integrity of the data to be verified.
结合上述第一方面,在一种可能的实现方式中,数据发送端,还被配置为:向DIVS AS发送第一数据;第一数据包括:第一公钥,数据发送端支持的签名算法集和数据发送端的第一终端信息;DIVS AS,还被配置为:根据第一终端信息获取数据发送端的签约信息;签约信息包括:数据发送端的签约有效性信息;根据第一数据和签约信息,确定数据完整性验证信息;将数据完整性验证信息存储在区块链中。Combined with the above first aspect, in a possible implementation, the data sending end is also configured to: send the first data to the DIVS AS; the first data includes: a first public key, a set of signature algorithms supported by the data sending end and the first terminal information of the data sending end; the DIVS AS is also configured to: obtain the contract information of the data sending end according to the first terminal information; the contract information includes: the contract validity information of the data sending end; according to the first data and the contract information, determine Data integrity verification information; store data integrity verification information in the blockchain.
基于此,在进行数据完整性验证之前,数据发送端可以通过与DIVS AS交互,将数据完整性验证信息存储在区块链中。这样,在数据接收端请求数据完整性验证信息时,数据接收端可以从区块链中获取数据完整性验证信息,以避免数据完整性验证信息被篡改。Based on this, before performing data integrity verification, the data sending end can store the data integrity verification information in the blockchain by interacting with DIVS AS. In this way, when the data receiving end requests data integrity verification information, the data receiving end can obtain the data integrity verification information from the blockchain to prevent the data integrity verification information from being tampered with.
结合上述第一方面,在一种可能的实现方式中,系统还包括:能力开放平台NEF和用户数据管理网元UDM;DIVS AS,具体被配置为:向能力开放平台NEF发送签约信息获取请求;签约信息获取请求中包括第一终端信息;NEF,被配置为:向UDM请求获取数据发送端的签约信息,并在获取数据发送端的签约信息之后向DIVS AS返回数据发送端的签约信息;DIVS AS,还被配置:接收来自NEF的签约信息;签约信息为NEF返回的根据第一终端信息在用户数据管理网元UDM中获取的数据发送端的签约信息。Combined with the above first aspect, in a possible implementation, the system also includes: capability opening platform NEF and user data management network element UDM; DIVS AS, specifically configured to: send a contract information acquisition request to capability opening platform NEF; The contract information acquisition request includes the first terminal information; NEF is configured to: request the UDM to obtain the contract information of the data sender, and after obtaining the contract information of the data sender, return the contract information of the data sender to DIVS AS; DIVS AS, also Configured to: receive subscription information from NEF; the subscription information is the subscription information of the data sending end obtained from the user data management network element UDM based on the first terminal information returned by NEF.
基于此,DIVS AS在将数据完整性验证信息存储在区块链之前,从运营商网络中获取数据发送端的签约信息,并对比数据发送端的终端信息和签约信息中的终端信息是否一致,在一致的情况下将数据完整性验证信息存储在区块链中。保证了DIVS AS存储在区块链中的数据为数据发送端的数据完整性验证信息。Based on this, before storing the data integrity verification information in the blockchain, DIVS AS obtains the contract information of the data sender from the operator network, and compares the terminal information of the data sender with the terminal information in the contract information to see if they are consistent. The data integrity verification information is stored in the blockchain. It is guaranteed that the data stored in the blockchain by DIVS AS is the data integrity verification information of the data sender.
结合上述第一方面,在一种可能的实现方式中,数据发送端,具体被配置为:生成第一密钥对;第一密钥对包括第一公钥和第一私钥;采用第一私钥和第一签名 算法对第一公钥和第一终端信息签名,确定第二数字签名;根据第一公钥,第一终端信息,数据发送端支持的签名算法集,和第二数字签名生成第一数据。In conjunction with the above first aspect, in a possible implementation, the data sending end is specifically configured to: generate a first key pair; the first key pair includes a first public key and a first private key; use a first Private key and first signature The algorithm signs the first public key and the first terminal information to determine the second digital signature; generates the first data according to the first public key, the first terminal information, the signature algorithm set supported by the data sending end, and the second digital signature.
基于此,数据发送端生成第一公钥和第一私钥,数据发送端保存第一私钥,将第一公钥发送给DIVS AS。这样,待验证数据可以使用第一私钥加密,第一公钥解密。此外,数据发送端采用第一私钥和第一签名算法对元数据签名,生成第二数字签名,可以使DIVS AS根据第一公钥和第一签名算法对第二数字签名进行验证,保证接收到的第一数据的准确性。Based on this, the data sending end generates the first public key and the first private key, the data sending end saves the first private key, and sends the first public key to DIVS AS. In this way, the data to be verified can be encrypted using the first private key and decrypted using the first public key. In addition, the data sending end uses the first private key and the first signature algorithm to sign the metadata and generate a second digital signature, which allows DIVS AS to verify the second digital signature based on the first public key and the first signature algorithm to ensure receipt to the accuracy of the first data.
结合上述第一方面,在一种可能的实现方式中,DIVS AS,具体被配置为:根据第一公钥和第一签名算法,验证第二数字签名;在第二数字签名验证通过的情况下,获取第一数据中的第一终端信息;根据第一终端信息生成签约信息获取请求。Combined with the first aspect above, in one possible implementation, DIVS AS is specifically configured to: verify the second digital signature based on the first public key and the first signature algorithm; when the second digital signature verification passes , obtain the first terminal information in the first data; and generate a contract information acquisition request according to the first terminal information.
基于此,DIVS AS可以通过验证第二数字签名,确定第一数据是否为数据发送端向DIVS AS发送的原始数据,保证了接收到的第一数据的准确性。Based on this, DIVS AS can verify the second digital signature to determine whether the first data is the original data sent by the data sender to DIVS AS, ensuring the accuracy of the received first data.
结合上述第一方面,在一种可能的实现方式中,DIVS AS,具体被配置为:根据第一数据和签约数据生成第一待签名数据集;根据第二私钥和第二签名算法对第一待签名数据集签名,确定第三数字签名;第二私钥归属于DIVS AS生成的第二密钥对;根据第一待签名数据集、第二私钥对应的证书、以及第三数字签名,确定数据完整性验证信息。Combined with the above first aspect, in one possible implementation, the DIVS AS is specifically configured to: generate a first data set to be signed based on the first data and contract data; and generate a first data set to be signed based on the second private key and the second signature algorithm. Sign the first data set to be signed to determine the third digital signature; the second private key belongs to the second key pair generated by DIVS AS; according to the first data set to be signed, the certificate corresponding to the second private key, and the third digital signature , determine the data integrity verification information.
基于此,DIVS AS再次对数据完整性验证信息进行签名,可以使得数据接收端接收到数据完整性验证信息后,根据区块链的签名信息进行验签,保证数据完整性验证信息为来自DIVS AS的信息。Based on this, DIVS AS signs the data integrity verification information again, so that after the data receiving end receives the data integrity verification information, it can verify the signature based on the signature information of the blockchain to ensure that the data integrity verification information comes from DIVS AS Information.
结合上述第一方面,在一种可能的实现方式中,DIVS AS,还被配置为:向所述数据发送端发送所述第一交易标识;其中,所述第一交易标识用于表征所述数据完整性验证信息在所述区块链中的存储信息。In conjunction with the above first aspect, in a possible implementation, the DIVS AS is further configured to: send the first transaction identifier to the data sending end; wherein the first transaction identifier is used to characterize the Data integrity verification information is stored in the blockchain.
基于此,DIVS AS通过向数据发送端发送交易标识可以使数据发送端根据交易标识生成第一标识,进而使得数据接收端可以根据第一标识,从DIVS AS中获取数据完整性验证信息。Based on this, DIVS AS can enable the data sending end to generate a first identification based on the transaction identification by sending a transaction identification to the data sending end, so that the data receiving end can obtain data integrity verification information from DIVS AS based on the first identification.
结合上述第一方面,在一种可能的实现方式中,DIVS AS,还被配置为:向所述数据发送端发送所述第一地址信息;其中,所述第一地址信息为存储所述第一交易标识对应的数据完整性验证信息的DIVS AS的地址信息。In conjunction with the above first aspect, in a possible implementation manner, the DIVS AS is further configured to: send the first address information to the data sending end; wherein the first address information is to store the first address information. The address information of the DIVS AS of the data integrity verification information corresponding to a transaction identifier.
基于此,DIVS AS可以将DIVS AS入口地址发送给数据发送端,数据发送端通过在目标数据中增加DIVS AS入口地址,使得数据接收端根据DIVS AS入口地址确定能够存储数据完整性验证信息的DIVS AS。 Based on this, the DIVS AS can send the DIVS AS entry address to the data sending end. The data sending end adds the DIVS AS entry address to the target data, so that the data receiving end determines the DIVS that can store the data integrity verification information based on the DIVS AS entry address. AS.
结合上述第一方面,在一种可能的实现方式中,UDM,还被配置为:在数据发送端的签约信息更新的情况下,向NEF发送签约信息更新消息;签约信息更新消息包括:数据发送端的第二终端信息,以及数据发送端更新后的签约信息;NEF,还被配置为:向DIVS AS转发签约信息更新消息;DIVS AS,还被配置为:查询区块链中包括第二终端信息的最新的目标数据完整性验证信息;根据更新后的签约信息,更新最新的目标数据完整性验证信息;将更新后的最新的目标数据完整性验证信息存储在区块链中。Combined with the above first aspect, in a possible implementation, UDM is also configured to: when the subscription information of the data sending end is updated, send a signing information update message to NEF; the signing information update message includes: The second terminal information, as well as the updated contract information of the data sending end; NEF is also configured to: forward the contract information update message to DIVS AS; DIVS AS is also configured to: query the blockchain including the second terminal information The latest target data integrity verification information; update the latest target data integrity verification information based on the updated contract information; store the updated latest target data integrity verification information in the blockchain.
基于此,在数据发送端的签约信息变更之后,UDM能够及时通知DIVS AS进行签约信息的更新。并且DIVS AS能够根据更新后的签约信息更新数据完整性验证信息,保证数据完整性验证信息的实时性。Based on this, after the contract information at the data sender changes, UDM can promptly notify DIVS AS to update the contract information. And DIVS AS can update the data integrity verification information based on the updated contract information to ensure the real-time nature of the data integrity verification information.
结合上述第一方面,在一种可能的实现方式中,DIVS AS,具体还被配置为:对每个目标数据完整性验证信息执行第一操作,确定更新后的每个目标数据完整性验证信息;第一操作包括:根据第一数据和更新后的签约信息,生成第二待验证数据集;根据第二私钥和第二签名算法对第二待签名数据集签名,确定第四数字签名;根据第二待签名数据集,第二私钥对应的证书,以及第四数字签名,确定更新后的目标数据完整性验证信息。Combined with the above first aspect, in one possible implementation, the DIVS AS is specifically configured to: perform a first operation on each target data integrity verification information, and determine the updated each target data integrity verification information. ; The first operation includes: generating a second data set to be verified based on the first data and the updated contract information; signing the second data set to be signed based on the second private key and the second signature algorithm to determine a fourth digital signature; Based on the second data set to be signed, the certificate corresponding to the second private key, and the fourth digital signature, the updated target data integrity verification information is determined.
基于此,DIVS AS将数据发送端更新的签约信息存储在区块链中,可以使得数据接收端根据更新后的签约信息验证待验证数据的数据完整性。Based on this, DIVS AS stores the contract information updated by the data sender in the blockchain, which allows the data receiver to verify the data integrity of the data to be verified based on the updated contract information.
结合上述第一方面,在一种可能的实现方式中,DIVS AS,还被配置为:Combined with the first aspect above, in a possible implementation, DIVS AS is also configured as:
向所述数据发送端发送所述第二交易标识;其中,所述第二交易标识用于表征所述更新后的目标数据完整性验证信息在所述区块链中的存储信息。Send the second transaction identifier to the data sending end; wherein the second transaction identifier is used to characterize the storage information of the updated target data integrity verification information in the blockchain.
基于此,DIVS AS通过向数据发送端发送更新后的交易标识可以使数据发送端根据更新后的交易标识生成第一标识,进而使得数据接收端根据第一标识获取更新后的数据完整性验证信息。Based on this, DIVS AS can enable the data sending end to generate a first identification based on the updated transaction identification by sending the updated transaction identification to the data sending end, thereby enabling the data receiving end to obtain the updated data integrity verification information based on the first identification. .
结合上述第一方面,在一种可能的实现方式中,DIVS AS,还被配置为:向所述数据发送端发送所述第二地址信息;其中,所述第二地址信息为存储所述更新后的目标数据完整性验证信息的DIVS AS的地址信息DIVS AS基于此,DIVS AS通过向数据发送端发送更新后的DIVS AS入口地址,数据发送端可以在目标数据中添加更新后的DIVS AS入口地址;进而使得数据接收端可以根据更新后的DIVS AS入口地址向DIVS AS获取更新后的数据完整性验证信息。In conjunction with the above first aspect, in a possible implementation, the DIVS AS is further configured to: send the second address information to the data sending end; wherein the second address information is to store the update Based on the address information of the DIVS AS of the target data integrity verification information, the DIVS AS sends the updated DIVS AS entry address to the data sending end. The data sending end can add the updated DIVS AS entry in the target data. address; thus allowing the data receiving end to obtain updated data integrity verification information from DIVS AS based on the updated DIVS AS entry address.
结合上述第一方面,在一种可能的实现方式中,数据发送端,还被配置为:接收来自DIVS AS的第一交易标识和第二交易标识中的最新的交易标识;第一交易标 识为根据数据完整性验证信息在区块链中的存储信息生成的交易标识;第二交易标识为根据更新后的数据完整性验证信息在区块链中的存储信息生成的交易标识;根据第一交易标识和第二交易标识中的至少之一,生成第一标识。Combined with the above first aspect, in a possible implementation, the data sending end is further configured to: receive the latest transaction identifier among the first transaction identifier and the second transaction identifier from the DIVS AS; the first transaction identifier The second transaction identification is a transaction identification generated based on the storage information of the data integrity verification information in the blockchain; the second transaction identification is a transaction identification generated based on the storage information of the updated data integrity verification information in the blockchain; At least one of a transaction identifier and a second transaction identifier is used to generate a first identifier.
基于此,数据发送端可以根据第一交易标识和第二交易标识,生成第一标识。Based on this, the data sending end can generate the first identification based on the first transaction identification and the second transaction identification.
结合上述第一方面,在一种可能的实现方式中,目标数据还包括验证访问地址;验证访问地址用于表征存储数据发送端的数据完整性验证信息的DIVS AS的地址;数据发送端,还被配置为:接收来自DIVS AS的第一地址信息和第二地址信息中的至少之一;第一地址信息为存储第一交易标识对应的数据完整性验证信息的DIVS AS的地址信息;第二地址信息为存储第二交易标识对应的更新后的数据完整性验证信息的DIVS AS的地址信息;根据第一地址信息和第二地址信息中的至少之一生成验证访问地址。Combined with the first aspect above, in a possible implementation, the target data also includes a verification access address; the verification access address is used to represent the address of the DIVS AS that stores the data integrity verification information of the data sending end; the data sending end is also Configured to: receive at least one of the first address information and the second address information from the DIVS AS; the first address information is the address information of the DIVS AS that stores the data integrity verification information corresponding to the first transaction identifier; the second address The information is the address information of the DIVS AS that stores the updated data integrity verification information corresponding to the second transaction identifier; the verification access address is generated based on at least one of the first address information and the second address information.
基于此,数据发送端可以根据第一地址信息和第二地址信息,生成验证访问地址。Based on this, the data sending end can generate a verification access address based on the first address information and the second address information.
结合上述第一方面,在一种可能的实现方式中,目标数据还包括第一数字签名的时间戳;数据完整性验证信息还包括:数据发送端的签约有效期;数据接收端,还被配置为:确定第一数字签名的时间戳是否在数据发送端的签约有效期内;若是,则确定待验证数据的数据完整性验证成功。Combined with the above first aspect, in a possible implementation, the target data also includes the timestamp of the first digital signature; the data integrity verification information also includes: the contract validity period of the data sending end; the data receiving end is also configured to: Determine whether the timestamp of the first digital signature is within the contract validity period of the data sending end; if so, determine whether the data integrity verification of the data to be verified is successful.
基于此,数据接收端具体可以根据第一数字签名的时间戳是否在签约有效期内判断终端采集数据时是否处于签约有效时间段,并确定数据发送端在签约有效期内采集的数据完整性验证成功,在签约有效期外采集的数据完整性验证失败。Based on this, the data receiving end can specifically determine whether the terminal collects data during the contracting validity period based on whether the timestamp of the first digital signature is within the contracting validity period, and determine that the integrity verification of the data collected by the data sending end during the contracting validity period is successful. The integrity verification of data collected outside the contract validity period failed.
结合上述第一方面,在一种可能的实现方式中,数据接收端还被配置为:根据第二私钥对应的证书和第二签名算法验证第三数字签名;在第三数字签名验证成功的情况下,获取第一待签名数据集中的第一公钥。Combined with the above first aspect, in a possible implementation, the data receiving end is further configured to: verify the third digital signature according to the certificate corresponding to the second private key and the second signature algorithm; when the third digital signature verification is successful, In this case, obtain the first public key in the first data set to be signed.
基于此,数据发送端可以通过验证第三数字签名,确定获取的数据是否为DIVS AS向数据发送端发送的数据。Based on this, the data sending end can determine whether the obtained data is the data sent by DIVS AS to the data sending end by verifying the third digital signature.
结合上述第一方面,在一种可能的实现方式中,设备信息包括:嵌入式通用集成电路卡标识eUICC ID、国际移动设备识别码IMEI中的至少之一;开户平台,具体被配置为:获取数据发送端的eSIM profile和applet,确定eSIM的集成电路卡识别码ICCID;绑定eUICC ID、IMEI和ICCID的至少之一;根据数据发送端的签约有效期,确定数据发送端的签约有效性信息;根据第二终端信息和签约有效性信息,确定数据发送端的签约信息。Combined with the above first aspect, in a possible implementation, the device information includes: at least one of the embedded universal integrated circuit card identification eUICC ID and the international mobile equipment identification code IMEI; the account opening platform is specifically configured to: obtain The eSIM profile and applet of the data sender determine the integrated circuit card identification code ICCID of the eSIM; bind at least one of the eUICC ID, IMEI and ICCID; determine the contract validity information of the data sender according to the contract validity period of the data sender; according to the second Terminal information and contract validity information determine the contract information of the data sending end.
基于此,开户平台可以根据数据发送端的设备信息和签约信息,确定数据发送 端的第二终端信息和签约信息。Based on this, the account opening platform can determine the data transmission based on the device information and contract information of the data sending end. Second terminal information and contract information of the terminal.
结合上述第一方面,在一种可能的实现方式中,第一终端信息包括数据发送端的eUICC ID/ICCID、IMEI和MSISDN的至少之一;第二终端信息包括eUICC ID/ICCID、IMEI和MSISDNICCID的至少之一。Combined with the above first aspect, in a possible implementation, the first terminal information includes at least one of eUICC ID/ICCID, IMEI and MSISDN of the data sending end; the second terminal information includes at least one of eUICC ID/ICCID, IMEI and MSISDNICCID. At least one.
基于此,开户平台绑定eUICC ID、IMEI和ICCID作为数据发送端的终端信息,保证了数据发送端的终端信息的唯一性和一致性。Based on this, the account opening platform binds eUICC ID, IMEI and ICCID as the terminal information of the data sender, ensuring the uniqueness and consistency of the terminal information of the data sender.
在本申请中,上述通信装置的名字对设备或功能模块本身不构成限定,在实际实现中,这些设备或功能模块可以以其他名称出现。只要各个设备或功能模块的功能和本发明类似,属于本发明权利要求及其等同技术的范围之内。In this application, the name of the above-mentioned communication device does not limit the device or functional module itself. In actual implementation, these devices or functional modules may appear under other names. As long as the functions of each device or functional module are similar to those of the present invention, they fall within the scope of the claims of the present invention and its equivalent technologies.
附图说明Description of the drawings
图1为本申请提供的一种5G能力开放架构的系统架构图;Figure 1 is a system architecture diagram of a 5G capability open architecture provided by this application;
图2为本申请提供的一种区块链的结构示意图;Figure 2 is a schematic structural diagram of a blockchain provided by this application;
图3为本申请提供的一种数据完整性验证系统的系统架构图;Figure 3 is a system architecture diagram of a data integrity verification system provided by this application;
图4为本申请提供的又一种数据完整性验证系统的系统架构图;Figure 4 is a system architecture diagram of another data integrity verification system provided by this application;
图5为本申请提供的在垂直行业场景下的一种数据完整性验证系统的系统架构图;Figure 5 is a system architecture diagram of a data integrity verification system provided by this application in a vertical industry scenario;
图6为本公开提供的一种数据发送端在运营商网络中签约的流程示意图;Figure 6 is a schematic flow chart of a data sending end signing a contract in an operator network provided by the present disclosure;
图7为本公开提供的一种数据完整性验证信息上链的流程示意图;Figure 7 is a schematic flow chart of data integrity verification information uploading provided by the present disclosure;
图8为本公开提供的一种数据完整性验证信息更新的流程示意图;Figure 8 is a schematic flow chart of updating data integrity verification information provided by the present disclosure;
图9为本公开提供的一种数据完整性验证的流程示意图;Figure 9 is a schematic flow chart of data integrity verification provided by the present disclosure;
图10为本公开提供的一种电子设备的结构示意图。Figure 10 is a schematic structural diagram of an electronic device provided by the present disclosure.
具体实施方式Detailed ways
下面结合附图对本申请实施例提供的数据完整性验证系统进行详细地描述。The data integrity verification system provided by the embodiment of the present application will be described in detail below with reference to the accompanying drawings.
本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。The term "and/or" in this article is just an association relationship that describes related objects, indicating that three relationships can exist. For example, A and/or B can mean: A exists alone, A and B exist simultaneously, and they exist alone. B these three situations.
本申请的说明书以及附图中的术语“第一”和“第二”等是用于区别不同的对象,或者用于区别对同一对象的不同处理,而不是用于描述对象的特定顺序。The terms “first” and “second” in the description of this application and the drawings are used to distinguish different objects, or to distinguish different processes on the same object, rather than to describe a specific order of objects.
此外,本申请的描述中所提到的术语“包括”和“具有”以及它们的任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括其他没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。 Furthermore, references to the terms "including" and "having" and any variations thereof in the description of this application are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device that includes a series of steps or units is not limited to the listed steps or units, but optionally also includes other unlisted steps or units, or optionally also Includes other steps or units that are inherent to such processes, methods, products, or devices.
需要说明的是,本申请实施例中,“示例性的”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性的”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性的”或者“例如”等词旨在以具体方式呈现相关概念。It should be noted that in the embodiments of this application, words such as "exemplary" or "for example" are used to represent examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "such as" in the embodiments of the present application is not to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the words "exemplary" or "such as" is intended to present the concept in a concrete manner.
以下,为便于理解,首先对本申请实施例涉及到的名词进行解释。In the following, for ease of understanding, the terms involved in the embodiments of this application are first explained.
1、机器类型终端1. Machine type terminal
机器类型终端通常用于采集生成的数据,在垂直行业应用比较广泛。机器类型终端的应用有效促进了如农业、物流、交通、医疗、环境、供应链金融、智慧城市等垂直行业的数字化转型。Machine type terminals are usually used to collect generated data and are widely used in vertical industries. The application of machine-type terminals has effectively promoted the digital transformation of vertical industries such as agriculture, logistics, transportation, medical care, environment, supply chain finance, and smart cities.
随着5G网络的发展,机器类型终端的应用越来越广泛,海量机器类型终端采集数据之后,将数据发送至业务提供商终端,由业务提供商终端对采集数据进行收集、汇总和分析。此外,业务提供商终端还可以将机器类型终端采集的数据转发给上游的数据消费者终端。数据消费者终端可以通过分析数据获取行业内的有价值数据。例如,在农业行业,数据消费终端可以基于机器类型终端采集的数据确定用于农业保险的环境数据(如温度和风速)。在二手车行业,数据消费终端可以基于机器类型终端采集的数据确定用于二手交易车辆的驾驶行为数据。在交通行业,数据消费终端可以基于机器类型终端采集的数据确定用于AI算法训练的交通数据。With the development of 5G networks, the application of machine-type terminals is becoming more and more widespread. After massive machine-type terminals collect data, the data is sent to service provider terminals, which collect, summarize and analyze the collected data. In addition, the service provider terminal can also forward the data collected by the machine type terminal to the upstream data consumer terminal. Data consumer terminals can obtain valuable data in the industry by analyzing data. For example, in the agricultural industry, data consumption terminals can determine environmental data (such as temperature and wind speed) for agricultural insurance based on data collected by machine-type terminals. In the second-hand car industry, data consumption terminals can determine driving behavior data for second-hand transaction vehicles based on data collected by machine-type terminals. In the transportation industry, data consumption terminals can determine traffic data for AI algorithm training based on data collected by machine-type terminals.
当前机器类型终端采集数据之后直接向业务提供商终端上报采集数据,而不会将数据直接提供给数据消费终端。数据消费终端只能从业务提供商终端获取采集数据,而无法直接从机器类型终端获取数据。但是数据消费终端在接收到采集数据之后,无法确定业务提供商终端提供的数据是否被篡改、难以验证接收到的采集数据是否为机器类型终端采集的原始数据。After the current machine type terminal collects data, it directly reports the collected data to the service provider terminal without directly providing the data to the data consumption terminal. Data consumption terminals can only obtain collected data from service provider terminals, but cannot directly obtain data from machine-type terminals. However, after the data consumption terminal receives the collected data, it cannot determine whether the data provided by the service provider terminal has been tampered with, and it is difficult to verify whether the received collected data is the original data collected by the machine type terminal.
而在很多行业内如农业保险和分布式人工智能应用,对数据完整性(数据真实性)要求非常高,如果这些行业内的数据消费终端基于篡改后的数据进行数据分析和决策,将可能会导致不必要的经济损失,遭受安全攻击。因此,对于数据消费终端来说,如何对获取到的数据进行数据完整性验证,保证获取到的数据为源端采集的原始数据、数据未经过篡改,成为当前亟待解决的问题。In many industries, such as agricultural insurance and distributed artificial intelligence applications, the requirements for data integrity (data authenticity) are very high. If the data consumption terminals in these industries perform data analysis and decision-making based on tampered data, it may cause problems. Causing unnecessary economic losses and suffering security attacks. Therefore, for data consumption terminals, how to verify the data integrity of the acquired data to ensure that the acquired data is the original data collected by the source and that the data has not been tampered with has become an urgent problem to be solved.
在本公开中,机器类型终端可以为数据发送端,用于执行数据发送端相关的功能。数据消费终端为数据接收端,用于执行数据接收端相关的功能。In the present disclosure, the machine type terminal may be a data sending end and is used to perform functions related to the data sending end. The data consumption terminal is the data receiving end and is used to perform functions related to the data receiving end.
2、数据完整性2. Data integrity
在本公开实施例中,数据完整性主要用于数据接收端(例如以上记载的数据消费终端)验证接收到的数据是否为数据发送端(例如以上记载的机器类型终端)发 送的原始数据。防止数据在中间转发的过程中被篡改。基于上述在机器类型终端中的描述可知,当前数据消费终端存在验证业务提供商终端提供的数据的数据完整性的需求。In the embodiment of the present disclosure, data integrity is mainly used by the data receiving end (such as the data consumption terminal described above) to verify whether the received data is sent by the data sending end (such as the machine type terminal described above). The original data sent. Prevent data from being tampered with during intermediate forwarding. Based on the above description in the machine type terminal, it can be known that the current data consumption terminal has a need to verify the data integrity of the data provided by the service provider terminal.
相关技术中,可以通过使用对称密钥+单向Hash函数或者非对称密钥hash方式验证数据完整性。但是这些方案至少存在如下问题。In related technologies, data integrity can be verified by using a symmetric key + one-way Hash function or an asymmetric key hash method. However, these solutions have at least the following problems.
采用对称密钥+单向Hash函数的数据完整性验证方式仅能验证数据在点到点传输过程中的数据完整性,而无法验证数据是否为源端提供的原始数据。这可能会导致业务提供商终端在向数据消费终端发送数据之前对数据进行篡改,而数据消费终端无法验证数据是否被篡改。The data integrity verification method using symmetric key + one-way Hash function can only verify the data integrity during the point-to-point transmission process, but cannot verify whether the data is the original data provided by the source. This may cause the service provider terminal to tamper with the data before sending it to the data consuming terminal, and the data consuming terminal cannot verify whether the data has been tampered with.
采用非对称密钥hash的数据完整性验证方式的过程中,通过采用私钥签名+公钥验签的方式验证数据完整性(例如,ITU-T X.509、IETF RFC 4880)。但是在该方式中,同样无法验证数据是否为源端提供的原始数据。例如,在机器类型终端采集数据之后,由业务提供商终端将采集数据转发给数据消费终端。数据消费终端只能以接收到的数据为原始数据进行后续处理,或者通过声明及合约的方式约束业务提供商提供原始数据。但是这些方式都无法避免业务提供商终端提供的是原始数据,也就难以确保数据完整性。In the process of data integrity verification using asymmetric key hashing, data integrity is verified by using private key signature + public key signature verification (for example, ITU-T X.509, IETF RFC 4880). However, in this method, it is also impossible to verify whether the data is the original data provided by the source. For example, after the machine type terminal collects data, the service provider terminal forwards the collected data to the data consumption terminal. The data consumption terminal can only use the received data as original data for subsequent processing, or it can constrain the service provider to provide original data through declarations and contracts. However, these methods cannot avoid the fact that the service provider terminal provides original data, making it difficult to ensure data integrity.
3、嵌入式用户身份识别模块(Embedded subscriber identity module,eSIM)及可信执行环境(trusted execution environment,TEE)技术。3. Embedded subscriber identity module (eSIM) and trusted execution environment (TEE) technology.
eSIM和TEE可以在机器类型终端存储机密数据及执行可信运算,例如,在机器类型终端的eSIM中生成公私密钥对,或者通过OTA的方式将公钥背书信息下发到eSIM中。eSIM and TEE can store confidential data and perform trusted operations in machine-type terminals. For example, generate a public-private key pair in the eSIM of the machine-type terminal, or send public key endorsement information to eSIM through OTA.
在机器类型终端中,当机器类型终端需要发送数据时,机器类型终端可以通过OS调用预定接口使用存储在TEE或者eSIM中的私钥对采集的数据进行签名,然后将签名后的数据发送给业务提供商终端。In a machine type terminal, when the machine type terminal needs to send data, the machine type terminal can call a predetermined interface through the OS to sign the collected data using the private key stored in the TEE or eSIM, and then send the signed data to the business Provider terminal.
4、5G开放能力架构4. 5G open capability architecture
如图1所示,为本申请实施例提供的5G能力开放架构的系统架构图。在图1所示的5G能力开放架构中,包括:应用服务器(application server,AS)、网元功能(network element function,NEF)、统一数据管理功能(unified data management,UDM)、策略控制功能(Policy Control Function,PCF)、接入和移动管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、网络仓库功能(network repository function,NRF)、Network Entity。As shown in Figure 1, it is a system architecture diagram of the 5G capability opening architecture provided by the embodiment of this application. In the 5G capability open architecture shown in Figure 1, it includes: application server (AS), network element function (NEF), unified data management function (UDM), policy control function ( Policy Control Function (PCF), access and mobility management function (AMF), session management function (SMF), network repository function (NRF), Network Entity.
其中,AS为运营商的应用服务器或者第三方应用服务器,用于提供运营商的 网络服务能力或者第三方应用的服务能力。AS通过Nnef接入运营商5G网络的NEF的API接口,通过API接口与NEF进行通信。Among them, AS is the operator's application server or a third-party application server, which is used to provide the operator's Network service capabilities or service capabilities of third-party applications. AS accesses the NEF API interface of the operator's 5G network through Nnef, and communicates with NEF through the API interface.
NEF为运营商的能力开放网元,用于将运营商的网络能力开放给第三方服务,将核心网中的数据(如位置信息)开放给AS,或者将AS的业务需求(如QoS策略)传输给5G核心网中的网元。NEF is the operator's ability opening network element, which is used to open the operator's network capabilities to third-party services, open the data in the core network (such as location information) to AS, or open the AS's business requirements (such as QoS policy) Transmitted to network elements in the 5G core network.
NEF通过Nudm接口与UDM连接,通过Npcf接口与PCF连接,通过Namf与AMF连接,通过Nsmf与SMF连接,通过Nnrf与NRF连接,通过3GPP interface与Network Entity连接。NEF is connected to UDM through the Nudm interface, to PCF through the Npcf interface, to AMF through Namf, to SMF through Nsmf, to NRF through Nnrf, and to Network Entity through the 3GPP interface.
需要指出的是,在本公开实施例中,可以通过运营商的AS功能,为机器类型终端采集的数据提供长期的数据完整性验证服务。It should be pointed out that in the embodiment of the present disclosure, the operator's AS function can be used to provide long-term data integrity verification services for the data collected by the machine type terminal.
5、区块链5. Blockchain
区块链是一种由多方共同维护、以块链结构存储数据、使用密码学保证传输和访问安全的数据存储技术。通过区块链技术能够实现数据一致存储、无法篡改、无法抵赖的效果。Blockchain is a data storage technology that is jointly maintained by multiple parties, stores data in a block chain structure, and uses cryptography to ensure transmission and access security. Through blockchain technology, data can be stored consistently, cannot be tampered with, and cannot be repudiated.
区块链中通常包括多个区块链节点,该多个节点分别存储区块链中的账本,并使用P2P技术进行账本的同步,保证每个节点的存储的账本的一致性。当账本中的数据需要更新时,多个节点采用共识机制对写入账本的记录进行确认。这样,可以保证写入账本的数据是在多个节点共同确认的情况下写入的,未经过多个节点共同确认的数据将无法写入,保证了区块链账本中写入的数据是不可被篡改的且数据是可溯源的。The blockchain usually includes multiple blockchain nodes, which store the ledgers in the blockchain respectively, and use P2P technology to synchronize the ledgers to ensure the consistency of the ledgers stored in each node. When the data in the ledger needs to be updated, multiple nodes use a consensus mechanism to confirm the records written to the ledger. In this way, it can be guaranteed that the data written to the ledger is written with the joint confirmation of multiple nodes. Data that has not been jointly confirmed by multiple nodes will not be written, ensuring that the data written in the blockchain ledger cannot be written. Tampered and data is traceable.
区块链根据允许接入用户的类型划分为:公有链、联盟链和私有链三种类型的区块链。其中,公有链允许任何终端接入并使用账本记账。联盟链仅允许特定的个人的终端或特定的企业的终端接入并使用账本记账。私有链仅允许企业内部节点维护和使用区块链。Blockchain is divided into three types of blockchain based on the types of users allowed to access: public chain, alliance chain and private chain. Among them, the public chain allows any terminal to access and use the ledger for accounting. The consortium chain only allows specific individual terminals or specific enterprise terminals to access and use the ledger for accounting. Private chains only allow internal nodes within the enterprise to maintain and use the blockchain.
如图2所示,为本公开实施例提供的一种区块链的结构示意图。如图2所示,区块链中包括多个区块链节点Peer,各个区块链节点之间互相连接。区块链节点中设置有智能合约(图中仅以区块链节点3为例示出,其他节点与区块链节点3类似)。As shown in Figure 2, it is a schematic structural diagram of a blockchain provided by an embodiment of the present disclosure. As shown in Figure 2, the blockchain includes multiple blockchain nodes Peer, and each blockchain node is connected to each other. Smart contracts are set up in the blockchain nodes (only blockchain node 3 is shown in the figure as an example, other nodes are similar to blockchain node 3).
各个区块链节点中包括区块链账本(Ledger),区块链账本用于存储数据,例如以哈希的形式存储数据。Each blockchain node includes a blockchain ledger (Ledger), which is used to store data, for example, in the form of hash.
需要指出的是,在本公开实施例中可以通过区块链技术存储数据完整性验证信息。例如公钥信息MSISDN、ICCID、设备序列信息、hash算法、时间戳等信息,并通过5G网络的开放能力为终端提供数据完整性验证服务器。从而保证垂直行业 通过机器类型终端采集数据时整个数据生命周期的数据完整性验证,降低数据流转和再应用过程中产生的信任成本,促进垂直行业数字化转型和数据应用。It should be pointed out that in the embodiment of the present disclosure, data integrity verification information can be stored through blockchain technology. For example, public key information MSISDN, ICCID, device sequence information, hash algorithm, timestamp and other information, and provide a data integrity verification server for terminals through the open capabilities of the 5G network. This ensures that vertical industries Verification of data integrity during the entire data life cycle when collecting data through machine-type terminals reduces the trust cost generated during data transfer and re-application, and promotes digital transformation and data application in vertical industries.
以上,对本申请实施例涉及到的技术名词进行了详细说明。Above, the technical terms involved in the embodiments of the present application have been described in detail.
根据上述对机器类型终端和数据完整性验证的描述可知,在当前的数据传输过程中(尤其是存在第三方转发数据的过程中),数据接收端存在验证接收数据的数据完整性的需求。According to the above description of machine type terminals and data integrity verification, it can be seen that in the current data transmission process (especially in the process of data forwarding by a third party), the data receiving end has a need to verify the data integrity of the received data.
例如,在垂直行业的应用场景中,机器类型终端将采集的数据发送给业务提供商终端,由业务提供商终端将数据转发给数据消费终端。在该场景下,数据消费终端难以验证业务提供商终端是否篡改了机器类型终端采集的数据。导致数据消费终端无法确定接收到的数据的数据完整性。For example, in vertical industry application scenarios, machine-type terminals send collected data to service provider terminals, which forward the data to data consumption terminals. In this scenario, it is difficult for the data consumption terminal to verify whether the service provider terminal has tampered with the data collected by the machine type terminal. As a result, the data consuming terminal cannot determine the data integrity of the received data.
为解决相关技术中存在的问题,本申请实施例提供了一种数据完整性验证系统,数据完整性验证服务器DIVS AS中存储数据发送端的数据完整性验证信息,在数据接收端接收到待验证数据及待验证数据的第一数字签名之后,从DIVS AS中获取数据发送端的数据完整性验证信息,根据数据完整性验证信息验证第一数字签名,在第一数字签名有效的情况下,表示该数据为数据采集终端采集到的原始数据,进而表示该数据的数据完整性验证成功。In order to solve the problems existing in related technologies, embodiments of the present application provide a data integrity verification system. The data integrity verification server DIVS AS stores the data integrity verification information of the data sending end, and receives the data to be verified at the data receiving end. After the first digital signature of the data to be verified, obtain the data integrity verification information of the data sending end from the DIVS AS, verify the first digital signature based on the data integrity verification information, and if the first digital signature is valid, it means that the data It is the original data collected by the data collection terminal, which indicates that the data integrity verification of the data is successful.
图3为本申请实施例提供的数据完整性验证系统的系统架构图;如图3所示,该数据完整性验证系统包括:数据发送端301、数据完整性验证服务器(data integrity verification service application server,DIVS AS)302、以及数据接收端303。Figure 3 is a system architecture diagram of the data integrity verification system provided by the embodiment of this application; as shown in Figure 3, the data integrity verification system includes: data sending end 301, data integrity verification service application server , DIVS AS) 302, and the data receiving end 303.
其中,数据发送端301,被配置为:向数据接收端303发送目标数据;目标数据包括:待验证数据、第一数字签名和第一标识;其中,第一数字签名为根据第一私钥对待验证数据进行签名确定的数字签名;第一标识为数据发送端301的数据完整性验证信息在DIVS AS302中的存储标识;第一私钥为数据发送端301生成的第一密钥对中的私钥。Among them, the data sending end 301 is configured to: send target data to the data receiving end 303; the target data includes: data to be verified, a first digital signature and a first identification; where the first digital signature is treated according to the first private key The digital signature used to verify the signature of the data; the first identifier is the storage identifier of the data integrity verification information of the data sending end 301 in the DIVS AS 302; the first private key is the private key in the first key pair generated by the data sending end 301. key.
数据接收端303,被配置为:接收目标数据,并向DIVS AS302发送第一标识。The data receiving end 303 is configured to receive the target data and send the first identifier to the DIVS AS 302.
DIVS AS302,被配置为:接收第一标识,查询与第一标识关联的数据完整性验证信息;数据完整性验证信息包括第一公钥;第一公钥为数据发送端301生成的第一密钥对中的公钥。DIVS AS302 is configured to: receive the first identification and query the data integrity verification information associated with the first identification; the data integrity verification information includes the first public key; the first public key is the first password generated by the data sending end 301 The public key in the key pair.
数据接收端303,被配置为:接收数据完整性验证信息,根据所数据完整性验证信息中的第一公钥验证第一数字签名,并根据第一数字签名的验证结果确定待验证数据的数据完整性。The data receiving end 303 is configured to: receive data integrity verification information, verify the first digital signature according to the first public key in the data integrity verification information, and determine the data of the data to be verified based on the verification result of the first digital signature. Integrity.
可选的,上述数据发送端301可以是上文记载的机器类型终端。数据接收端303 可以是上文记载的数据消费终端。Optionally, the above-mentioned data sending terminal 301 may be the machine type terminal described above. Data receiving end 303 It can be the data consumption terminal described above.
上述方案至少带来以下有益效果:在本公开实施例中数据发送端301在采集到数据之后,采用第一私钥对数据进行数字签名,然后将数字签名和待验证数据统一发送给数据接收端303。数据接收端303接收到数据之后,从DIVS AS302中获取数据发送端301的数据完整性验证信息,利用数据完整性验证信息中的第一公钥对第一数字签名进行验证,若验证成功,则表示根据第一数字签名为根据第一私钥进行的签名,而第一私钥为数据发送端301内部的密钥,不会被外部窃取。因此在第一数字签名验证成功的情况下,说明该第一数字签名为数据发送端301对待验证数据进行签名后得到的数字签名,因此待验证数据为数据发送端301发送的原始数据。基于此,数据接收端303能够根据该方法确定接收到的数据是否为数据发送端301发送的原始数据,从而有效验证了待验证数据的数据完整性。The above solution at least brings the following beneficial effects: In this disclosed embodiment, after collecting the data, the data sending end 301 uses the first private key to digitally sign the data, and then uniformly sends the digital signature and the data to be verified to the data receiving end. 303. After receiving the data, the data receiving end 303 obtains the data integrity verification information of the data sending end 301 from the DIVS AS 302, and uses the first public key in the data integrity verification information to verify the first digital signature. If the verification is successful, then It means that the first digital signature is a signature based on the first private key, and the first private key is an internal key of the data sending end 301 and will not be stolen by the outside. Therefore, if the first digital signature is verified successfully, it means that the first digital signature is the digital signature obtained by signing the data to be verified by the data sending end 301, and therefore the data to be verified is the original data sent by the data sending end 301. Based on this, the data receiving end 303 can determine whether the received data is the original data sent by the data sending end 301 according to this method, thereby effectively verifying the data integrity of the data to be verified.
结合图3,如图4所示,在一种可能的实现方式中,本申请实施例提供的数据完整性验证系统还包括:能力开放平台NEF304和用户数据管理网元UDM305。In conjunction with Figure 3, as shown in Figure 4, in a possible implementation manner, the data integrity verification system provided by the embodiment of the present application also includes: a capability opening platform NEF304 and a user data management network element UDM305.
其中,数据发送端301,还被配置为:向DIVS AS302发送第一数据;第一数据包括:第一公钥,数据发送端支持的签名算法集和数据发送端301的第一终端信息;DIVS AS302,还被配置为:根据第一终端信息获取数据发送端301的签约信息;签约信息包括:数据发送端301的签约有效性信息;根据第一数据和签约信息,确定数据完整性验证信息;将数据完整性验证信息存储在区块链中。Among them, the data sending end 301 is also configured to: send the first data to DIVS AS302; the first data includes: the first public key, the signature algorithm set supported by the data sending end and the first terminal information of the data sending end 301; DIVS AS302 is also configured to: obtain the contract information of the data sending end 301 according to the first terminal information; the contract information includes: the contract validity information of the data sending end 301; and determine the data integrity verification information according to the first data and the contract information; Store data integrity verification information in the blockchain.
基于此,在进行数据完整性验证之前,数据发送端301可以通过与DIVS AS302交互,将数据完整性验证信息存储在区块链中。这样,在数据接收端303请求数据完整性验证信息时,数据接收端303可以从区块链中获取数据完整性验证信息,以避免数据完整性验证信息被篡改。Based on this, before performing data integrity verification, the data sending end 301 can store the data integrity verification information in the blockchain by interacting with DIVS AS302. In this way, when the data receiving end 303 requests data integrity verification information, the data receiving end 303 can obtain the data integrity verification information from the blockchain to prevent the data integrity verification information from being tampered with.
在一种可能的实现方式中,系统还包括:能力开放平台NEF和用户数据管理网元UDM;DIVS AS302,具体被配置为:向能力开放平台NEF发送签约信息获取请求;签约信息获取请求中包括第一终端信息;NEF,被配置为:向UDM请求获取数据发送端301的签约信息,并在获取数据发送端301的签约信息之后向DIVS AS302返回数据发送端301的签约信息;DIVS AS302,还被配置:接收来自NEF的签约信息;签约信息为NEF返回的根据第一终端信息在用户数据管理网元UDM中获取的数据发送端301的签约信息。In a possible implementation, the system also includes: capability open platform NEF and user data management network element UDM; DIVS AS302, specifically configured to: send a contract information acquisition request to the capability open platform NEF; the contract information acquisition request includes The first terminal information; NEF, is configured to: request the UDM to obtain the contract information of the data sending terminal 301, and return the contract information of the data sending terminal 301 to DIVS AS302 after obtaining the contract information of the data sending terminal 301; DIVS AS302, also Configured to: receive subscription information from NEF; the subscription information is the subscription information of the data sending end 301 obtained from the user data management network element UDM based on the first terminal information returned by NEF.
基于此,DIVS AS302在将数据完整性验证信息存储在区块链之前,从运营商网络中获取数据发送端301的签约信息,并对比数据发送端301的终端信息和签约信息中的终端信息是否一致,在一致的情况下将数据完整性验证信息存储在区块链 中。保证了DIVS AS302存储在区块链中的数据为数据发送端301的数据完整性验证信息。Based on this, before storing the data integrity verification information in the blockchain, DIVS AS302 obtains the contract information of the data sender 301 from the operator network, and compares the terminal information of the data sender 301 with the terminal information in the contract information. Consistent, store data integrity verification information in the blockchain under consistent conditions middle. It is guaranteed that the data stored in the blockchain by DIVS AS302 is the data integrity verification information of the data sending end 301.
在一种可能的实现方式中,数据发送端301,具体被配置为:生成第一密钥对;第一密钥对包括第一公钥和第一私钥;采用第一私钥和第一签名算法对第一公钥和第一终端信息签名,确定第二数字签名;根据第一公钥,第一终端信息,数据发送端支持的签名算法集,和第二数字签名生成第一数据。In a possible implementation, the data sending end 301 is specifically configured to: generate a first key pair; the first key pair includes a first public key and a first private key; use the first private key and the first private key. The signature algorithm signs the first public key and the first terminal information to determine the second digital signature; generates the first data according to the first public key, the first terminal information, the signature algorithm set supported by the data sending end, and the second digital signature.
基于此,数据发送端301生成第一公钥和第一私钥,数据发送端301保存第一私钥,将第一公钥发送给DIVS AS302。这样,待验证数据可以使用第一私钥加密,第一公钥解密。此外,数据发送端301采用第一私钥和第一签名算法对元数据签名,生成第二数字签名,可以使DIVS AS302根据第一公钥和第一签名算法对第二数字签名进行验证,保证接收到的第一数据的准确性。Based on this, the data sending end 301 generates the first public key and the first private key, the data sending end 301 saves the first private key, and sends the first public key to DIVS AS302. In this way, the data to be verified can be encrypted using the first private key and decrypted using the first public key. In addition, the data sending end 301 uses the first private key and the first signature algorithm to sign the metadata and generate a second digital signature, which allows the DIVS AS302 to verify the second digital signature based on the first public key and the first signature algorithm to ensure Accuracy of the first data received.
在一种可能的实现方式中,DIVS AS302,具体被配置为:根据第一公钥和第一签名算法,验证第二数字签名;在第二数字签名验证通过的情况下,获取第一数据中的第一终端信息;根据第一终端信息生成签约信息获取请求。In one possible implementation, DIVS AS302 is specifically configured to: verify the second digital signature based on the first public key and the first signature algorithm; when the second digital signature passes verification, obtain the first data the first terminal information; generating a subscription information acquisition request according to the first terminal information.
基于此,DIVS AS302可以通过验证第二数字签名,确定第一数据是否为数据发送端301向DIVS AS302发送的原始数据,保证了接收到的第一数据的准确性。Based on this, DIVS AS302 can determine whether the first data is the original data sent by the data sending end 301 to DIVS AS302 by verifying the second digital signature, ensuring the accuracy of the received first data.
在一种可能的实现方式中,DIVS AS302,具体被配置为:根据第一数据和签约数据生成第一待签名数据集;根据第二私钥和第二签名算法对第一待签名数据集签名,确定第三数字签名;第二私钥归属于DIVS AS302生成的第二密钥对;根据第一待签名数据集、第二私钥对应的证书、以及第三数字签名,确定数据完整性验证信息。In a possible implementation, DIVS AS302 is specifically configured to: generate a first data set to be signed based on the first data and contract data; sign the first data set to be signed based on the second private key and the second signature algorithm , determine the third digital signature; the second private key belongs to the second key pair generated by DIVS AS302; determine the data integrity verification based on the first data set to be signed, the certificate corresponding to the second private key, and the third digital signature information.
基于此,DIVS AS302再次对数据完整性验证信息进行签名,可以使得数据接收端303接收到数据完整性验证信息后,根据区块链的签名信息进行验签,保证数据完整性验证信息为来自DIVS AS302的信息。Based on this, DIVS AS302 signs the data integrity verification information again, so that after the data receiving end 303 receives the data integrity verification information, it can verify the signature based on the signature information of the blockchain to ensure that the data integrity verification information comes from DIVS AS302 information.
在一种可能的实现方式中,DIVS AS302,还被配置为:向所述数据发送端301发送所述第一交易标识;其中,所述第一交易标识用于表征所述数据完整性验证信息在所述区块链中的存储信息。In a possible implementation, DIVS AS302 is also configured to: send the first transaction identifier to the data sending end 301; wherein the first transaction identifier is used to characterize the data integrity verification information Store information in the blockchain.
基于此,DIVS AS302通过向数据发送端301发送交易标识可以使数据发送端301根据交易标识生成第一标识,进而使得数据接收端303可以根据第一标识,从DIVS AS302中获取数据完整性验证信息。Based on this, DIVS AS302 can enable the data sending end 301 to generate a first identification based on the transaction identification by sending a transaction identification to the data sending end 301, so that the data receiving end 303 can obtain data integrity verification information from DIVS AS302 based on the first identification. .
在一种可能的实现方式中,DIVS AS302,还被配置为:In one possible implementation, DIVS AS302 is also configured to:
向所述数据发送端301发送所述第一地址信息;其中,所述第一地址信息为存 储所述第一交易标识对应的数据完整性验证信息的DIVS AS302的地址信息。Send the first address information to the data sending end 301; wherein the first address information is a storage The address information of the DIVS AS302 that stores the data integrity verification information corresponding to the first transaction identifier.
基于此,DIVS AS302可以将DIVS AS302入口地址发送给数据发送端301,数据发送端301通过在目标数据中增加DIVS AS302入口地址,使得数据接收端303根据DIVS AS302入口地址确定能够存储数据完整性验证信息的DIVS AS302。Based on this, DIVS AS302 can send the DIVS AS302 entry address to the data sending end 301. The data sending end 301 adds the DIVS AS302 entry address to the target data, so that the data receiving end 303 determines that it can store the data integrity verification based on the DIVS AS302 entry address. Information DIVS AS302.
在一种可能的实现方式中,UDM,还被配置为:在数据发送端301的签约信息更新的情况下,向NEF发送签约信息更新消息;签约信息更新消息包括:数据发送端301的第二终端信息,以及数据发送端301更新后的签约信息;NEF,还被配置为:向DIVS AS302转发签约信息更新消息;DIVS AS302,还被配置为:查询区块链中包括第二终端信息的最新的目标数据完整性验证信息;根据更新后的签约信息,更新最新的目标数据完整性验证信息;将更新后的最新的目标数据完整性验证信息存储在区块链中。In a possible implementation, UDM is also configured to: when the subscription information of the data sending end 301 is updated, send a subscription information update message to NEF; the subscription information update message includes: the second data of the data sending end 301 Terminal information, as well as the updated contract information of the data sending end 301; NEF is also configured to: forward the contract information update message to DIVS AS302; DIVS AS302 is also configured to: query the latest update of the second terminal information in the blockchain target data integrity verification information; update the latest target data integrity verification information based on the updated contract information; store the updated latest target data integrity verification information in the blockchain.
基于此,在数据发送端301的签约信息变更之后,UDM能够及时通知DIVS AS302进行签约信息的更新。并且DIVS AS302能够根据更新后的签约信息更新数据完整性验证信息,保证数据完整性验证信息的实时性。Based on this, after the contract information of the data sending end 301 is changed, UDM can promptly notify DIVS AS302 to update the contract information. And DIVS AS302 can update the data integrity verification information based on the updated contract information to ensure the real-time nature of the data integrity verification information.
在一种可能的实现方式中,DIVS AS302,具体还被配置为:对每个目标数据完整性验证信息执行第一操作,确定更新后的每个目标数据完整性验证信息;第一操作包括:根据第一数据和更新后的签约信息,生成第二待验证数据集;根据第二私钥和第二签名算法对第二待签名数据集签名,确定第四数字签名;根据第二待签名数据集,第二私钥对应的证书,以及第四数字签名,确定更新后的目标数据完整性验证信息。In a possible implementation, DIVS AS302 is specifically configured to: perform a first operation on each target data integrity verification information, and determine the updated each target data integrity verification information; the first operation includes: Generate a second data set to be verified based on the first data and the updated contract information; sign the second data set to be signed based on the second private key and the second signature algorithm to determine a fourth digital signature; based on the second data to be signed set, the certificate corresponding to the second private key, and the fourth digital signature to determine the updated target data integrity verification information.
基于此,DIVS AS302将数据发送端301更新的签约信息存储在区块链中,可以使得数据接收端303根据更新后的签约信息验证待验证数据的数据完整性。Based on this, DIVS AS302 stores the contract information updated by the data sending end 301 in the blockchain, which allows the data receiving end 303 to verify the data integrity of the data to be verified based on the updated contract information.
在一种可能的实现方式中,DIVS AS302,还被配置为:向所述数据发送端301发送所述第二交易标识;其中,所述第二交易标识用于表征所述更新后的目标数据完整性验证信息在所述区块链中的存储信息基于此,DIVS AS302通过向数据发送端301发送更新后的交易标识可以使数据发送端301根据更新后的交易标识生成第一标识,进而使得数据接收端303根据第一标识获取更新后的数据完整性验证信息。In a possible implementation, DIVS AS302 is also configured to: send the second transaction identifier to the data sending end 301; wherein the second transaction identifier is used to characterize the updated target data Based on the storage information of the integrity verification information in the blockchain, DIVS AS302 can enable the data sending end 301 to generate a first identification based on the updated transaction identification by sending the updated transaction identification to the data sending end 301, thereby enabling The data receiving end 303 obtains the updated data integrity verification information according to the first identification.
在一种可能的实现方式中,DIVS AS302,还被配置为:向数据发送端301发送所述第二地址信息;其中,所述第二地址信息为存储所述更新后的目标数据完整性验证信息的DIVS AS302的地址信息。可以理解的是,DIVS AS可以在生成交易标识和URL之后分别向数据发送端发送交易标识和URL。DIVS AS也可以根据交易标识和URL进行合并,通过同一条消息向数据发送端发送交易标识和URL,本公 开对此不做限定。在同一条消息向数据发送端发送交易标识和URL的情况下,若DIVS AS更新了交易标识(例如DIVS AS在更新了交易标识对应的上链数据之后也会相应更新该交易标识)但未更新URL,DIVS可以仅更新该信息中的交易标识,也可以同时更新交易标识和URL。本公开对此也不做限定。In a possible implementation, the DIVS AS 302 is further configured to: send the second address information to the data sending end 301; wherein the second address information is to store the updated target data integrity verification Information DIVS AS302 address information. It can be understood that DIVS AS can send the transaction ID and URL to the data sending end respectively after generating the transaction ID and URL. DIVS AS can also be merged based on the transaction ID and URL, and the transaction ID and URL are sent to the data sending end through the same message. There are no restrictions on this. In the case where the transaction ID and URL are sent to the data sender in the same message, if DIVS AS updates the transaction ID (for example, DIVS AS will update the transaction ID accordingly after updating the on-chain data corresponding to the transaction ID) but it is not updated. URL, DIVS can update only the transaction identifier in the information, or update the transaction identifier and URL at the same time. This disclosure does not limit this either.
基于此,DIVS AS302通过向数据发送端301发送更新后的DIVS AS302入口地址,数据发送端301可以在目标数据中添加更新后的DIVS AS302入口地址;进而使得数据接收端303可以根据更新后的DIVS AS302入口地址向DIVS AS302获取更新后的数据完整性验证信息。Based on this, DIVS AS302 sends the updated DIVS AS302 entry address to the data sending end 301. The data sending end 301 can add the updated DIVS AS302 entry address in the target data; thus the data receiving end 303 can according to the updated DIVS The AS302 entry address obtains updated data integrity verification information from DIVS AS302.
在一种可能的实现方式中,数据发送端301,还被配置为:接收来自DIVS AS302的第一交易标识和第二交易标识中的至少之一;第一交易标识为根据数据完整性验证信息在区块链中的存储信息生成的交易标识;第二交易标识为根据更新后的数据完整性验证信息在区块链中的存储信息生成的交易标识;根据第一交易标识和第二交易标识中的最新的交易标识,生成第一标识。In a possible implementation, the data sending end 301 is also configured to: receive at least one of the first transaction identification and the second transaction identification from the DIVS AS 302; the first transaction identification is based on data integrity verification information. A transaction identifier generated from the information stored in the blockchain; the second transaction identifier is a transaction identifier generated based on the updated data integrity verification information stored in the blockchain; based on the first transaction identifier and the second transaction identifier The latest transaction identifier in , generates the first identifier.
基于此,数据发送端301可以根据第一交易标识和第二交易标识,生成第一标识。Based on this, the data sending end 301 can generate the first identification based on the first transaction identification and the second transaction identification.
在一种可能的实现方式中,目标数据还包括验证访问地址;验证访问地址用于表征存储数据发送端301的数据完整性验证信息的DIVS AS302的地址;数据发送端301,还被配置为:接收来自DIVS AS302的第一地址信息和第二地址信息中的至少之一;第一地址信息为存储第一交易标识对应的数据完整性验证信息的DIVS AS302的地址信息;第二地址信息为存储第二交易标识对应的更新后的数据完整性验证信息的DIVS AS302的地址信息;根据第一地址信息和第二地址信息中的至少之一生成验证访问地址。In a possible implementation, the target data also includes a verification access address; the verification access address is used to represent the address of the DIVS AS302 that stores the data integrity verification information of the data sending end 301; the data sending end 301 is also configured as: Receive at least one of the first address information and the second address information from DIVS AS302; the first address information is the address information of DIVS AS302 that stores the data integrity verification information corresponding to the first transaction identifier; the second address information is the storage The address information of DIVS AS302 of the updated data integrity verification information corresponding to the second transaction identifier; generate a verification access address based on at least one of the first address information and the second address information.
基于此,数据发送端301可以根据第一地址信息和第二地址信息,生成验证访问地址。Based on this, the data sending end 301 can generate a verification access address based on the first address information and the second address information.
在一种可能的实现方式中,目标数据还包括第一数字签名的时间戳;数据完整性验证信息还包括:数据发送端301的签约有效期;数据接收端303,还被配置为:确定第一数字签名的时间戳是否在数据发送端301的签约有效期内;若是,则确定待验证数据的数据完整性验证成功。In a possible implementation, the target data also includes the timestamp of the first digital signature; the data integrity verification information also includes: the contract validity period of the data sending end 301; the data receiving end 303 is also configured to: determine the first Whether the timestamp of the digital signature is within the contract validity period of the data sending end 301; if so, it is determined that the data integrity verification of the data to be verified is successful.
基于此,数据接收端303具体可以根据第一数字签名的时间戳是否在签约有效期内判断终端采集数据时是否处于签约有效时间段,并确定数据发送端301在签约有效期内采集的数据完整性验证成功,在签约有效期外采集的数据完整性验证失败。Based on this, the data receiving end 303 can specifically determine whether the terminal collects data during the contracting validity period based on whether the timestamp of the first digital signature is within the contracting validity period, and determine the integrity verification of the data collected by the data sending end 301 within the contracting validity period. Success, the integrity verification of data collected outside the contract validity period failed.
在一种可能的实现方式中,数据接收端端303还被配置为:根据第二私钥对应 的证书和第二签名算法验证第三数字签名;在第三数字签名验证成功的情况下,获取第一待签名数据集中的第一公钥。In a possible implementation, the data receiving end 303 is also configured to: correspond to The certificate and the second signature algorithm are used to verify the third digital signature; when the verification of the third digital signature is successful, the first public key in the first data set to be signed is obtained.
基于此,数据发送端301可以通过验证第三数字签名,确定获取的数据是否为DIVS AS302向数据发送端301发送的数据。Based on this, the data sending end 301 can determine whether the acquired data is the data sent by the DIVS AS302 to the data sending end 301 by verifying the third digital signature.
在一种可能的实现方式中,第一终端信息包括数据发送端301的嵌入式通用集成电路卡标识(embedded universal integrated circuit card Identity,eUICC ID)/集成电路卡识别码(Integrate circuit card identity,ICCID)、国际移动设备识别码(International Mobile Equipment Identity,IMEI)和移动用户号码(Mobile Station international ISDN number,MSISDN)的至少之一;第二终端信息包括eUICC ID/ICCID、IMEI和MSISDN的至少之一。In a possible implementation, the first terminal information includes the embedded universal integrated circuit card identity (eUICC ID)/integrated circuit card identification code (Integrate circuit card identity, ICCID) of the data sending end 301 ), at least one of International Mobile Equipment Identity (International Mobile Equipment Identity, IMEI) and mobile subscriber number (Mobile Station international ISDN number, MSISDN); the second terminal information includes at least one of eUICC ID/ICCID, IMEI and MSISDN .
基于此,开户平台绑定eUICC ID/ICCID、IMEI和MSISDN作为数据发送端301的终端信息,保证了数据发送端301的终端信息的唯一性和一致性。Based on this, the account opening platform binds eUICC ID/ICCID, IMEI and MSISDN as the terminal information of the data sending end 301, ensuring the uniqueness and consistency of the terminal information of the data sending end 301.
以上,对本公开实施例涉及到的数据完整性验证系统中所包括的设备,以及各个设备的功能,各个设备之间的交互进行了详细说明。Above, the devices included in the data integrity verification system involved in the embodiments of the present disclosure, as well as the functions of each device and the interaction between each device have been described in detail.
一种可能的实现方式中,结合图5,为在垂直行业场景下,本申请实施例提供的一种数据完整性验证系统的系统架构图。In one possible implementation manner, combined with Figure 5, there is a system architecture diagram of a data integrity verification system provided by an embodiment of the present application in a vertical industry scenario.
如图5所示,该数据完整性验证系统包括机器类型终端501、数据完整性验证服务器502、数据消费终端503、能力开放功能网元504、用户数据存储网元505、其他数据完整性验证服务网元506。As shown in Figure 5, the data integrity verification system includes a machine type terminal 501, a data integrity verification server 502, a data consumption terminal 503, a capability opening function network element 504, a user data storage network element 505, and other data integrity verification services. Network element 506.
其中,机器类型终端501内安装有APP,用于实现不同的应用功能。机器类型终端内置有操作系统OS。机器类型终端中安装有eSIM,这样可以使得机器类型终端通过运营商网络(例如5G网络)传输数据。机器类型终端eSIM中还可以安装applet,applet用于生成密钥对(例如上述第一公钥和第一私钥)。其中第一私钥始终保存在applet中,避免第一私钥泄露,第一公钥可以发送给其他终端,以使得其他终端根据第一公钥对第一私钥加密的数据进行解密。可选的,机器类型终端中还可以集成5G通信模组,使得机器类型终端具备5G通信能力。Among them, APP is installed in the machine type terminal 501 for realizing different application functions. Machine type terminals have built-in operating systems OS. The eSIM is installed in the machine type terminal, which allows the machine type terminal to transmit data through the operator network (such as 5G network). An applet can also be installed in the machine type terminal eSIM, and the applet is used to generate a key pair (such as the above-mentioned first public key and first private key). The first private key is always stored in the applet to avoid leakage of the first private key. The first public key can be sent to other terminals, so that other terminals can decrypt data encrypted by the first private key based on the first public key. Optionally, a 5G communication module can also be integrated into the machine type terminal, so that the machine type terminal has 5G communication capabilities.
数据完整性验证服务器502,用于存储数据发送端的数据完整性验证信息,并为数据接收端提供数据完整性验证信息。可选的,数据完整性验证服务器可以是在运营商网络中部署的第三方实体。数据完整性验证服务器502中具体可以包括信令处理模块5021、接入控制模块5022、数据管理模块5023、区块链账本5024。The data integrity verification server 502 is used to store data integrity verification information of the data sending end and provide data integrity verification information to the data receiving end. Optionally, the data integrity verification server may be a third-party entity deployed in the operator's network. The data integrity verification server 502 may specifically include a signaling processing module 5021, an access control module 5022, a data management module 5023, and a blockchain ledger 5024.
数据消费终端503为用于收集、使用、流转机器类型终端采集的数据的第三方终端。例如,可以是个人的终端或者企业中的终端。 The data consumption terminal 503 is a third-party terminal used to collect, use, and transfer data collected by machine-type terminals. For example, it can be a personal terminal or a terminal in an enterprise.
能力开放功能网元504示例性的可以为5G核心网中的能力开放功能网元,例如NEF,用于实现第三方应用(如数据完整性验证服务器)与运营商核心网之间的通信。The capability opening function network element 504 may be, for example, a capability opening function network element in the 5G core network, such as NEF, which is used to implement communication between third-party applications (such as data integrity verification servers) and the operator's core network.
用户数据存储网元505,用于存储用户终端的数据,例如在本公开实施例中用户数据存储网元505用于存储机器类型终端的签约信息。The user data storage network element 505 is used to store data of user terminals. For example, in the embodiment of the present disclosure, the user data storage network element 505 is used to store subscription information of machine type terminals.
其他数据完整性验证服务网元506为部署于同一运营商不同核心网的数据完整性验证服务器,或者其他运营商的数据完整性验证服务器;数据完整性验证服务器的区块链账本功能组成区块链网络。Other data integrity verification service network elements 506 are data integrity verification servers deployed in different core networks of the same operator, or data integrity verification servers of other operators; the blockchain ledger function of the data integrity verification server constitutes a block chain network.
以上,对在垂直行业场景下的一种数据完整性验证系统的系统架构图进行了详细说明。Above, the system architecture diagram of a data integrity verification system in a vertical industry scenario is described in detail.
以下,结合上述数据完整性验证系统,对本申请进行分数据完整性验证的过程进行说明:Below, combined with the above-mentioned data integrity verification system, the process of performing data integrity verification for this application will be explained:
在本公开实施例中,数据完整性验证过程具体可以包括如下流程:In the embodiment of the present disclosure, the data integrity verification process may specifically include the following processes:
流程一、数据发送端在运营商网络中签约的流程;流程二、数据完整性验证信息上链的流程;流程三、数据完整性验证信息更新的流程;流程四、数据完整性验证的流程。以下分别对上述流程进行说明:Process 1, the process of the data sending end signing a contract in the operator's network; Process 2, the process of uploading the data integrity verification information to the chain; Process 3, the process of updating the data integrity verification information; Process 4, the process of data integrity verification. The above processes are explained below:
流程一、数据发送端在运营商网络中签约的流程。Process 1. The data sending end signs a contract in the operator's network.
如图6所示,数据发送端在运营商网络中签约的流程包括以下S601-S604。As shown in Figure 6, the process for the data sending end to sign a contract in the operator network includes the following S601-S604.
S601、数据发送端用户向开户平台发送设备签约信息。S601. The data sending end user sends equipment contract information to the account opening platform.
所述设备签约信息包括以下至少一项:Common Name、位置(国家、地区)、归属组织名称、邮箱地址。The device contract information includes at least one of the following: Common Name, location (country, region), affiliation organization name, and email address.
S602、开户平台为数据发送端开户。S602. The account opening platform opens an account for the data sending end.
具体包括:数据发送端在开户平台中开户,注册数据发送端的eUICC ID、IMEI、设备序列号SN、设备归属实体名称、部署位置、联系邮箱等信息。Specifically, it includes: the data sender opens an account in the account opening platform, and registers the data sender's eUICC ID, IMEI, device serial number SN, device ownership entity name, deployment location, contact email and other information.
开户平台触发eSIM管理平台生成eSIM profile及安全applet。eSIM管理平台生成eSIM profile的过程中,为数据发送端分配ICCID。The account opening platform triggers the eSIM management platform to generate eSIM profile and security applet. During the process of generating the eSIM profile by the eSIM management platform, the ICCID is assigned to the data sender.
开户平台绑定ICCID与IMEI、eUICC ID。The account opening platform binds ICCID to IMEI and eUICC ID.
需要指出的是,上述过程中所需的信息包括以下至少之一:Common Name、位置(国家、地区)、归属组织名称、邮箱地址。It should be pointed out that the information required in the above process includes at least one of the following: Common Name, location (country, region), affiliation organization name, and email address.
S603、数据发送端接入运营商网络,获取并安装eSIM profile及安全applet。S603. The data sending end accesses the operator's network, obtains and installs the eSIM profile and security applet.
一种具体的实现方式中,数据发送端接入运营商网络后,向eSIM管理平台请求下载eSIM profile及安全applet。下载完成之后,数据发送端在eUICC中安装eSIM  profile及安全applet。In a specific implementation method, after the data sending end is connected to the operator's network, it requests the eSIM management platform to download the eSIM profile and security applet. After the download is completed, the data sender installs the eSIM in the eUICC profile and security applets.
这样,数据发送端可以通过eSIM使用网络服务,通过applet生成密钥对,对需要加密的数据进行加密。In this way, the data sending end can use network services through eSIM, generate a key pair through an applet, and encrypt the data that needs to be encrypted.
S604、开户平台向UDM发送签约信息。相应的,UDM接收并存储数据发送端的签约信息。S604. The account opening platform sends contract information to UDM. Correspondingly, UDM receives and stores the contract information of the data sender.
这样,UDM中存储数据发送端的签约信息之后,可以为DIVS AS发送机器类型中的签约信息,以使得DIVS AS根据签约信息验证数据发送端。In this way, after the contract information of the data sender is stored in UDM, the contract information in the machine type can be sent to DIVS AS, so that DIVS AS verifies the data sender based on the contract information.
以上,对数据发送端在运营商网络中进行签约的过程进行了描述,基于该过程,通过绑定ICCID与IMEI、eUICC ID,可以通过上述信息完成对数据发送端的唯一标识。在此之后,DIVS AS和数据接收端可以基于上述信息对数据发送端进行验证。Above, the process of the data sending end signing a contract in the operator network is described. Based on this process, by binding ICCID with IMEI and eUICC ID, the data sending end can be uniquely identified through the above information. After this, DIVS AS and the data receiving end can verify the data sending end based on the above information.
流程二、数据完整性验证信息上链的流程。Process 2: The process of uploading data integrity verification information to the chain.
如图7所示,数据完整性验证信息上链的流程可以通过以下S701-S711实现。As shown in Figure 7, the process of uploading data integrity verification information to the blockchain can be implemented through the following S701-S711.
S701、数据发送端生成第一密钥对。S701. The data sending end generates a first key pair.
一种可能的实现方式中,数据发送端调用eUICC中的安全applet,生成第一密钥对(基于ECC或者RSA)。第一密钥对包括第一公钥和第一私钥。In one possible implementation, the data sending end calls the security applet in eUICC to generate a first key pair (based on ECC or RSA). The first key pair includes a first public key and a first private key.
需要指出的是,第一私钥将始终存储在安全applet中,不可被数据发送端或其他设备获取,这样可以避免其他设备窃取到第一私钥之后根据第一私钥向数据接收端发送数据及签名。It should be pointed out that the first private key will always be stored in the secure applet and cannot be obtained by the data sending end or other devices. This can prevent other devices from stealing the first private key and then sending data to the data receiving end based on the first private key. and signature.
S702、数据发送端获取元数据,并根据元数据生成待上链数据。S702. The data sending end obtains metadata and generates data to be uploaded based on the metadata.
元数据包括以下至少之一:第一公钥、IEMI、ICCID、eUICC ID、设备序列号SN、MSISDN。Metadata includes at least one of the following: first public key, IEMI, ICCID, eUICC ID, device serial number SN, MSISDN.
一种可能的实现方式中,数据发送端应用程序通过ADPU指令获取安全applet生成的第一公钥。数据发送端从操作系统接口和通信模组接口,获取数据发送端的第一终端信息,包括以下至少之一:IEMI、ICCID、eUICC ID、设备序列号SN、MSISDN。In one possible implementation, the data sending end application obtains the first public key generated by the security applet through the ADPU instruction. The data sending end obtains the first terminal information of the data sending end from the operating system interface and the communication module interface, including at least one of the following: IEMI, ICCID, eUICC ID, device serial number SN, MSISDN.
其中,待上链数据包括:元数据、对元数据进行签名的第一签名算法,以及对元数据进行签名后得到的第一数字签名。Among them, the data to be uploaded includes: metadata, the first signature algorithm for signing the metadata, and the first digital signature obtained after signing the metadata.
一种可能的实现方式中,数据发送端应用程序向安全applet发送元数据。安全applet根据公私密钥对中的第一私钥以及第一签名算法对元数据进行数字签名,得到第一数字签名。In one possible implementation, the data sending end application sends metadata to the security applet. The security applet digitally signs the metadata based on the first private key in the public-private key pair and the first signature algorithm to obtain the first digital signature.
数据发送端根据元数据、第一签名算法和第一数字签名,生成待上链数据。The data sending end generates data to be uploaded based on the metadata, the first signature algorithm and the first digital signature.
S703、数据发送端向DIVS AS发送待上链数据。 S703. The data sending end sends the data to be uploaded to the DIVS AS.
S704、DIVS AS根据所述第一公钥和所述第一数字签名验证所述待上链数据。S704. DIVS AS verifies the data to be uploaded based on the first public key and the first digital signature.
可选的,DIVS AS根据所述第一公钥解密所述第一数字签名,得到解密数据。DIVS AS确定解密数据与元数据或者元数据的哈希是否一致,若一致,则确定验证成功。Optionally, DIVS AS decrypts the first digital signature according to the first public key to obtain decrypted data. DIVS AS determines whether the decrypted data is consistent with the metadata or the hash of the metadata. If they are consistent, the verification is successful.
S705、DIVS AS向NEF发送签约请求信息。S705, DIVS AS sends contract request information to NEF.
其中,签约请求信息用于请求获取数据发送端的签约信息。Among them, the contract request information is used to request to obtain the contract information of the data sending end.
可选的,DIVS AS通过查询接口(RP-EDI)访问NEF。访问消息中携带MSISDN、ICCID及IMEI,请求获取该MSISDN、ICCID及IMEI对应的数据发送端的签约信息。Optionally, DIVS AS accesses NEF through the query interface (RP-EDI). The access message carries MSISDN, ICCID and IMEI, and requests to obtain the contract information of the data sender corresponding to the MSISDN, ICCID and IMEI.
S706、NEF从UDM获取发送端的签约信息。S706. NEF obtains the contract information of the sending end from UDM.
可选的,NEF向UDM转发MSISDN、ICCID及IMEI,请求获取该MSISDN、ICCID及IMEI对应的数据发送端的签约信息。UDM通过MSISDN、ICCID及IMEI,查询具有该MSISDN、ICCID及IMEI信息的签约信息,并将查询到的签约信息返回给NEF。Optionally, NEF forwards the MSISDN, ICCID, and IMEI to the UDM, and requests to obtain the contract information of the data sending end corresponding to the MSISDN, ICCID, and IMEI. UDM queries the contract information with the MSISDN, ICCID and IMEI information through MSISDN, ICCID and IMEI, and returns the queried contract information to NEF.
S707、NEF向DIVS AS发送数据发送端的签约信息。S707. NEF sends the contract information of the data sending end to DIVS AS.
可选的,NEF将UDM发送的签约信息转发给DIVS AS。Optionally, NEF forwards the contract information sent by UDM to DIVS AS.
S708、DIVS AS生成第一待签名数据集。S708, DIVS AS generates the first data set to be signed.
具体来说,DIVS AS将元数据、签约信息和公钥以及第一签名算法信息作为第一待签名数据集。Specifically, DIVS AS uses metadata, signing information, public key, and first signature algorithm information as the first data set to be signed.
可选的,DIVS AS可以直接将元数据、签约信息和公钥以及第一签名算法信息作为第一待签名数据集,也可以将元数据、签约信息和公钥以及第一签名算法信息的哈希值作为第一待签名数据集。本申请对此不做限定。Optionally, DIVS AS can directly use the metadata, contracting information, public key, and first signature algorithm information as the first data set to be signed, or it can also use the metadata, contracting information, public key, and first signature algorithm information as the first data set to be signed. The hash value is used as the first data set to be signed. This application does not limit this.
S709、DIVS AS根据第一待签名数据集生成数据完整性验证信息,并将数据完整性验证信息上传到区块链账本中。S709, DIVS AS generates data integrity verification information based on the first data set to be signed, and uploads the data integrity verification information to the blockchain ledger.
具体来说,DIVS AS根据区块链账本的第二私钥和第二数字签名算法对第一待签名数据集签名,生成第二数字签名。DIVS AS将第一待签名数据集、第二数字签名、以及第二私钥的CA证书作为数据完整性验证信息上传到区块链账本中。Specifically, DIVS AS signs the first data set to be signed based on the second private key of the blockchain ledger and the second digital signature algorithm to generate a second digital signature. DIVS AS uploads the first to-be-signed data set, the second digital signature, and the CA certificate of the second private key to the blockchain ledger as data integrity verification information.
需要指出的是,区块链账本中包括数据完整性验证信息的交易标识(Transation ID)。在将数据完整性验证信息上传到区块链账本中之后,DIVS AS将数据完整性验证信息的前一个交易标识的值设置为空,将记录状态设置为可用。It should be pointed out that the blockchain ledger includes the transaction ID (Transation ID) of data integrity verification information. After uploading the data integrity verification information to the blockchain ledger, DIVS AS sets the value of the previous transaction identifier of the data integrity verification information to empty and sets the record status to available.
S710、DIVS AS生成数据完整行验证信息的交易标识。S710, DIVS AS generates transaction identification of complete data row verification information.
S711、DIVS AS向数据发送端发送交易标识。 S711. DIVS AS sends the transaction identifier to the data sending end.
可选的,DIVS AS还生成DIVS AS入口的URL,同步向数据发送端发送URL和交易标识。可以理解的是,DIVS AS可以在生成交易标识和URL之后分别向数据发送端发送交易标识和URL。DIVS AS也可以根据交易标识和URL进行合并,通过同一条消息向数据发送端发送交易标识和URL,本公开对此不做限定。在同一条消息向数据发送端发送交易标识和URL的情况下,若DIVS AS更新了交易标识但未更新URL,DIVS可以仅更新该信息中的交易标识,也可以同时更新交易标识和URL。本公开对此也不做限定。Optionally, DIVS AS also generates the URL of the DIVS AS entrance, and synchronously sends the URL and transaction identifier to the data sending end. It is understandable that DIVS AS can send the transaction ID and URL to the data sending end respectively after generating the transaction ID and URL. DIVS AS can also be merged based on the transaction ID and URL, and the transaction ID and URL are sent to the data sending end through the same message. This disclosure does not limit this. In the case where the transaction ID and URL are sent to the data sender in the same message, if DIVS AS updates the transaction ID but does not update the URL, DIVS can only update the transaction ID in the information, or it can update the transaction ID and URL at the same time. This disclosure does not limit this either.
需要指出的是,数据发送端在接收到交易标识和URL之后,可以将交易标识和URL存储在eUICC中的安全applet中。It should be pointed out that after receiving the transaction ID and URL, the data sender can store the transaction ID and URL in the secure applet in the eUICC.
需要指出的是,在上述流程二中,DIVS AS提供的第二私钥对应的证书可以是由区块链系统成员管理基于公私密钥对生成的CA证书,也可以是权威CA结构生成的CA证书,也可以是自签名的CA证书,本申请对此不做限定。It should be pointed out that in the above process two, the certificate corresponding to the second private key provided by DIVS AS can be a CA certificate generated based on the public and private key pairs managed by the members of the blockchain system, or it can be a CA generated by an authoritative CA structure. The certificate can also be a self-signed CA certificate, which is not limited in this application.
可选的,第二数字签名算法和第一数字签名算法可以为相同的数字签名算法。Optionally, the second digital signature algorithm and the first digital signature algorithm may be the same digital signature algorithm.
可选的,区块链账本中包含区块链客户端,客户端用于执行区块链账本数据读写及智能合约的执行。Optionally, the blockchain ledger includes a blockchain client, which is used to read and write blockchain ledger data and execute smart contracts.
流程三、数据完整性验证信息更新的流程。Process 3. Data integrity verification information update process.
如图8所示,数据完整性验证信息更新的流程为签约注销流程为例,对数据完整性验证信息更新的流程进行说明。签约注销流程可以通过以下S801-S808实现。As shown in Figure 8, the process of updating the data integrity verification information is the contract cancellation process as an example to explain the process of updating the data integrity verification information. The contract cancellation process can be implemented through the following S801-S808.
S801、UDM触发eSIM签约注销。S801, UDM triggers eSIM contract cancellation.
具体来说,在UDM存储的数据发送端用户签约数据。一旦用户业务注销,则会触发签约注销流程,同时触发UDM事件通知给NEF。Specifically, the data sending end user's contract data stored in UDM. Once the user's service is logged out, the contract cancellation process will be triggered, and a UDM event notification will be triggered to NEF.
S802、UDM向NEF发送eSIM签约注销消息。S802. UDM sends an eSIM subscription cancellation message to NEF.
其中,eSIM签约注销消息包括以下至少之一:ICCID、MSISDN及绑定IMEI、eSIM签约注销时间。The eSIM subscription cancellation message includes at least one of the following: ICCID, MSISDN, bound IMEI, and eSIM subscription cancellation time.
S803、NEF向DIVS AS发送eSIM签约注销消息。S803. NEF sends an eSIM subscription cancellation message to DIVS AS.
具体来说,NEF触发订阅通知事件,向DIVS AS发送eSIM签约注销消息。Specifically, NEF triggers a subscription notification event and sends an eSIM subscription cancellation message to DIVS AS.
S804、DIVS AS根据eSIM签约注销消息,确定对应的交易标识。S804, DIVS AS determines the corresponding transaction identifier based on the eSIM contract cancellation message.
具体来说,DIVS AS接收到eSIM签约注销消息之后,获取eSIM签约注销消息中的ICCID、MSISDN和IMEI。DIVS AS确定ICCID、MSISDN和IMEI关联的全部交易标识。Specifically, after receiving the eSIM subscription and cancellation message, DIVS AS obtains the ICCID, MSISDN and IMEI in the eSIM subscription and cancellation message. DIVS AS determines all transaction identifiers associated with ICCID, MSISDN and IMEI.
S805、DIVS AS更新交易标识对应的第一待签名数据集,得到第二待签名数据集。 S805. DIVS AS updates the first data set to be signed corresponding to the transaction identifier and obtains the second data set to be signed.
具体来说,DIVS AS更新每个交易标识对应的第一待签名数据集中的eSIM签约注销时间,并将更新后的第一待签名数据集作为第二待签名数据集。Specifically, DIVS AS updates the eSIM signing and cancellation time in the first data set to be signed corresponding to each transaction identification, and uses the updated first data set to be signed as the second data set to be signed.
DIVS AS根据第二私钥、第二签名算法对第二待签名数据集进行签名,得到第四数字签名。DIVS AS signs the second data set to be signed based on the second private key and the second signature algorithm to obtain the fourth digital signature.
S806、DIVS AS将第二待签名数据集、第四数字签名、以及第二私钥的CA证书作为更新后的数据完整性验证信息上传到区块链账本中。S806, DIVS AS uploads the second data set to be signed, the fourth digital signature, and the CA certificate of the second private key to the blockchain ledger as updated data integrity verification information.
S807、DIVS AS生成更新后的数据完整性验证信息的交易标识。S807, DIVS AS generates the transaction identifier of the updated data integrity verification information.
S808、DIVS AS向数据发送端发送更新后的数据完整性验证信息的交易标识。S808, DIVS AS sends the transaction identifier of the updated data integrity verification information to the data sending end.
其中,S807和S808的具体实现方式可以参照上述S710和S711,此处不再赘述。Among them, the specific implementation of S807 and S808 can refer to the above-mentioned S710 and S711, and will not be described again here.
以上,对签约信息更新的过程进行了说明。The above describes the process of updating contract information.
流程四、数据完整性验证的流程。Process 4. Data integrity verification process.
如图9所示,数据完整性验证的流程具体可以通过以下S901-S907实现。As shown in Figure 9, the data integrity verification process can be implemented through the following S901-S907.
S901、数据发送端获取待验证数据。S901. The data sending end obtains the data to be verified.
可选的,数据发送端采集数据之后,将采集到的数据作为待验证数据。Optionally, after the data sending end collects the data, the collected data will be used as data to be verified.
S902、数据发送端根据待验证数据生成目标数据。S902. The data sending end generates target data based on the data to be verified.
具体包括:数据发送端采用第一私钥和第一签名算法对待验证数字签名,得到第一数字签名。Specifically, the data sending end uses the first private key and the first signature algorithm to obtain the digital signature to be verified, and obtains the first digital signature.
数据发送端调用ADPU指令,将数据发送到安全applet中,使用第一私钥以及第一签名算法对待验证数据进行签名,得到第一数字签名,以及第一数字签名的时间戳。The data sending end calls the ADPU instruction to send the data to the secure applet, uses the first private key and the first signature algorithm to sign the data to be verified, and obtains the first digital signature and the timestamp of the first digital signature.
S903、数据发送端向数据接收端发送目标数据。S903. The data sending end sends the target data to the data receiving end.
具体来说,数据发送端根据待验证数据、第一数字签名、第一数字签名的时间戳、以及第一标识生成目标数据。Specifically, the data sending end generates target data based on the data to be verified, the first digital signature, the timestamp of the first digital signature, and the first identification.
数据发送端向数据接收端发送目标数据。The data sending end sends target data to the data receiving end.
需要指出的是,数据发送端可以通过直接将目标数据发送给数据接收端,也可以通过其他设备转发后将目标数据发送给数据接收端,本申请对此不做限定。It should be pointed out that the data sending end can directly send the target data to the data receiving end, or can also send the target data to the data receiving end after being forwarded by other devices. This application does not limit this.
S904、数据接收端向DIVS AS发送数据完整性验证信息请求消息。S904. The data receiving end sends a data integrity verification information request message to the DIVS AS.
请求数据包括第一标识。The request data includes a first identification.
S905、DIVS AS查询第一标识关联的数据完整性验证信息。S905, DIVS AS queries the data integrity verification information associated with the first identifier.
具体来说,DIVS AS接收到请求消息之后,确定第一标识。DIVS AS查询区块链账本中与第一标识关联的数据完整性验证信息。 Specifically, after receiving the request message, the DIVS AS determines the first identifier. DIVS AS queries the data integrity verification information associated with the first identifier in the blockchain ledger.
可选的,DIVS AS首先查询区块链账本中与第一标识数据完整性验证信息,并确定数据完整性验证信息中的元数据。然后DIVS AS基于元数据中的IEMI、MSISDN、ICCID,确定更新后的数据完整性验证信息。Optionally, DIVS AS first queries the data integrity verification information related to the first identification in the blockchain ledger, and determines the metadata in the data integrity verification information. Then DIVS AS determines the updated data integrity verification information based on the IEMI, MSISDN, and ICCID in the metadata.
DIVS AS将数据完整性验证信息和更新后的数据完整性验证信息共同发送给数据接收端。DIVS AS sends the data integrity verification information and the updated data integrity verification information to the data receiving end.
S906、DIVS AS向数据接收端发送数据完整性验证信息。S906, DIVS AS sends data integrity verification information to the data receiving end.
S907、数据接收端根据数据完整性验证信息验证待验证数据的数据完整性。S907. The data receiving end verifies the data integrity of the data to be verified based on the data integrity verification information.
具体来说,DIVS AS在接收到数据完整性验证信息之后,根据数据完整性验证信息中的第二公钥和第一私钥的CA整数验证第三数字签名或第四数字签名。验证成功之后,获取数据完整性验证信息中的第一公钥,根据第一公钥和第一签名算法验证第一数字签名。在第一数字签名验证通过之后,确定第一数字签名的时间戳是否在数据发送端的签约有效期内。若是,则确定待验证数据的数据完整性验证成功。Specifically, after receiving the data integrity verification information, DIVS AS verifies the third digital signature or the fourth digital signature based on the CA integer of the second public key and the first private key in the data integrity verification information. After the verification is successful, the first public key in the data integrity verification information is obtained, and the first digital signature is verified based on the first public key and the first signature algorithm. After the first digital signature passes the verification, it is determined whether the timestamp of the first digital signature is within the contract validity period of the data sending end. If yes, it is determined that the data integrity verification of the data to be verified is successful.
以上,对本申请实施例涉及到的数据完整性验证系统,以及数据完整性验证系统中各个设备的功能,设备之间的交互进行了详细说明。Above, the data integrity verification system involved in the embodiment of the present application, the functions of each device in the data integrity verification system, and the interaction between the devices have been described in detail.
本申请实施例提供了一种电子设备,用于执行上述数据完整性确定系统中任一设备所需执行的方法。该电子设备可以是数据发送端、数据接收端、DIVS AS,NEF或者UDM等,本申请对此不做限定。该电子设备可以为本申请中涉及的电子设备,或者电子设备中的模块;或者是电子设备中的芯片,也可以是其他用于执行网络质量确定方法的装置,本申请对此不做限定。An embodiment of the present application provides an electronic device for performing the method required by any device in the above data integrity determination system. The electronic device can be a data sending end, a data receiving end, a DIVS AS, NEF or UDM, etc. This application does not limit this. The electronic device may be the electronic device involved in this application, or a module in the electronic device; or it may be a chip in the electronic device, or other device for performing the network quality determination method, which is not limited by this application.
图10为本申请实施例提供的一种电子设备的结构示意图。如图10所示,该电子设备100包括至少一个处理器101,通信线路102,以及至少一个通信接口104,还可以包括存储器103。其中,处理器101,存储器103以及通信接口104三者之间可以通过通信线路102连接。FIG. 10 is a schematic structural diagram of an electronic device provided by an embodiment of the present application. As shown in FIG. 10 , the electronic device 100 includes at least one processor 101 , a communication line 102 , and at least one communication interface 104 , and may also include a memory 103 . Among them, the processor 101, the memory 103 and the communication interface 104 can be connected through a communication line 102.
处理器101可以是一个中央处理器(central processing unit,CPU),也可以是特定集成电路(application specific integrated circuit,ASIC),或者是被配置成实施本申请实施例的一个或多个集成电路,例如:一个或多个数字信号处理器(digital signal processor,DSP),或,一个或者多个现场可编程门阵列(field programmable gate array,FPGA)。The processor 101 may be a central processing unit (CPU), an application specific integrated circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the present application. For example: one or more digital signal processors (DSP), or one or more field programmable gate arrays (FPGA).
通信线路102可以包括一通路,用于在上述组件之间传送信息。Communication line 102 may include a path for communicating information between the components described above.
通信接口104,用于与其他设备或通信网络通信,可以使用任何收发器一类的装置,如以太网,无线接入网(radio access network,RAN),无线局域网(wireless local area networks,WLAN)等。 The communication interface 104 is used to communicate with other devices or communication networks, and can use any transceiver-like device, such as Ethernet, wireless access network (radio access network, RAN), wireless local area networks (WLAN) wait.
存储器103可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electrically erasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于包括或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。The memory 103 may be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory (RAM)) or other type that can store information and instructions. A dynamic storage device can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disc storage (including compressed optical discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), disk storage media or other magnetic storage devices, or can be used to include or store desired program code in the form of instructions or data structures and can be used by a computer Any other medium for access, but not limited to this.
一种可能的设计中,存储器103可以独立于处理器101存在,即存储器103可以为处理器101外部的存储器,此时,存储器103可以通过通信线路102与处理器101相连接,用于存储执行指令或者应用程序代码,并由处理器101来控制执行,实现本申请下述实施例提供的网络质量确定方法。又一种可能的设计中,存储器103也可以和处理器101集成在一起,即存储器103可以为处理器101的内部存储器,例如,该存储器103为高速缓存,可以用于暂存一些数据和指令信息等。In one possible design, the memory 103 can exist independently of the processor 101, that is, the memory 103 can be a memory external to the processor 101. In this case, the memory 103 can be connected to the processor 101 through the communication line 102 for storing execution data. Instructions or application program codes are controlled and executed by the processor 101 to implement the network quality determination method provided by the following embodiments of the present application. In another possible design, the memory 103 can also be integrated with the processor 101, that is, the memory 103 can be an internal memory of the processor 101. For example, the memory 103 can be a cache, which can be used to temporarily store some data and instructions. Information etc.
作为一种可实现方式,处理器101可以包括一个或多个CPU,例如图10中的CPU0和CPU1。作为另一种可实现方式,电子设备100可以包括多个处理器,例如图10中的处理器101和处理器107。作为再一种可实现方式,电子设备100还可以包括输出设备105和输入设备106。As an implementation manner, the processor 101 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 10 . As another implementation manner, the electronic device 100 may include multiple processors, such as the processor 101 and the processor 107 in FIG. 10 . As yet another implementation manner, the electronic device 100 may also include an output device 105 and an input device 106.
本申请实施例提供一种包含指令的计算机程序产品,当该计算机程序产品在计算机上运行时,使得该计算机执行上述系统实施例中的各个设备所执行的方法。Embodiments of the present application provide a computer program product containing instructions. When the computer program product is run on a computer, it causes the computer to execute the method executed by each device in the above system embodiment.
本申请实施例还提供一种计算机可读存储介质,计算机可读存储介质中存储有指令,当该指令在计算机上运行时,使得该计算机执行上述系统实施例中的各个设备所执行的方法。Embodiments of the present application also provide a computer-readable storage medium. Instructions are stored in the computer-readable storage medium. When the instructions are run on a computer, they cause the computer to execute the method performed by each device in the above system embodiment.
其中,计算机可读存储介质,例如可以是但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、可擦式可编程只读存储器(Erasable Programmable Read Only Memory,EPROM)、寄存器、硬盘、光纤、便携式紧凑磁盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合、或者本领域熟知的任何其它形式的计算机可读存储介质。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质 写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于特定用途集成电路(Application Specific Integrated Circuit,ASIC)中。在本申请实施例中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。The computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination thereof. More specific examples (non-exhaustive list) of computer-readable storage media include: electrical connections having one or more conductors, portable computer disks, hard drives, random access memory (RAM), read-only memory (Read-Only Memory, ROM), Erasable Programmable Read Only Memory (EPROM), register, hard disk, optical fiber, portable compact disk read-only memory (Compact Disc Read-Only Memory, CD-ROM ), an optical storage device, a magnetic storage device, or any suitable combination of the above, or any other form of computer-readable storage medium well known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and transfer information to the storage medium. Write information. Of course, the storage medium can also be an integral part of the processor. The processor and storage medium may be located in an Application Specific Integrated Circuit (ASIC). In the embodiments of the present application, the computer-readable storage medium may be any tangible medium containing or storing a program, which may be used by or in combination with an instruction execution system, apparatus or device.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、设备和方法,可以通过其它的方式实现。例如,以上所描述的设备实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,设备或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed systems, devices and methods can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components may be combined or can be integrated into another system, or some features can be ignored, or not implemented. On the other hand, the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
以上,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应该以权利要求的保护范围为准。 The above are only specific implementations of the present application, but the protection scope of the present application is not limited thereto. Any changes or substitutions within the technical scope disclosed in the present application shall be covered by the protection scope of the present application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (17)

  1. 一种数据完整性验证系统,其特征在于,包括:数据发送端、数据接收端和数据完整性验证服务器DIVS AS;A data integrity verification system, characterized by including: a data sending end, a data receiving end and a data integrity verification server DIVS AS;
    所述数据发送端,被配置为:向所述数据接收端发送目标数据;所述目标数据包括:待验证数据、第一数字签名和第一标识;其中,所述第一数字签名为根据第一私钥对所述待验证数据进行签名确定的数字签名;所述第一标识为所述数据发送端的数据完整性验证信息在所述DIVS AS中的存储标识;所述第一私钥为所述数据发送端生成的第一密钥对中的私钥;The data sending end is configured to: send target data to the data receiving end; the target data includes: data to be verified, a first digital signature and a first identification; wherein the first digital signature is based on the first digital signature. A private key is used to sign the digital signature of the data to be verified; the first identification is the storage identification of the data integrity verification information of the data sending end in the DIVS AS; the first private key is the The private key in the first key pair generated by the data sending end;
    所述数据接收端,被配置为:接收所述目标数据,并向所述DIVS AS发送所述第一标识;The data receiving end is configured to: receive the target data and send the first identifier to the DIVS AS;
    所述DIVS AS,被配置为:接收所述第一标识,查询与所述第一标识关联的数据完整性验证信息;所述数据完整性验证信息包括第一公钥;所述第一公钥为所述数据发送端生成的第一密钥对中的公钥;The DIVS AS is configured to: receive the first identification and query the data integrity verification information associated with the first identification; the data integrity verification information includes a first public key; the first public key The public key in the first key pair generated by the data sending end;
    所述数据接收端,被配置为:接收所述数据完整性验证信息,根据所数据完整性验证信息中的第一公钥验证所述第一数字签名,并根据所述第一数字签名的验证结果确定所述待验证数据的数据完整性。The data receiving end is configured to: receive the data integrity verification information, verify the first digital signature according to the first public key in the data integrity verification information, and verify the first digital signature based on the verification of the first digital signature. The result determines the data integrity of the data to be verified.
  2. 根据权利要求1所述的系统,其特征在于,所述数据发送端,还被配置为:向所述DIVS AS发送第一数据;所述第一数据包括:所述第一公钥,所述数据发送端支持的签名算法集和所述数据发送端的第一终端信息;The system according to claim 1, characterized in that the data sending end is also configured to: send first data to the DIVS AS; the first data includes: the first public key, the The set of signature algorithms supported by the data sending end and the first terminal information of the data sending end;
    所述DIVS AS,还被配置为:根据所述第一终端信息获取所述数据发送端的签约信息;所述签约信息包括:所述数据发送端的签约有效性信息;根据所述第一数据和所述签约信息,确定所述数据完整性验证信息;将所述数据完整性验证信息存储在区块链中。The DIVS AS is further configured to: obtain the contract information of the data sending end according to the first terminal information; the contract information includes: the contract validity information of the data sending end; according to the first data and the Determine the contract information, determine the data integrity verification information, and store the data integrity verification information in the blockchain.
  3. 根据权利要求2所述的系统,其特征在于,所述系统还包括:能力开放平台NEF和用户数据管理网元UDM;The system according to claim 2, characterized in that the system further includes: capability opening platform NEF and user data management network element UDM;
    所述DIVS AS,具体被配置为:向能力开放平台NEF发送签约信息获取请求;所述签约信息获取请求中包括所述第一终端信息;The DIVS AS is specifically configured to: send a contract information acquisition request to the capability opening platform NEF; the contract information acquisition request includes the first terminal information;
    所述NEF,被配置为:向所述UDM请求获取所述数据发送端的签约信息,并在获取所述数据发送端的签约信息之后向所述DIVS AS返回所述数据发送端的签约信息;The NEF is configured to: request the UDM to obtain the contract information of the data sender, and return the contract information of the data sender to the DIVS AS after obtaining the contract information of the data sender;
    所述DIVS AS,还被配置:接收来自所述NEF的签约信息;所述签约信息为所述NEF返回的根据所述第一终端信息在用户数据管理网元UDM中获取的所述数据 发送端的签约信息。The DIVS AS is also configured to: receive subscription information from the NEF; the subscription information is the data returned by the NEF and obtained in the user data management network element UDM based on the first terminal information. The contract information of the sender.
  4. 根据权利要求3所述的系统,其特征在于,所述数据发送端,具体被配置为:The system according to claim 3, characterized in that the data sending end is specifically configured to:
    生成第一密钥对;所述第一密钥对包括所述第一公钥和所述第一私钥;Generate a first key pair; the first key pair includes the first public key and the first private key;
    采用所述第一私钥和第一签名算法对所述第一公钥和所述第一终端信息签名,确定第二数字签名;Sign the first public key and the first terminal information using the first private key and the first signature algorithm to determine a second digital signature;
    根据所述第一公钥,所述第一终端信息,数据发送端支持的签名算法集,和第二数字签名生成所述第一数据。The first data is generated based on the first public key, the first terminal information, a set of signature algorithms supported by the data sending end, and a second digital signature.
  5. 根据权利要求4所述的系统,其特征在于,所述DIVS AS,具体被配置为:The system according to claim 4, characterized in that the DIVS AS is specifically configured as:
    根据所述第一公钥和所述第一签名算法,验证所述第二数字签名;Verify the second digital signature according to the first public key and the first signature algorithm;
    在所述第二数字签名验证通过的情况下,获取所述第一数据中的第一终端信息;If the second digital signature verification passes, obtain the first terminal information in the first data;
    根据所述第一终端信息生成所述签约信息获取请求。The subscription information acquisition request is generated according to the first terminal information.
  6. 根据权利要求5所述的系统,其特征在于,所述DIVS AS,具体被配置为:The system according to claim 5, characterized in that the DIVS AS is specifically configured as:
    根据所述第一数据和签约数据生成第一待签名数据集;Generate a first data set to be signed based on the first data and contract data;
    根据第二私钥和第二签名算法对所述第一待签名数据集签名,确定第三数字签名;所述第二私钥归属于所述DIVS AS生成的第二密钥对;Sign the first data set to be signed according to the second private key and the second signature algorithm to determine the third digital signature; the second private key belongs to the second key pair generated by the DIVS AS;
    根据所述第一待签名数据集、所述第二私钥对应的证书、以及所述第三数字签名,确定所述数据完整性验证信息。The data integrity verification information is determined based on the first data set to be signed, the certificate corresponding to the second private key, and the third digital signature.
  7. 根据权利要求6所述的系统,其特征在于,所述DIVS AS,还被配置为:The system according to claim 6, characterized in that the DIVS AS is also configured to:
    向所述数据发送端发送第一交易标识;其中,所述第一交易标识用于表征所述数据完整性验证信息在所述区块链中的存储信息。Send a first transaction identifier to the data sending end; wherein the first transaction identifier is used to characterize the storage information of the data integrity verification information in the blockchain.
  8. 根据权利要求7所述的系统,其特征在于,所述DIVS AS,还被配置为:The system according to claim 7, characterized in that the DIVS AS is also configured to:
    DIVS AS向所述数据发送端发送所述第一地址信息;其中,所述第一地址信息为存储所述第一交易标识对应的数据完整性验证信息的DIVS AS的地址信息。The DIVS AS sends the first address information to the data sending end; wherein the first address information is the address information of the DIVS AS that stores the data integrity verification information corresponding to the first transaction identifier.
  9. 根据权利要求8所述的系统,其特征在于,所述UDM,还被配置为:在所述数据发送端的签约信息更新的情况下,向所述NEF发送签约信息更新消息;所述签约信息更新消息包括:所述数据发送端的第二终端信息,以及所述数据发送端更新后的签约信息;The system according to claim 8, wherein the UDM is further configured to: when the subscription information of the data sending end is updated, send a subscription information update message to the NEF; the subscription information update The message includes: the second terminal information of the data sending end, and the updated contract information of the data sending end;
    所述NEF,还被配置为:向所述DIVS AS转发所述签约信息更新消息;The NEF is also configured to: forward the subscription information update message to the DIVS AS;
    所述DIVS AS,还被配置为:查询所述区块链中包括所述第二终端信息的最新的目标数据完整性验证信息;根据所述更新后的签约信息,更新所述最新的目标数据完整性验证信息;将更新后的最新的目标数据完整性验证信息存储在所述区块链中。 The DIVS AS is further configured to: query the latest target data integrity verification information including the second terminal information in the blockchain; and update the latest target data according to the updated contract information. Integrity verification information; store the updated latest target data integrity verification information in the blockchain.
  10. 根据权利要求9所述的系统,其特征在于,The system according to claim 9, characterized in that:
    所述DIVS AS,具体还被配置为:对每个所述目标数据完整性验证信息执行第一操作,确定更新后的所述每个目标数据完整性验证信息;The DIVS AS is specifically configured to: perform a first operation on each target data integrity verification information, and determine the updated each target data integrity verification information;
    所述第一操作包括:根据所述第一数据和所述更新后的签约信息,生成第二待验证数据集;The first operation includes: generating a second data set to be verified based on the first data and the updated contract information;
    根据所述第二私钥和所述第二签名算法对所述第二待签名数据集签名,确定第四数字签名;Sign the second data set to be signed according to the second private key and the second signature algorithm to determine a fourth digital signature;
    根据所述第二待签名数据集,所述第二私钥对应的证书,以及所述第四数字签名,确定更新后的目标数据完整性验证信息。Based on the second data set to be signed, the certificate corresponding to the second private key, and the fourth digital signature, the updated target data integrity verification information is determined.
  11. 根据权利要求10所述的系统,其特征在于,所述DIVS AS,还被配置为:The system according to claim 10, characterized in that the DIVS AS is also configured to:
    向所述数据发送端发送第二交易标识;其中,所述第二交易标识用于表征所述更新后的目标数据完整性验证信息在所述区块链中的存储信息。Send a second transaction identifier to the data sending end; wherein the second transaction identifier is used to characterize the storage information of the updated target data integrity verification information in the blockchain.
  12. 根据权利要求11所述的系统,其特征在于,所述DIVS AS,还被配置为:The system according to claim 11, characterized in that the DIVS AS is also configured to:
    向所述数据发送端发送所述第二地址信息;其中,所述第二地址信息为存储所述更新后的目标数据完整性验证信息的DIVS AS的地址信息。Send the second address information to the data sending end; wherein the second address information is the address information of the DIVS AS that stores the updated target data integrity verification information.
  13. 根据权利要求12所述的系统,其特征在于,所述数据发送端,还被配置为:接收来自所述DIVS AS的第一交易标识和第二交易标识中的至少之一;所述第一交易标识为根据所述数据完整性验证信息在所述区块链中的存储信息生成的交易标识;所述第二交易标识为根据更新后的数据完整性验证信息在区块链中的存储信息生成的交易标识;The system according to claim 12, characterized in that the data sending end is further configured to: receive at least one of the first transaction identification and the second transaction identification from the DIVS AS; the first The transaction identifier is a transaction identifier generated based on the storage information of the data integrity verification information in the blockchain; the second transaction identifier is the storage information in the blockchain based on the updated data integrity verification information. Generated transaction ID;
    根据所述第一交易标识和第二交易标识中的最新的交易标识,生成所述第一标识。The first identifier is generated according to the latest transaction identifier among the first transaction identifier and the second transaction identifier.
  14. 根据权利要求13所述的系统,其特征在于,所述目标数据还包括验证访问地址;所述验证访问地址用于表征存储所述数据发送端的数据完整性验证信息的DIVS AS的地址;所述数据发送端,还被配置为:接收来自所述DIVS AS的第一地址信息和第二地址信息中的至少之一;所述第一地址信息为存储所述第一交易标识对应的数据完整性验证信息的DIVS AS的地址信息;所述第二地址信息为存储所述第二交易标识对应的更新后的数据完整性验证信息的DIVS AS的地址信息;The system according to claim 13, wherein the target data further includes a verification access address; the verification access address is used to characterize the address of the DIVS AS that stores the data integrity verification information of the data sending end; The data sending end is also configured to: receive at least one of the first address information and the second address information from the DIVS AS; the first address information is to store the data integrity corresponding to the first transaction identifier. The address information of the DIVS AS of the verification information; the second address information is the address information of the DIVS AS that stores the updated data integrity verification information corresponding to the second transaction identifier;
    根据所述第一地址信息和第二地址信息中的至少之一生成所述验证访问地址。The verification access address is generated according to at least one of the first address information and the second address information.
  15. 根据权利要求1-14任一项所述的系统,其特征在于,所述目标数据还包括所述第一数字签名的时间戳;所述数据完整性验证信息还包括:所述数据发送端的签约有效期;所述数据接收端,还被配置为:确定所述第一数字签名的时间戳是否 在所述数据发送端的签约有效期内;The system according to any one of claims 1-14, characterized in that the target data also includes the timestamp of the first digital signature; the data integrity verification information also includes: the contract of the data sending end Validity period; the data receiving end is also configured to: determine whether the timestamp of the first digital signature Within the validity period of the contract at the data sending end;
    若是,则确定所述待验证数据的数据完整性验证成功。If yes, it is determined that the data integrity verification of the data to be verified is successful.
  16. 根据权利要求15所述的系统,其特征在于,所述数据接收端还被配置为:The system according to claim 15, characterized in that the data receiving end is further configured to:
    根据所述第二私钥对应的证书和所述第二签名算法验证所述第三数字签名;Verify the third digital signature according to the certificate corresponding to the second private key and the second signature algorithm;
    在所述第三数字签名验证成功的情况下,获取所述第一待签名数据集中的第一公钥。If the verification of the third digital signature is successful, the first public key in the first data set to be signed is obtained.
  17. 根据权利要求1-14任一项所述的系统,其特征在于,所述第一终端信息包括所述数据发送端的嵌入式通用集成电路卡标识eUICC ID/集成电路卡识别码ICCID、国际移动设备识别码IMEI和移动用户号码MSISDN的至少之一;The system according to any one of claims 1 to 14, characterized in that the first terminal information includes the embedded universal integrated circuit card identification eUICC ID/integrated circuit card identification code ICCID, international mobile equipment of the data sending end. At least one of the identification code IMEI and the mobile subscriber number MSISDN;
    所述第二终端信息包括所述eUICC ID/ICCID、IMEI和MSISDN的至少之一。 The second terminal information includes at least one of the eUICC ID/ICCID, IMEI and MSISDN.
PCT/CN2023/094845 2022-05-30 2023-05-17 Data integrity verification system WO2023231782A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210603461.2A CN114826772B (en) 2022-05-30 2022-05-30 Data integrity verification system
CN202210603461.2 2022-05-30

Publications (1)

Publication Number Publication Date
WO2023231782A1 true WO2023231782A1 (en) 2023-12-07

Family

ID=82518692

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/094845 WO2023231782A1 (en) 2022-05-30 2023-05-17 Data integrity verification system

Country Status (2)

Country Link
CN (1) CN114826772B (en)
WO (1) WO2023231782A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826772B (en) * 2022-05-30 2024-03-08 中国联合网络通信集团有限公司 Data integrity verification system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899410A (en) * 2016-09-13 2017-06-27 中国移动通信有限公司研究院 A kind of method and device of equipment identities certification
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
US20210390213A1 (en) * 2018-10-29 2021-12-16 Telefonaktiebolaget Lm Ericsson (Publ) Verifying data integrity
CN114826772A (en) * 2022-05-30 2022-07-29 中国联合网络通信集团有限公司 Data integrity verification system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802260B (en) * 2012-08-15 2015-05-13 哈尔滨工业大学 WLAN indoor positioning method based on matrix correlation
KR101606382B1 (en) * 2014-12-04 2016-03-25 현대모비스 주식회사 Method for building database of fingerprinting positioning and fingerprinting position method using the built database
CN110121894B (en) * 2017-01-16 2021-02-05 华为技术有限公司 Method and device for downloading subscription information set and related equipment
WO2018195759A1 (en) * 2017-04-25 2018-11-01 深圳市汇顶科技股份有限公司 Signature verification method, device and system
CN108449708A (en) * 2018-03-15 2018-08-24 重庆邮电大学 A kind of Wi-Fi indoor orientation methods examined based on signal distributions
CN108495258A (en) * 2018-03-20 2018-09-04 重庆邮电大学 WLAN indoor orientation methods based on sample size optimization and variance analysis
CN112214780B (en) * 2020-08-26 2021-06-25 腾讯科技(深圳)有限公司 Data processing method and device, intelligent equipment and storage medium
CN113194401B (en) * 2021-03-31 2022-08-09 西安交通大学 Millimeter wave indoor positioning method and system based on generative countermeasure network
CN113645562B (en) * 2021-06-30 2022-11-15 南京邮电大学 Indoor superstore intelligent fingerprint positioning method based on 5G signal
CN113868713A (en) * 2021-09-27 2021-12-31 中国联合网络通信集团有限公司 Data verification method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899410A (en) * 2016-09-13 2017-06-27 中国移动通信有限公司研究院 A kind of method and device of equipment identities certification
US20210390213A1 (en) * 2018-10-29 2021-12-16 Telefonaktiebolaget Lm Ericsson (Publ) Verifying data integrity
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
CN114826772A (en) * 2022-05-30 2022-07-29 中国联合网络通信集团有限公司 Data integrity verification system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YU YANG-YANG, YU HUI-QUN, FAN GUI-SHENG: "An Approach to Verifying the Data Integrity of Cloud Storage", HUADONG LI-GONG DAXUE XUEBAO - JOURNAL OF EAST CHINA UNIVERSITYOF SCIENCE AND TECHNOLOGY, GAI-BAN BIANJIBU, SHANGHAI, CN, vol. 39, no. 02, 30 April 2013 (2013-04-30), CN , pages 211 - 216, XP009551018, ISSN: 1006-3080, DOI: 10.14135/j.cnki.1006-3080.2013.02.011 *

Also Published As

Publication number Publication date
CN114826772B (en) 2024-03-08
CN114826772A (en) 2022-07-29

Similar Documents

Publication Publication Date Title
US11784788B2 (en) Identity management method, device, communications network, and storage medium
US11088854B2 (en) Securing blockchain access through a gateway on behalf of a communication device
CN110086755B (en) Method for realizing service of Internet of things, application server, Internet of things equipment and medium
SE541713C2 (en) Method and system for registering digital documents
EP2487863A2 (en) Enabling secure access to sensor network infrastructure using multiple interfaces and application based group key selection
CN102546176A (en) Supporting DNS security in a multi-master environment
EP3598333B1 (en) Electronic device update management
WO2023231782A1 (en) Data integrity verification system
WO2022193984A1 (en) Cross-chain data transmission method and apparatus, and computer device, storage medium and computer program product
Dwivedi et al. Smart contract and ipfs-based trustworthy secure data storage and device authentication scheme in fog computing environment
CN107332817B (en) Mobile device supporting multiple access control clients and corresponding method
US20240086562A1 (en) User data management method and related device
CN114172730A (en) Chain-crossing method and intermediate system for combining file block chains on chain and under chain
CN112235290B (en) Block chain-based Internet of things equipment management method and first Internet of things equipment
KR20220118408A (en) Request and response protocol using blockchain transactions
CN114980107A (en) Data integrity verification method and device and storage medium
CN111538740A (en) Information disclosure method and device
CN115412568A (en) Distributed data transmission method, device and system
WO2021136511A1 (en) Communication method and apparatus
CN114036478A (en) Block chain cross-chain method and device, storage medium and electronic equipment
CN114338091A (en) Data transmission method and device, electronic equipment and storage medium
Yu Usable security for named data networking
CN111770488A (en) EHPLMN updating method, related equipment and storage medium
CN112182009A (en) Data updating method and device of block chain and readable storage medium
CN116561820B (en) Trusted data processing method and related device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23814967

Country of ref document: EP

Kind code of ref document: A1